Hoyt LLC | Cross Site Scripting Report of 11-16-2010

Web Property: http://www.verizonbusiness.com

Report generated by Hoyt LLC at Tue Nov 16 19:08:13 CST 2010.


XSS.CX Research investigates and reports on security vulnerabilities embedded in Web Applications and Products used in wide-scale deployment.

XSS.CX Home | XSS.CX Research Blog

Loading

1. Cross-site scripting (reflected)

1.1. http://www.verizonbusiness.com/Medium/ [REST URL parameter 1]

1.2. http://www.verizonbusiness.com/Medium/ [REST URL parameter 1]

1.3. http://www.verizonbusiness.com/Medium/products/ [REST URL parameter 1]

1.4. http://www.verizonbusiness.com/Medium/products/ [REST URL parameter 1]

1.5. http://www.verizonbusiness.com/Medium/products/ [REST URL parameter 2]

1.6. http://www.verizonbusiness.com/Medium/products/ [REST URL parameter 2]

1.7. http://www.verizonbusiness.com/Medium/products/itinfrastructure/computing/caas_smb/ [REST URL parameter 1]

1.8. http://www.verizonbusiness.com/Medium/products/itinfrastructure/computing/caas_smb/ [REST URL parameter 1]

1.9. http://www.verizonbusiness.com/Medium/products/itinfrastructure/computing/caas_smb/ [REST URL parameter 2]

1.10. http://www.verizonbusiness.com/Medium/products/itinfrastructure/computing/caas_smb/ [REST URL parameter 2]

1.11. http://www.verizonbusiness.com/Medium/products/itinfrastructure/computing/caas_smb/ [REST URL parameter 3]

1.12. http://www.verizonbusiness.com/Medium/products/itinfrastructure/computing/caas_smb/ [REST URL parameter 3]

1.13. http://www.verizonbusiness.com/Medium/products/itinfrastructure/computing/caas_smb/ [REST URL parameter 4]

1.14. http://www.verizonbusiness.com/Medium/products/itinfrastructure/computing/caas_smb/ [REST URL parameter 4]

1.15. http://www.verizonbusiness.com/Medium/products/itinfrastructure/computing/caas_smb/ [REST URL parameter 5]

1.16. http://www.verizonbusiness.com/Medium/products/itinfrastructure/computing/caas_smb/ [REST URL parameter 5]

1.17. http://www.verizonbusiness.com/Medium/solutions/ [REST URL parameter 1]

1.18. http://www.verizonbusiness.com/Medium/solutions/ [REST URL parameter 1]

1.19. http://www.verizonbusiness.com/Medium/solutions/ [REST URL parameter 2]

1.20. http://www.verizonbusiness.com/Medium/solutions/ [REST URL parameter 2]

1.21. http://www.verizonbusiness.com/Medium/support/ [REST URL parameter 1]

1.22. http://www.verizonbusiness.com/Medium/support/ [REST URL parameter 1]

1.23. http://www.verizonbusiness.com/Medium/support/ [REST URL parameter 2]

1.24. http://www.verizonbusiness.com/Medium/support/ [REST URL parameter 2]

1.25. http://www.verizonbusiness.com/Products/ [REST URL parameter 1]

1.26. http://www.verizonbusiness.com/Products/ [REST URL parameter 1]

1.27. http://www.verizonbusiness.com/Products/communications/ [REST URL parameter 1]

1.28. http://www.verizonbusiness.com/Products/communications/ [REST URL parameter 1]

1.29. http://www.verizonbusiness.com/Products/communications/ [REST URL parameter 2]

1.30. http://www.verizonbusiness.com/Products/communications/ [REST URL parameter 2]

1.31. http://www.verizonbusiness.com/Products/communications/conferencing/ [REST URL parameter 1]

1.32. http://www.verizonbusiness.com/Products/communications/conferencing/ [REST URL parameter 1]

1.33. http://www.verizonbusiness.com/Products/communications/conferencing/ [REST URL parameter 2]

1.34. http://www.verizonbusiness.com/Products/communications/conferencing/ [REST URL parameter 2]

1.35. http://www.verizonbusiness.com/Products/communications/conferencing/ [REST URL parameter 3]

1.36. http://www.verizonbusiness.com/Products/communications/conferencing/ [REST URL parameter 3]

1.37. http://www.verizonbusiness.com/Products/communications/contact-center/ [REST URL parameter 1]

1.38. http://www.verizonbusiness.com/Products/communications/contact-center/ [REST URL parameter 1]

1.39. http://www.verizonbusiness.com/Products/communications/contact-center/ [REST URL parameter 2]

1.40. http://www.verizonbusiness.com/Products/communications/contact-center/ [REST URL parameter 2]

1.41. http://www.verizonbusiness.com/Products/communications/contact-center/ [REST URL parameter 3]

1.42. http://www.verizonbusiness.com/Products/communications/contact-center/ [REST URL parameter 3]

1.43. http://www.verizonbusiness.com/Products/communications/emergency/ [REST URL parameter 1]

1.44. http://www.verizonbusiness.com/Products/communications/emergency/ [REST URL parameter 1]

1.45. http://www.verizonbusiness.com/Products/communications/emergency/ [REST URL parameter 2]

1.46. http://www.verizonbusiness.com/Products/communications/emergency/ [REST URL parameter 2]

1.47. http://www.verizonbusiness.com/Products/communications/emergency/ [REST URL parameter 3]

1.48. http://www.verizonbusiness.com/Products/communications/emergency/ [REST URL parameter 3]

1.49. http://www.verizonbusiness.com/Products/communications/ip-telephony/ [REST URL parameter 1]

1.50. http://www.verizonbusiness.com/Products/communications/ip-telephony/ [REST URL parameter 1]

1.51. http://www.verizonbusiness.com/Products/communications/ip-telephony/ [REST URL parameter 2]

1.52. http://www.verizonbusiness.com/Products/communications/ip-telephony/ [REST URL parameter 2]

1.53. http://www.verizonbusiness.com/Products/communications/ip-telephony/ [REST URL parameter 3]

1.54. http://www.verizonbusiness.com/Products/communications/ip-telephony/ [REST URL parameter 3]

1.55. http://www.verizonbusiness.com/Products/communications/managed-ucc/ [REST URL parameter 1]

1.56. http://www.verizonbusiness.com/Products/communications/managed-ucc/ [REST URL parameter 1]

1.57. http://www.verizonbusiness.com/Products/communications/managed-ucc/ [REST URL parameter 2]

1.58. http://www.verizonbusiness.com/Products/communications/managed-ucc/ [REST URL parameter 2]

1.59. http://www.verizonbusiness.com/Products/communications/managed-ucc/ [REST URL parameter 3]

1.60. http://www.verizonbusiness.com/Products/communications/managed-ucc/ [REST URL parameter 3]

1.61. http://www.verizonbusiness.com/Products/communications/prof-svcs/ [REST URL parameter 1]

1.62. http://www.verizonbusiness.com/Products/communications/prof-svcs/ [REST URL parameter 1]

1.63. http://www.verizonbusiness.com/Products/communications/prof-svcs/ [REST URL parameter 2]

1.64. http://www.verizonbusiness.com/Products/communications/prof-svcs/ [REST URL parameter 2]

1.65. http://www.verizonbusiness.com/Products/communications/prof-svcs/ [REST URL parameter 3]

1.66. http://www.verizonbusiness.com/Products/communications/prof-svcs/ [REST URL parameter 3]

1.67. http://www.verizonbusiness.com/Products/communications/traditional-telephony/ [REST URL parameter 1]

1.68. http://www.verizonbusiness.com/Products/communications/traditional-telephony/ [REST URL parameter 1]

1.69. http://www.verizonbusiness.com/Products/communications/traditional-telephony/ [REST URL parameter 2]

1.70. http://www.verizonbusiness.com/Products/communications/traditional-telephony/ [REST URL parameter 2]

1.71. http://www.verizonbusiness.com/Products/communications/traditional-telephony/ [REST URL parameter 3]

1.72. http://www.verizonbusiness.com/Products/communications/traditional-telephony/ [REST URL parameter 3]

1.73. http://www.verizonbusiness.com/Products/communications/ucc/ [REST URL parameter 1]

1.74. http://www.verizonbusiness.com/Products/communications/ucc/ [REST URL parameter 1]

1.75. http://www.verizonbusiness.com/Products/communications/ucc/ [REST URL parameter 2]

1.76. http://www.verizonbusiness.com/Products/communications/ucc/ [REST URL parameter 2]

1.77. http://www.verizonbusiness.com/Products/communications/ucc/ [REST URL parameter 3]

1.78. http://www.verizonbusiness.com/Products/communications/ucc/ [REST URL parameter 3]

1.79. http://www.verizonbusiness.com/Products/it/ [REST URL parameter 1]

1.80. http://www.verizonbusiness.com/Products/it/ [REST URL parameter 1]

1.81. http://www.verizonbusiness.com/Products/it/ [REST URL parameter 2]

1.82. http://www.verizonbusiness.com/Products/it/ [REST URL parameter 2]

1.83. http://www.verizonbusiness.com/Products/it/cloud-it/ [REST URL parameter 1]

1.84. http://www.verizonbusiness.com/Products/it/cloud-it/ [REST URL parameter 1]

1.85. http://www.verizonbusiness.com/Products/it/cloud-it/ [REST URL parameter 2]

1.86. http://www.verizonbusiness.com/Products/it/cloud-it/ [REST URL parameter 2]

1.87. http://www.verizonbusiness.com/Products/it/cloud-it/ [REST URL parameter 3]

1.88. http://www.verizonbusiness.com/Products/it/cloud-it/ [REST URL parameter 3]

1.89. http://www.verizonbusiness.com/Products/it/cloud-it/caas/ [REST URL parameter 1]

1.90. http://www.verizonbusiness.com/Products/it/cloud-it/caas/ [REST URL parameter 1]

1.91. http://www.verizonbusiness.com/Products/it/cloud-it/caas/ [REST URL parameter 2]

1.92. http://www.verizonbusiness.com/Products/it/cloud-it/caas/ [REST URL parameter 2]

1.93. http://www.verizonbusiness.com/Products/it/cloud-it/caas/ [REST URL parameter 3]

1.94. http://www.verizonbusiness.com/Products/it/cloud-it/caas/ [REST URL parameter 3]

1.95. http://www.verizonbusiness.com/Products/it/cloud-it/caas/ [REST URL parameter 4]

1.96. http://www.verizonbusiness.com/Products/it/cloud-it/caas/ [REST URL parameter 4]

1.97. http://www.verizonbusiness.com/Products/it/cloud-it/caas/security.xml [REST URL parameter 1]

1.98. http://www.verizonbusiness.com/Products/it/cloud-it/caas/security.xml [REST URL parameter 1]

1.99. http://www.verizonbusiness.com/Products/it/cloud-it/caas/security.xml [REST URL parameter 2]

1.100. http://www.verizonbusiness.com/Products/it/cloud-it/caas/security.xml [REST URL parameter 2]

1.101. http://www.verizonbusiness.com/Products/it/cloud-it/caas/security.xml [REST URL parameter 3]

1.102. http://www.verizonbusiness.com/Products/it/cloud-it/caas/security.xml [REST URL parameter 3]

1.103. http://www.verizonbusiness.com/Products/it/cloud-it/caas/security.xml [REST URL parameter 4]

1.104. http://www.verizonbusiness.com/Products/it/cloud-it/caas/security.xml [REST URL parameter 4]

1.105. http://www.verizonbusiness.com/Products/it/cloud-it/caas/security.xml [REST URL parameter 5]

1.106. http://www.verizonbusiness.com/Products/it/cloud-it/caas/security.xml [REST URL parameter 5]

1.107. http://www.verizonbusiness.com/Products/it/cloud-it/cloud-storage/ [REST URL parameter 1]

1.108. http://www.verizonbusiness.com/Products/it/cloud-it/cloud-storage/ [REST URL parameter 1]

1.109. http://www.verizonbusiness.com/Products/it/cloud-it/cloud-storage/ [REST URL parameter 2]

1.110. http://www.verizonbusiness.com/Products/it/cloud-it/cloud-storage/ [REST URL parameter 2]

1.111. http://www.verizonbusiness.com/Products/it/cloud-it/cloud-storage/ [REST URL parameter 3]

1.112. http://www.verizonbusiness.com/Products/it/cloud-it/cloud-storage/ [REST URL parameter 3]

1.113. http://www.verizonbusiness.com/Products/it/cloud-it/cloud-storage/ [REST URL parameter 4]

1.114. http://www.verizonbusiness.com/Products/it/cloud-it/cloud-storage/ [REST URL parameter 4]

1.115. http://www.verizonbusiness.com/Products/it/data-center/ [REST URL parameter 1]

1.116. http://www.verizonbusiness.com/Products/it/data-center/ [REST URL parameter 1]

1.117. http://www.verizonbusiness.com/Products/it/data-center/ [REST URL parameter 2]

1.118. http://www.verizonbusiness.com/Products/it/data-center/ [REST URL parameter 2]

1.119. http://www.verizonbusiness.com/Products/it/data-center/ [REST URL parameter 3]

1.120. http://www.verizonbusiness.com/Products/it/data-center/ [REST URL parameter 3]

1.121. http://www.verizonbusiness.com/Products/it/managed-apps/ [REST URL parameter 1]

1.122. http://www.verizonbusiness.com/Products/it/managed-apps/ [REST URL parameter 1]

1.123. http://www.verizonbusiness.com/Products/it/managed-apps/ [REST URL parameter 2]

1.124. http://www.verizonbusiness.com/Products/it/managed-apps/ [REST URL parameter 2]

1.125. http://www.verizonbusiness.com/Products/it/managed-apps/ [REST URL parameter 3]

1.126. http://www.verizonbusiness.com/Products/it/managed-apps/ [REST URL parameter 3]

1.127. http://www.verizonbusiness.com/Products/it/managed-apps/app-mgmt/ [REST URL parameter 1]

1.128. http://www.verizonbusiness.com/Products/it/managed-apps/app-mgmt/ [REST URL parameter 1]

1.129. http://www.verizonbusiness.com/Products/it/managed-apps/app-mgmt/ [REST URL parameter 2]

1.130. http://www.verizonbusiness.com/Products/it/managed-apps/app-mgmt/ [REST URL parameter 2]

1.131. http://www.verizonbusiness.com/Products/it/managed-apps/app-mgmt/ [REST URL parameter 3]

1.132. http://www.verizonbusiness.com/Products/it/managed-apps/app-mgmt/ [REST URL parameter 3]

1.133. http://www.verizonbusiness.com/Products/it/managed-apps/app-mgmt/ [REST URL parameter 4]

1.134. http://www.verizonbusiness.com/Products/it/managed-apps/app-mgmt/ [REST URL parameter 4]

1.135. http://www.verizonbusiness.com/Products/it/managed-apps/enterprise/ [REST URL parameter 1]

1.136. http://www.verizonbusiness.com/Products/it/managed-apps/enterprise/ [REST URL parameter 1]

1.137. http://www.verizonbusiness.com/Products/it/managed-apps/enterprise/ [REST URL parameter 2]

1.138. http://www.verizonbusiness.com/Products/it/managed-apps/enterprise/ [REST URL parameter 2]

1.139. http://www.verizonbusiness.com/Products/it/managed-apps/enterprise/ [REST URL parameter 3]

1.140. http://www.verizonbusiness.com/Products/it/managed-apps/enterprise/ [REST URL parameter 3]

1.141. http://www.verizonbusiness.com/Products/it/managed-apps/enterprise/ [REST URL parameter 4]

1.142. http://www.verizonbusiness.com/Products/it/managed-apps/enterprise/ [REST URL parameter 4]

1.143. http://www.verizonbusiness.com/Products/it/managed-it/ [REST URL parameter 1]

1.144. http://www.verizonbusiness.com/Products/it/managed-it/ [REST URL parameter 1]

1.145. http://www.verizonbusiness.com/Products/it/managed-it/ [REST URL parameter 2]

1.146. http://www.verizonbusiness.com/Products/it/managed-it/ [REST URL parameter 2]

1.147. http://www.verizonbusiness.com/Products/it/managed-it/ [REST URL parameter 3]

1.148. http://www.verizonbusiness.com/Products/it/managed-it/ [REST URL parameter 3]

1.149. http://www.verizonbusiness.com/Products/it/prof-svcs/ [REST URL parameter 1]

1.150. http://www.verizonbusiness.com/Products/it/prof-svcs/ [REST URL parameter 1]

1.151. http://www.verizonbusiness.com/Products/it/prof-svcs/ [REST URL parameter 2]

1.152. http://www.verizonbusiness.com/Products/it/prof-svcs/ [REST URL parameter 2]

1.153. http://www.verizonbusiness.com/Products/it/prof-svcs/ [REST URL parameter 3]

1.154. http://www.verizonbusiness.com/Products/it/prof-svcs/ [REST URL parameter 3]

1.155. http://www.verizonbusiness.com/Products/mobility/ [REST URL parameter 1]

1.156. http://www.verizonbusiness.com/Products/mobility/ [REST URL parameter 1]

1.157. http://www.verizonbusiness.com/Products/mobility/ [REST URL parameter 2]

1.158. http://www.verizonbusiness.com/Products/mobility/ [REST URL parameter 2]

1.159. http://www.verizonbusiness.com/Products/mobility/applications/ [REST URL parameter 1]

1.160. http://www.verizonbusiness.com/Products/mobility/applications/ [REST URL parameter 1]

1.161. http://www.verizonbusiness.com/Products/mobility/applications/ [REST URL parameter 2]

1.162. http://www.verizonbusiness.com/Products/mobility/applications/ [REST URL parameter 2]

1.163. http://www.verizonbusiness.com/Products/mobility/applications/ [REST URL parameter 3]

1.164. http://www.verizonbusiness.com/Products/mobility/applications/ [REST URL parameter 3]

1.165. http://www.verizonbusiness.com/Products/mobility/fixed-wireless/ [REST URL parameter 1]

1.166. http://www.verizonbusiness.com/Products/mobility/fixed-wireless/ [REST URL parameter 1]

1.167. http://www.verizonbusiness.com/Products/mobility/fixed-wireless/ [REST URL parameter 2]

1.168. http://www.verizonbusiness.com/Products/mobility/fixed-wireless/ [REST URL parameter 2]

1.169. http://www.verizonbusiness.com/Products/mobility/fixed-wireless/ [REST URL parameter 3]

1.170. http://www.verizonbusiness.com/Products/mobility/fixed-wireless/ [REST URL parameter 3]

1.171. http://www.verizonbusiness.com/Products/mobility/global-communications/ [REST URL parameter 1]

1.172. http://www.verizonbusiness.com/Products/mobility/global-communications/ [REST URL parameter 1]

1.173. http://www.verizonbusiness.com/Products/mobility/global-communications/ [REST URL parameter 2]

1.174. http://www.verizonbusiness.com/Products/mobility/global-communications/ [REST URL parameter 2]

1.175. http://www.verizonbusiness.com/Products/mobility/global-communications/ [REST URL parameter 3]

1.176. http://www.verizonbusiness.com/Products/mobility/global-communications/ [REST URL parameter 3]

1.177. http://www.verizonbusiness.com/Products/mobility/management/ [REST URL parameter 1]

1.178. http://www.verizonbusiness.com/Products/mobility/management/ [REST URL parameter 1]

1.179. http://www.verizonbusiness.com/Products/mobility/management/ [REST URL parameter 2]

1.180. http://www.verizonbusiness.com/Products/mobility/management/ [REST URL parameter 2]

1.181. http://www.verizonbusiness.com/Products/mobility/management/ [REST URL parameter 3]

1.182. http://www.verizonbusiness.com/Products/mobility/management/ [REST URL parameter 3]

1.183. http://www.verizonbusiness.com/Products/mobility/management/managed/ [REST URL parameter 1]

1.184. http://www.verizonbusiness.com/Products/mobility/management/managed/ [REST URL parameter 1]

1.185. http://www.verizonbusiness.com/Products/mobility/management/managed/ [REST URL parameter 2]

1.186. http://www.verizonbusiness.com/Products/mobility/management/managed/ [REST URL parameter 2]

1.187. http://www.verizonbusiness.com/Products/mobility/management/managed/ [REST URL parameter 3]

1.188. http://www.verizonbusiness.com/Products/mobility/management/managed/ [REST URL parameter 3]

1.189. http://www.verizonbusiness.com/Products/mobility/management/managed/ [REST URL parameter 4]

1.190. http://www.verizonbusiness.com/Products/mobility/management/managed/ [REST URL parameter 4]

1.191. http://www.verizonbusiness.com/Products/mobility/mobile-email/ [REST URL parameter 1]

1.192. http://www.verizonbusiness.com/Products/mobility/mobile-email/ [REST URL parameter 1]

1.193. http://www.verizonbusiness.com/Products/mobility/mobile-email/ [REST URL parameter 2]

1.194. http://www.verizonbusiness.com/Products/mobility/mobile-email/ [REST URL parameter 2]

1.195. http://www.verizonbusiness.com/Products/mobility/mobile-email/ [REST URL parameter 3]

1.196. http://www.verizonbusiness.com/Products/mobility/mobile-email/ [REST URL parameter 3]

1.197. http://www.verizonbusiness.com/Products/mobility/mobile-internet/ [REST URL parameter 1]

1.198. http://www.verizonbusiness.com/Products/mobility/mobile-internet/ [REST URL parameter 1]

1.199. http://www.verizonbusiness.com/Products/mobility/mobile-internet/ [REST URL parameter 2]

1.200. http://www.verizonbusiness.com/Products/mobility/mobile-internet/ [REST URL parameter 2]

1.201. http://www.verizonbusiness.com/Products/mobility/mobile-internet/ [REST URL parameter 3]

1.202. http://www.verizonbusiness.com/Products/mobility/mobile-internet/ [REST URL parameter 3]

1.203. http://www.verizonbusiness.com/Products/mobility/program-management/ [REST URL parameter 1]

1.204. http://www.verizonbusiness.com/Products/mobility/program-management/ [REST URL parameter 1]

1.205. http://www.verizonbusiness.com/Products/mobility/program-management/ [REST URL parameter 2]

1.206. http://www.verizonbusiness.com/Products/mobility/program-management/ [REST URL parameter 2]

1.207. http://www.verizonbusiness.com/Products/mobility/program-management/ [REST URL parameter 3]

1.208. http://www.verizonbusiness.com/Products/mobility/program-management/ [REST URL parameter 3]

1.209. http://www.verizonbusiness.com/Products/mobility/voice-messaging/ [REST URL parameter 1]

1.210. http://www.verizonbusiness.com/Products/mobility/voice-messaging/ [REST URL parameter 1]

1.211. http://www.verizonbusiness.com/Products/mobility/voice-messaging/ [REST URL parameter 2]

1.212. http://www.verizonbusiness.com/Products/mobility/voice-messaging/ [REST URL parameter 2]

1.213. http://www.verizonbusiness.com/Products/mobility/voice-messaging/ [REST URL parameter 3]

1.214. http://www.verizonbusiness.com/Products/mobility/voice-messaging/ [REST URL parameter 3]

1.215. http://www.verizonbusiness.com/Products/mobility/wireless-devices/ [REST URL parameter 1]

1.216. http://www.verizonbusiness.com/Products/mobility/wireless-devices/ [REST URL parameter 1]

1.217. http://www.verizonbusiness.com/Products/mobility/wireless-devices/ [REST URL parameter 2]

1.218. http://www.verizonbusiness.com/Products/mobility/wireless-devices/ [REST URL parameter 2]

1.219. http://www.verizonbusiness.com/Products/mobility/wireless-devices/ [REST URL parameter 3]

1.220. http://www.verizonbusiness.com/Products/mobility/wireless-devices/ [REST URL parameter 3]

1.221. http://www.verizonbusiness.com/Products/networking/ [REST URL parameter 1]

1.222. http://www.verizonbusiness.com/Products/networking/ [REST URL parameter 1]

1.223. http://www.verizonbusiness.com/Products/networking/ [REST URL parameter 2]

1.224. http://www.verizonbusiness.com/Products/networking/ [REST URL parameter 2]

1.225. http://www.verizonbusiness.com/Products/networking/access/ [REST URL parameter 1]

1.226. http://www.verizonbusiness.com/Products/networking/access/ [REST URL parameter 1]

1.227. http://www.verizonbusiness.com/Products/networking/access/ [REST URL parameter 2]

1.228. http://www.verizonbusiness.com/Products/networking/access/ [REST URL parameter 2]

1.229. http://www.verizonbusiness.com/Products/networking/access/ [REST URL parameter 3]

1.230. http://www.verizonbusiness.com/Products/networking/access/ [REST URL parameter 3]

1.231. http://www.verizonbusiness.com/Products/networking/internet/ [REST URL parameter 1]

1.232. http://www.verizonbusiness.com/Products/networking/internet/ [REST URL parameter 1]

1.233. http://www.verizonbusiness.com/Products/networking/internet/ [REST URL parameter 2]

1.234. http://www.verizonbusiness.com/Products/networking/internet/ [REST URL parameter 2]

1.235. http://www.verizonbusiness.com/Products/networking/internet/ [REST URL parameter 3]

1.236. http://www.verizonbusiness.com/Products/networking/internet/ [REST URL parameter 3]

1.237. http://www.verizonbusiness.com/Products/networking/managed [REST URL parameter 1]

1.238. http://www.verizonbusiness.com/Products/networking/managed [REST URL parameter 1]

1.239. http://www.verizonbusiness.com/Products/networking/managed [REST URL parameter 2]

1.240. http://www.verizonbusiness.com/Products/networking/managed [REST URL parameter 2]

1.241. http://www.verizonbusiness.com/Products/networking/managed [REST URL parameter 3]

1.242. http://www.verizonbusiness.com/Products/networking/managed [REST URL parameter 3]

1.243. http://www.verizonbusiness.com/Products/networking/managed/ [REST URL parameter 1]

1.244. http://www.verizonbusiness.com/Products/networking/managed/ [REST URL parameter 1]

1.245. http://www.verizonbusiness.com/Products/networking/managed/ [REST URL parameter 2]

1.246. http://www.verizonbusiness.com/Products/networking/managed/ [REST URL parameter 2]

1.247. http://www.verizonbusiness.com/Products/networking/managed/ [REST URL parameter 3]

1.248. http://www.verizonbusiness.com/Products/networking/managed/ [REST URL parameter 3]

1.249. http://www.verizonbusiness.com/Products/networking/point-to-point/ [REST URL parameter 1]

1.250. http://www.verizonbusiness.com/Products/networking/point-to-point/ [REST URL parameter 1]

1.251. http://www.verizonbusiness.com/Products/networking/point-to-point/ [REST URL parameter 2]

1.252. http://www.verizonbusiness.com/Products/networking/point-to-point/ [REST URL parameter 2]

1.253. http://www.verizonbusiness.com/Products/networking/point-to-point/ [REST URL parameter 3]

1.254. http://www.verizonbusiness.com/Products/networking/point-to-point/ [REST URL parameter 3]

1.255. http://www.verizonbusiness.com/Products/networking/private/ [REST URL parameter 1]

1.256. http://www.verizonbusiness.com/Products/networking/private/ [REST URL parameter 1]

1.257. http://www.verizonbusiness.com/Products/networking/private/ [REST URL parameter 2]

1.258. http://www.verizonbusiness.com/Products/networking/private/ [REST URL parameter 2]

1.259. http://www.verizonbusiness.com/Products/networking/private/ [REST URL parameter 3]

1.260. http://www.verizonbusiness.com/Products/networking/private/ [REST URL parameter 3]

1.261. http://www.verizonbusiness.com/Products/networking/prof-svcs/ [REST URL parameter 1]

1.262. http://www.verizonbusiness.com/Products/networking/prof-svcs/ [REST URL parameter 1]

1.263. http://www.verizonbusiness.com/Products/networking/prof-svcs/ [REST URL parameter 2]

1.264. http://www.verizonbusiness.com/Products/networking/prof-svcs/ [REST URL parameter 2]

1.265. http://www.verizonbusiness.com/Products/networking/prof-svcs/ [REST URL parameter 3]

1.266. http://www.verizonbusiness.com/Products/networking/prof-svcs/ [REST URL parameter 3]

1.267. http://www.verizonbusiness.com/Products/security/ [REST URL parameter 1]

1.268. http://www.verizonbusiness.com/Products/security/ [REST URL parameter 1]

1.269. http://www.verizonbusiness.com/Products/security/ [REST URL parameter 2]

1.270. http://www.verizonbusiness.com/Products/security/ [REST URL parameter 2]

1.271. http://www.verizonbusiness.com/Products/security/compliance/ [REST URL parameter 1]

1.272. http://www.verizonbusiness.com/Products/security/compliance/ [REST URL parameter 1]

1.273. http://www.verizonbusiness.com/Products/security/compliance/ [REST URL parameter 2]

1.274. http://www.verizonbusiness.com/Products/security/compliance/ [REST URL parameter 2]

1.275. http://www.verizonbusiness.com/Products/security/compliance/ [REST URL parameter 3]

1.276. http://www.verizonbusiness.com/Products/security/compliance/ [REST URL parameter 3]

1.277. http://www.verizonbusiness.com/Products/security/dbir/ [REST URL parameter 1]

1.278. http://www.verizonbusiness.com/Products/security/dbir/ [REST URL parameter 1]

1.279. http://www.verizonbusiness.com/Products/security/dbir/ [REST URL parameter 2]

1.280. http://www.verizonbusiness.com/Products/security/dbir/ [REST URL parameter 2]

1.281. http://www.verizonbusiness.com/Products/security/dbir/ [REST URL parameter 3]

1.282. http://www.verizonbusiness.com/Products/security/dbir/ [REST URL parameter 3]

1.283. http://www.verizonbusiness.com/Products/security/icsa-labs/ [REST URL parameter 1]

1.284. http://www.verizonbusiness.com/Products/security/icsa-labs/ [REST URL parameter 1]

1.285. http://www.verizonbusiness.com/Products/security/icsa-labs/ [REST URL parameter 2]

1.286. http://www.verizonbusiness.com/Products/security/icsa-labs/ [REST URL parameter 2]

1.287. http://www.verizonbusiness.com/Products/security/icsa-labs/ [REST URL parameter 3]

1.288. http://www.verizonbusiness.com/Products/security/icsa-labs/ [REST URL parameter 3]

1.289. http://www.verizonbusiness.com/Products/security/identity/ [REST URL parameter 1]

1.290. http://www.verizonbusiness.com/Products/security/identity/ [REST URL parameter 1]

1.291. http://www.verizonbusiness.com/Products/security/identity/ [REST URL parameter 2]

1.292. http://www.verizonbusiness.com/Products/security/identity/ [REST URL parameter 2]

1.293. http://www.verizonbusiness.com/Products/security/identity/ [REST URL parameter 3]

1.294. http://www.verizonbusiness.com/Products/security/identity/ [REST URL parameter 3]

1.295. http://www.verizonbusiness.com/Products/security/managed/ [REST URL parameter 1]

1.296. http://www.verizonbusiness.com/Products/security/managed/ [REST URL parameter 1]

1.297. http://www.verizonbusiness.com/Products/security/managed/ [REST URL parameter 2]

1.298. http://www.verizonbusiness.com/Products/security/managed/ [REST URL parameter 2]

1.299. http://www.verizonbusiness.com/Products/security/managed/ [REST URL parameter 3]

1.300. http://www.verizonbusiness.com/Products/security/managed/ [REST URL parameter 3]

1.301. http://www.verizonbusiness.com/Products/security/network-based/ [REST URL parameter 1]

1.302. http://www.verizonbusiness.com/Products/security/network-based/ [REST URL parameter 1]

1.303. http://www.verizonbusiness.com/Products/security/network-based/ [REST URL parameter 2]

1.304. http://www.verizonbusiness.com/Products/security/network-based/ [REST URL parameter 2]

1.305. http://www.verizonbusiness.com/Products/security/network-based/ [REST URL parameter 3]

1.306. http://www.verizonbusiness.com/Products/security/network-based/ [REST URL parameter 3]

1.307. http://www.verizonbusiness.com/Products/security/prof-svcs/ [REST URL parameter 1]

1.308. http://www.verizonbusiness.com/Products/security/prof-svcs/ [REST URL parameter 1]

1.309. http://www.verizonbusiness.com/Products/security/prof-svcs/ [REST URL parameter 2]

1.310. http://www.verizonbusiness.com/Products/security/prof-svcs/ [REST URL parameter 2]

1.311. http://www.verizonbusiness.com/Products/security/prof-svcs/ [REST URL parameter 3]

1.312. http://www.verizonbusiness.com/Products/security/prof-svcs/ [REST URL parameter 3]

1.313. http://www.verizonbusiness.com/Products/security/risk/ [REST URL parameter 1]

1.314. http://www.verizonbusiness.com/Products/security/risk/ [REST URL parameter 1]

1.315. http://www.verizonbusiness.com/Products/security/risk/ [REST URL parameter 2]

1.316. http://www.verizonbusiness.com/Products/security/risk/ [REST URL parameter 2]

1.317. http://www.verizonbusiness.com/Products/security/risk/ [REST URL parameter 3]

1.318. http://www.verizonbusiness.com/Products/security/risk/ [REST URL parameter 3]

1.319. http://www.verizonbusiness.com/about/ [REST URL parameter 1]

1.320. http://www.verizonbusiness.com/about/ [REST URL parameter 1]

1.321. http://www.verizonbusiness.com/about/company/ [REST URL parameter 1]

1.322. http://www.verizonbusiness.com/about/company/ [REST URL parameter 1]

1.323. http://www.verizonbusiness.com/about/company/ [REST URL parameter 2]

1.324. http://www.verizonbusiness.com/about/company/ [REST URL parameter 2]

1.325. http://www.verizonbusiness.com/about/company/executives/ [REST URL parameter 1]

1.326. http://www.verizonbusiness.com/about/company/executives/ [REST URL parameter 1]

1.327. http://www.verizonbusiness.com/about/company/executives/ [REST URL parameter 2]

1.328. http://www.verizonbusiness.com/about/company/executives/ [REST URL parameter 2]

1.329. http://www.verizonbusiness.com/about/company/executives/ [REST URL parameter 3]

1.330. http://www.verizonbusiness.com/about/company/executives/ [REST URL parameter 3]

1.331. http://www.verizonbusiness.com/about/environment/ [REST URL parameter 1]

1.332. http://www.verizonbusiness.com/about/environment/ [REST URL parameter 1]

1.333. http://www.verizonbusiness.com/about/environment/ [REST URL parameter 2]

1.334. http://www.verizonbusiness.com/about/environment/ [REST URL parameter 2]

1.335. http://www.verizonbusiness.com/about/events/ [REST URL parameter 1]

1.336. http://www.verizonbusiness.com/about/events/ [REST URL parameter 1]

1.337. http://www.verizonbusiness.com/about/events/ [REST URL parameter 2]

1.338. http://www.verizonbusiness.com/about/events/ [REST URL parameter 2]

1.339. http://www.verizonbusiness.com/about/ipinnovation/ [REST URL parameter 1]

1.340. http://www.verizonbusiness.com/about/ipinnovation/ [REST URL parameter 1]

1.341. http://www.verizonbusiness.com/about/ipinnovation/ [REST URL parameter 2]

1.342. http://www.verizonbusiness.com/about/ipinnovation/ [REST URL parameter 2]

1.343. http://www.verizonbusiness.com/about/network/ [REST URL parameter 1]

1.344. http://www.verizonbusiness.com/about/network/ [REST URL parameter 1]

1.345. http://www.verizonbusiness.com/about/network/ [REST URL parameter 2]

1.346. http://www.verizonbusiness.com/about/network/ [REST URL parameter 2]

1.347. http://www.verizonbusiness.com/about/news/ [REST URL parameter 1]

1.348. http://www.verizonbusiness.com/about/news/ [REST URL parameter 1]

1.349. http://www.verizonbusiness.com/about/news/ [REST URL parameter 2]

1.350. http://www.verizonbusiness.com/about/news/ [REST URL parameter 2]

1.351. http://www.verizonbusiness.com/about/news/fast/ [REST URL parameter 1]

1.352. http://www.verizonbusiness.com/about/news/fast/ [REST URL parameter 1]

1.353. http://www.verizonbusiness.com/about/news/fast/ [REST URL parameter 2]

1.354. http://www.verizonbusiness.com/about/news/fast/ [REST URL parameter 2]

1.355. http://www.verizonbusiness.com/about/news/fast/ [REST URL parameter 3]

1.356. http://www.verizonbusiness.com/about/news/fast/ [REST URL parameter 3]

1.357. http://www.verizonbusiness.com/about/news/globalarchive/ [REST URL parameter 1]

1.358. http://www.verizonbusiness.com/about/news/globalarchive/ [REST URL parameter 1]

1.359. http://www.verizonbusiness.com/about/news/globalarchive/ [REST URL parameter 2]

1.360. http://www.verizonbusiness.com/about/news/globalarchive/ [REST URL parameter 2]

1.361. http://www.verizonbusiness.com/about/news/globalarchive/ [REST URL parameter 3]

1.362. http://www.verizonbusiness.com/about/news/globalarchive/ [REST URL parameter 3]

1.363. http://www.verizonbusiness.com/about/news/media/ [REST URL parameter 1]

1.364. http://www.verizonbusiness.com/about/news/media/ [REST URL parameter 1]

1.365. http://www.verizonbusiness.com/about/news/media/ [REST URL parameter 2]

1.366. http://www.verizonbusiness.com/about/news/media/ [REST URL parameter 2]

1.367. http://www.verizonbusiness.com/about/news/media/ [REST URL parameter 3]

1.368. http://www.verizonbusiness.com/about/news/media/ [REST URL parameter 3]

1.369. http://www.verizonbusiness.com/about/news/network/ [REST URL parameter 1]

1.370. http://www.verizonbusiness.com/about/news/network/ [REST URL parameter 1]

1.371. http://www.verizonbusiness.com/about/news/network/ [REST URL parameter 2]

1.372. http://www.verizonbusiness.com/about/news/network/ [REST URL parameter 2]

1.373. http://www.verizonbusiness.com/about/news/network/ [REST URL parameter 3]

1.374. http://www.verizonbusiness.com/about/news/network/ [REST URL parameter 3]

1.375. http://www.verizonbusiness.com/about/news/podcasts/ [REST URL parameter 1]

1.376. http://www.verizonbusiness.com/about/news/podcasts/ [REST URL parameter 1]

1.377. http://www.verizonbusiness.com/about/news/podcasts/ [REST URL parameter 2]

1.378. http://www.verizonbusiness.com/about/news/podcasts/ [REST URL parameter 2]

1.379. http://www.verizonbusiness.com/about/news/podcasts/ [REST URL parameter 3]

1.380. http://www.verizonbusiness.com/about/news/podcasts/ [REST URL parameter 3]

1.381. http://www.verizonbusiness.com/about/news/pr-25633-en-Verizon+Business+Offers+New+Insight+Into+Enterprise+Security+Risk+Management.xml [REST URL parameter 1]

1.382. http://www.verizonbusiness.com/about/news/pr-25633-en-Verizon+Business+Offers+New+Insight+Into+Enterprise+Security+Risk+Management.xml [REST URL parameter 1]

1.383. http://www.verizonbusiness.com/about/news/pr-25633-en-Verizon+Business+Offers+New+Insight+Into+Enterprise+Security+Risk+Management.xml [REST URL parameter 2]

1.384. http://www.verizonbusiness.com/about/news/pr-25633-en-Verizon+Business+Offers+New+Insight+Into+Enterprise+Security+Risk+Management.xml [REST URL parameter 2]

1.385. http://www.verizonbusiness.com/about/news/pr-25633-en-Verizon+Business+Offers+New+Insight+Into+Enterprise+Security+Risk+Management.xml [REST URL parameter 3]

1.386. http://www.verizonbusiness.com/about/news/pr-25633-en-Verizon+Business+Offers+New+Insight+Into+Enterprise+Security+Risk+Management.xml [REST URL parameter 3]

1.387. http://www.verizonbusiness.com/about/news/pr-25634-en-Verizon%20Business%20Earns%20Telemark┐s%20`World%20Class┐%20Ranking%20Among%20Information%20Communications%20Technology%20Providers.xml [REST URL parameter 1]

1.388. http://www.verizonbusiness.com/about/news/pr-25634-en-Verizon%20Business%20Earns%20Telemark┐s%20`World%20Class┐%20Ranking%20Among%20Information%20Communications%20Technology%20Providers.xml [REST URL parameter 1]

1.389. http://www.verizonbusiness.com/about/news/pr-25634-en-Verizon%20Business%20Earns%20Telemark┐s%20`World%20Class┐%20Ranking%20Among%20Information%20Communications%20Technology%20Providers.xml [REST URL parameter 2]

1.390. http://www.verizonbusiness.com/about/news/pr-25634-en-Verizon%20Business%20Earns%20Telemark┐s%20`World%20Class┐%20Ranking%20Among%20Information%20Communications%20Technology%20Providers.xml [REST URL parameter 2]

1.391. http://www.verizonbusiness.com/about/news/pr-25634-en-Verizon%20Business%20Earns%20Telemark┐s%20`World%20Class┐%20Ranking%20Among%20Information%20Communications%20Technology%20Providers.xml [REST URL parameter 3]

1.392. http://www.verizonbusiness.com/about/news/pr-25634-en-Verizon%20Business%20Earns%20Telemark┐s%20`World%20Class┐%20Ranking%20Among%20Information%20Communications%20Technology%20Providers.xml [REST URL parameter 3]

1.393. http://www.verizonbusiness.com/about/news/pr-25635-en-Bob+Toohey+Named+President+of+Verizon's+Global+Business+Unit.xml [REST URL parameter 1]

1.394. http://www.verizonbusiness.com/about/news/pr-25635-en-Bob+Toohey+Named+President+of+Verizon's+Global+Business+Unit.xml [REST URL parameter 1]

1.395. http://www.verizonbusiness.com/about/news/pr-25635-en-Bob+Toohey+Named+President+of+Verizon's+Global+Business+Unit.xml [REST URL parameter 2]

1.396. http://www.verizonbusiness.com/about/news/pr-25635-en-Bob+Toohey+Named+President+of+Verizon's+Global+Business+Unit.xml [REST URL parameter 2]

1.397. http://www.verizonbusiness.com/about/news/pr-25635-en-Bob+Toohey+Named+President+of+Verizon's+Global+Business+Unit.xml [REST URL parameter 3]

1.398. http://www.verizonbusiness.com/about/news/pr-25635-en-Bob+Toohey+Named+President+of+Verizon's+Global+Business+Unit.xml [REST URL parameter 3]

1.399. http://www.verizonbusiness.com/about/news/pr-25636-en-Verizon+Business+Helps+Burberry+Deliver+Global+Fashion+Experience.xml [REST URL parameter 1]

1.400. http://www.verizonbusiness.com/about/news/pr-25636-en-Verizon+Business+Helps+Burberry+Deliver+Global+Fashion+Experience.xml [REST URL parameter 1]

1.401. http://www.verizonbusiness.com/about/news/pr-25636-en-Verizon+Business+Helps+Burberry+Deliver+Global+Fashion+Experience.xml [REST URL parameter 2]

1.402. http://www.verizonbusiness.com/about/news/pr-25636-en-Verizon+Business+Helps+Burberry+Deliver+Global+Fashion+Experience.xml [REST URL parameter 2]

1.403. http://www.verizonbusiness.com/about/news/pr-25636-en-Verizon+Business+Helps+Burberry+Deliver+Global+Fashion+Experience.xml [REST URL parameter 3]

1.404. http://www.verizonbusiness.com/about/news/pr-25636-en-Verizon+Business+Helps+Burberry+Deliver+Global+Fashion+Experience.xml [REST URL parameter 3]

1.405. http://www.verizonbusiness.com/about/news/pr-25637-en-Verizon+Hosts+Nov.+9+Webinar+to+Present+Findings+of+2010+Payment+Card+Industry+Compliance+Report.xml [REST URL parameter 1]

1.406. http://www.verizonbusiness.com/about/news/pr-25637-en-Verizon+Hosts+Nov.+9+Webinar+to+Present+Findings+of+2010+Payment+Card+Industry+Compliance+Report.xml [REST URL parameter 1]

1.407. http://www.verizonbusiness.com/about/news/pr-25637-en-Verizon+Hosts+Nov.+9+Webinar+to+Present+Findings+of+2010+Payment+Card+Industry+Compliance+Report.xml [REST URL parameter 2]

1.408. http://www.verizonbusiness.com/about/news/pr-25637-en-Verizon+Hosts+Nov.+9+Webinar+to+Present+Findings+of+2010+Payment+Card+Industry+Compliance+Report.xml [REST URL parameter 2]

1.409. http://www.verizonbusiness.com/about/news/pr-25637-en-Verizon+Hosts+Nov.+9+Webinar+to+Present+Findings+of+2010+Payment+Card+Industry+Compliance+Report.xml [REST URL parameter 3]

1.410. http://www.verizonbusiness.com/about/news/pr-25637-en-Verizon+Hosts+Nov.+9+Webinar+to+Present+Findings+of+2010+Payment+Card+Industry+Compliance+Report.xml [REST URL parameter 3]

1.411. http://www.verizonbusiness.com/about/news/pr-25638-en-National+Grid+Charges+Verizon+Business+With+Transformation+of+Electricity+and+Gas+Company's+Global+Communications+Environment.xml [REST URL parameter 1]

1.412. http://www.verizonbusiness.com/about/news/pr-25638-en-National+Grid+Charges+Verizon+Business+With+Transformation+of+Electricity+and+Gas+Company's+Global+Communications+Environment.xml [REST URL parameter 1]

1.413. http://www.verizonbusiness.com/about/news/pr-25638-en-National+Grid+Charges+Verizon+Business+With+Transformation+of+Electricity+and+Gas+Company's+Global+Communications+Environment.xml [REST URL parameter 2]

1.414. http://www.verizonbusiness.com/about/news/pr-25638-en-National+Grid+Charges+Verizon+Business+With+Transformation+of+Electricity+and+Gas+Company's+Global+Communications+Environment.xml [REST URL parameter 2]

1.415. http://www.verizonbusiness.com/about/news/pr-25638-en-National+Grid+Charges+Verizon+Business+With+Transformation+of+Electricity+and+Gas+Company's+Global+Communications+Environment.xml [REST URL parameter 3]

1.416. http://www.verizonbusiness.com/about/news/pr-25638-en-National+Grid+Charges+Verizon+Business+With+Transformation+of+Electricity+and+Gas+Company's+Global+Communications+Environment.xml [REST URL parameter 3]

1.417. http://www.verizonbusiness.com/about/news/pr-25639-en-IDC+MarketScape+Recognizes+Verizon+Business+as+a+Leader+in+Asia+Pacific+Telecommunications+Market.xml [REST URL parameter 1]

1.418. http://www.verizonbusiness.com/about/news/pr-25639-en-IDC+MarketScape+Recognizes+Verizon+Business+as+a+Leader+in+Asia+Pacific+Telecommunications+Market.xml [REST URL parameter 1]

1.419. http://www.verizonbusiness.com/about/news/pr-25639-en-IDC+MarketScape+Recognizes+Verizon+Business+as+a+Leader+in+Asia+Pacific+Telecommunications+Market.xml [REST URL parameter 2]

1.420. http://www.verizonbusiness.com/about/news/pr-25639-en-IDC+MarketScape+Recognizes+Verizon+Business+as+a+Leader+in+Asia+Pacific+Telecommunications+Market.xml [REST URL parameter 2]

1.421. http://www.verizonbusiness.com/about/news/pr-25639-en-IDC+MarketScape+Recognizes+Verizon+Business+as+a+Leader+in+Asia+Pacific+Telecommunications+Market.xml [REST URL parameter 3]

1.422. http://www.verizonbusiness.com/about/news/pr-25639-en-IDC+MarketScape+Recognizes+Verizon+Business+as+a+Leader+in+Asia+Pacific+Telecommunications+Market.xml [REST URL parameter 3]

1.423. http://www.verizonbusiness.com/about/news/pr-25640-en-Verizon+to+Deploy+Industry+Leading+100G+Ethernet+on+Selected+Route+of+Its+European+Long+Haul+Backbone.xml [REST URL parameter 1]

1.424. http://www.verizonbusiness.com/about/news/pr-25640-en-Verizon+to+Deploy+Industry+Leading+100G+Ethernet+on+Selected+Route+of+Its+European+Long+Haul+Backbone.xml [REST URL parameter 1]

1.425. http://www.verizonbusiness.com/about/news/pr-25640-en-Verizon+to+Deploy+Industry+Leading+100G+Ethernet+on+Selected+Route+of+Its+European+Long+Haul+Backbone.xml [REST URL parameter 2]

1.426. http://www.verizonbusiness.com/about/news/pr-25640-en-Verizon+to+Deploy+Industry+Leading+100G+Ethernet+on+Selected+Route+of+Its+European+Long+Haul+Backbone.xml [REST URL parameter 2]

1.427. http://www.verizonbusiness.com/about/news/pr-25640-en-Verizon+to+Deploy+Industry+Leading+100G+Ethernet+on+Selected+Route+of+Its+European+Long+Haul+Backbone.xml [REST URL parameter 3]

1.428. http://www.verizonbusiness.com/about/news/pr-25640-en-Verizon+to+Deploy+Industry+Leading+100G+Ethernet+on+Selected+Route+of+Its+European+Long+Haul+Backbone.xml [REST URL parameter 3]

1.429. http://www.verizonbusiness.com/about/news/pr-25641-en-Verizon+Unveils+VERIS+Information+Sharing+Website+to+Advance+Knowledge+of+Security+Incidents.xml [REST URL parameter 1]

1.430. http://www.verizonbusiness.com/about/news/pr-25641-en-Verizon+Unveils+VERIS+Information+Sharing+Website+to+Advance+Knowledge+of+Security+Incidents.xml [REST URL parameter 1]

1.431. http://www.verizonbusiness.com/about/news/pr-25641-en-Verizon+Unveils+VERIS+Information+Sharing+Website+to+Advance+Knowledge+of+Security+Incidents.xml [REST URL parameter 2]

1.432. http://www.verizonbusiness.com/about/news/pr-25641-en-Verizon+Unveils+VERIS+Information+Sharing+Website+to+Advance+Knowledge+of+Security+Incidents.xml [REST URL parameter 2]

1.433. http://www.verizonbusiness.com/about/news/pr-25641-en-Verizon+Unveils+VERIS+Information+Sharing+Website+to+Advance+Knowledge+of+Security+Incidents.xml [REST URL parameter 3]

1.434. http://www.verizonbusiness.com/about/news/pr-25641-en-Verizon+Unveils+VERIS+Information+Sharing+Website+to+Advance+Knowledge+of+Security+Incidents.xml [REST URL parameter 3]

1.435. http://www.verizonbusiness.com/about/news/pr-25642-en-Verizon+Introduces+New+Mobile+Services+Enablement+Platform+to+Help+Businesses+Develop,+Mobilize,+Manage+Applications+Across+a+Global+Enterprise+.xml [REST URL parameter 1]

1.436. http://www.verizonbusiness.com/about/news/pr-25642-en-Verizon+Introduces+New+Mobile+Services+Enablement+Platform+to+Help+Businesses+Develop,+Mobilize,+Manage+Applications+Across+a+Global+Enterprise+.xml [REST URL parameter 1]

1.437. http://www.verizonbusiness.com/about/news/pr-25642-en-Verizon+Introduces+New+Mobile+Services+Enablement+Platform+to+Help+Businesses+Develop,+Mobilize,+Manage+Applications+Across+a+Global+Enterprise+.xml [REST URL parameter 2]

1.438. http://www.verizonbusiness.com/about/news/pr-25642-en-Verizon+Introduces+New+Mobile+Services+Enablement+Platform+to+Help+Businesses+Develop,+Mobilize,+Manage+Applications+Across+a+Global+Enterprise+.xml [REST URL parameter 2]

1.439. http://www.verizonbusiness.com/about/news/pr-25642-en-Verizon+Introduces+New+Mobile+Services+Enablement+Platform+to+Help+Businesses+Develop,+Mobilize,+Manage+Applications+Across+a+Global+Enterprise+.xml [REST URL parameter 3]

1.440. http://www.verizonbusiness.com/about/news/pr-25642-en-Verizon+Introduces+New+Mobile+Services+Enablement+Platform+to+Help+Businesses+Develop,+Mobilize,+Manage+Applications+Across+a+Global+Enterprise+.xml [REST URL parameter 3]

1.441. http://www.verizonbusiness.com/about/news/pr-25643-en-Cloud+Strategies,+Economy+Continue+to+Underscore+Top+Technology+Trends+for+2011.xml [REST URL parameter 1]

1.442. http://www.verizonbusiness.com/about/news/pr-25643-en-Cloud+Strategies,+Economy+Continue+to+Underscore+Top+Technology+Trends+for+2011.xml [REST URL parameter 1]

1.443. http://www.verizonbusiness.com/about/news/pr-25643-en-Cloud+Strategies,+Economy+Continue+to+Underscore+Top+Technology+Trends+for+2011.xml [REST URL parameter 2]

1.444. http://www.verizonbusiness.com/about/news/pr-25643-en-Cloud+Strategies,+Economy+Continue+to+Underscore+Top+Technology+Trends+for+2011.xml [REST URL parameter 2]

1.445. http://www.verizonbusiness.com/about/news/pr-25643-en-Cloud+Strategies,+Economy+Continue+to+Underscore+Top+Technology+Trends+for+2011.xml [REST URL parameter 3]

1.446. http://www.verizonbusiness.com/about/news/pr-25643-en-Cloud+Strategies,+Economy+Continue+to+Underscore+Top+Technology+Trends+for+2011.xml [REST URL parameter 3]

1.447. http://www.verizonbusiness.com/about/news/pr-25644-en-Verizon+Global+Wholesale+Wins+Best+North+American+Wholesale+Offering+Award.xml [REST URL parameter 1]

1.448. http://www.verizonbusiness.com/about/news/pr-25644-en-Verizon+Global+Wholesale+Wins+Best+North+American+Wholesale+Offering+Award.xml [REST URL parameter 1]

1.449. http://www.verizonbusiness.com/about/news/pr-25644-en-Verizon+Global+Wholesale+Wins+Best+North+American+Wholesale+Offering+Award.xml [REST URL parameter 2]

1.450. http://www.verizonbusiness.com/about/news/pr-25644-en-Verizon+Global+Wholesale+Wins+Best+North+American+Wholesale+Offering+Award.xml [REST URL parameter 2]

1.451. http://www.verizonbusiness.com/about/news/pr-25644-en-Verizon+Global+Wholesale+Wins+Best+North+American+Wholesale+Offering+Award.xml [REST URL parameter 3]

1.452. http://www.verizonbusiness.com/about/news/pr-25644-en-Verizon+Global+Wholesale+Wins+Best+North+American+Wholesale+Offering+Award.xml [REST URL parameter 3]

1.453. http://www.verizonbusiness.com/about/news/presskits/ [REST URL parameter 1]

1.454. http://www.verizonbusiness.com/about/news/presskits/ [REST URL parameter 1]

1.455. http://www.verizonbusiness.com/about/news/presskits/ [REST URL parameter 2]

1.456. http://www.verizonbusiness.com/about/news/presskits/ [REST URL parameter 2]

1.457. http://www.verizonbusiness.com/about/news/presskits/ [REST URL parameter 3]

1.458. http://www.verizonbusiness.com/about/news/presskits/ [REST URL parameter 3]

1.459. http://www.verizonbusiness.com/about/news/social/ [REST URL parameter 1]

1.460. http://www.verizonbusiness.com/about/news/social/ [REST URL parameter 1]

1.461. http://www.verizonbusiness.com/about/news/social/ [REST URL parameter 2]

1.462. http://www.verizonbusiness.com/about/news/social/ [REST URL parameter 2]

1.463. http://www.verizonbusiness.com/about/news/social/ [REST URL parameter 3]

1.464. http://www.verizonbusiness.com/about/news/social/ [REST URL parameter 3]

1.465. http://www.verizonbusiness.com/about/socialmedia/ [REST URL parameter 1]

1.466. http://www.verizonbusiness.com/about/socialmedia/ [REST URL parameter 1]

1.467. http://www.verizonbusiness.com/about/socialmedia/ [REST URL parameter 2]

1.468. http://www.verizonbusiness.com/about/socialmedia/ [REST URL parameter 2]

1.469. http://www.verizonbusiness.com/ar/ [REST URL parameter 1]

1.470. http://www.verizonbusiness.com/ar/ [REST URL parameter 1]

1.471. http://www.verizonbusiness.com/at/ [REST URL parameter 1]

1.472. http://www.verizonbusiness.com/at/ [REST URL parameter 1]

1.473. http://www.verizonbusiness.com/au/ [REST URL parameter 1]

1.474. http://www.verizonbusiness.com/au/ [REST URL parameter 1]

1.475. http://www.verizonbusiness.com/be/ [REST URL parameter 1]

1.476. http://www.verizonbusiness.com/be/ [REST URL parameter 1]

1.477. http://www.verizonbusiness.com/br/ [REST URL parameter 1]

1.478. http://www.verizonbusiness.com/br/ [REST URL parameter 1]

1.479. http://www.verizonbusiness.com/ca/ [REST URL parameter 1]

1.480. http://www.verizonbusiness.com/ca/ [REST URL parameter 1]

1.481. http://www.verizonbusiness.com/ch/ [REST URL parameter 1]

1.482. http://www.verizonbusiness.com/ch/ [REST URL parameter 1]

1.483. http://www.verizonbusiness.com/cl/ [REST URL parameter 1]

1.484. http://www.verizonbusiness.com/cl/ [REST URL parameter 1]

1.485. http://www.verizonbusiness.com/cn/ [REST URL parameter 1]

1.486. http://www.verizonbusiness.com/cn/ [REST URL parameter 1]

1.487. http://www.verizonbusiness.com/co/ [REST URL parameter 1]

1.488. http://www.verizonbusiness.com/co/ [REST URL parameter 1]

1.489. http://www.verizonbusiness.com/countries/ [REST URL parameter 1]

1.490. http://www.verizonbusiness.com/countries/ [REST URL parameter 1]

1.491. http://www.verizonbusiness.com/de/ [REST URL parameter 1]

1.492. http://www.verizonbusiness.com/de/ [REST URL parameter 1]

1.493. http://www.verizonbusiness.com/de/solutions/var/ [REST URL parameter 1]

1.494. http://www.verizonbusiness.com/de/solutions/var/ [REST URL parameter 1]

1.495. http://www.verizonbusiness.com/de/solutions/var/ [REST URL parameter 2]

1.496. http://www.verizonbusiness.com/de/solutions/var/ [REST URL parameter 2]

1.497. http://www.verizonbusiness.com/de/solutions/var/ [REST URL parameter 3]

1.498. http://www.verizonbusiness.com/de/solutions/var/ [REST URL parameter 3]

1.499. http://www.verizonbusiness.com/dk/ [REST URL parameter 1]

1.500. http://www.verizonbusiness.com/dk/ [REST URL parameter 1]

1.501. http://www.verizonbusiness.com/es/ [REST URL parameter 1]

1.502. http://www.verizonbusiness.com/es/ [REST URL parameter 1]

1.503. http://www.verizonbusiness.com/fi/ [REST URL parameter 1]

1.504. http://www.verizonbusiness.com/fi/ [REST URL parameter 1]

1.505. http://www.verizonbusiness.com/fr/ [REST URL parameter 1]

1.506. http://www.verizonbusiness.com/fr/ [REST URL parameter 1]

1.507. http://www.verizonbusiness.com/hk/ [REST URL parameter 1]

1.508. http://www.verizonbusiness.com/hk/ [REST URL parameter 1]

1.509. http://www.verizonbusiness.com/ie/ [REST URL parameter 1]

1.510. http://www.verizonbusiness.com/ie/ [REST URL parameter 1]

1.511. http://www.verizonbusiness.com/in/ [REST URL parameter 1]

1.512. http://www.verizonbusiness.com/in/ [REST URL parameter 1]

1.513. http://www.verizonbusiness.com/it/ [REST URL parameter 1]

1.514. http://www.verizonbusiness.com/it/ [REST URL parameter 1]

1.515. http://www.verizonbusiness.com/it/solutions/var/ [REST URL parameter 1]

1.516. http://www.verizonbusiness.com/it/solutions/var/ [REST URL parameter 1]

1.517. http://www.verizonbusiness.com/it/solutions/var/ [REST URL parameter 2]

1.518. http://www.verizonbusiness.com/it/solutions/var/ [REST URL parameter 2]

1.519. http://www.verizonbusiness.com/it/solutions/var/ [REST URL parameter 3]

1.520. http://www.verizonbusiness.com/it/solutions/var/ [REST URL parameter 3]

1.521. http://www.verizonbusiness.com/jp/ [REST URL parameter 1]

1.522. http://www.verizonbusiness.com/jp/ [REST URL parameter 1]

1.523. http://www.verizonbusiness.com/kr/ [REST URL parameter 1]

1.524. http://www.verizonbusiness.com/kr/ [REST URL parameter 1]

1.525. http://www.verizonbusiness.com/mx/ [REST URL parameter 1]

1.526. http://www.verizonbusiness.com/mx/ [REST URL parameter 1]

1.527. http://www.verizonbusiness.com/nl/ [REST URL parameter 1]

1.528. http://www.verizonbusiness.com/nl/ [REST URL parameter 1]

1.529. http://www.verizonbusiness.com/nl/solutions/var/ [REST URL parameter 1]

1.530. http://www.verizonbusiness.com/nl/solutions/var/ [REST URL parameter 1]

1.531. http://www.verizonbusiness.com/nl/solutions/var/ [REST URL parameter 2]

1.532. http://www.verizonbusiness.com/nl/solutions/var/ [REST URL parameter 2]

1.533. http://www.verizonbusiness.com/nl/solutions/var/ [REST URL parameter 3]

1.534. http://www.verizonbusiness.com/nl/solutions/var/ [REST URL parameter 3]

1.535. http://www.verizonbusiness.com/no/ [REST URL parameter 1]

1.536. http://www.verizonbusiness.com/no/ [REST URL parameter 1]

1.537. http://www.verizonbusiness.com/nz/ [REST URL parameter 1]

1.538. http://www.verizonbusiness.com/nz/ [REST URL parameter 1]

1.539. http://www.verizonbusiness.com/pa/ [REST URL parameter 1]

1.540. http://www.verizonbusiness.com/pa/ [REST URL parameter 1]

1.541. http://www.verizonbusiness.com/privacy/ [REST URL parameter 1]

1.542. http://www.verizonbusiness.com/privacy/ [REST URL parameter 1]

1.543. http://www.verizonbusiness.com/products/itsolutions/caas/ [REST URL parameter 1]

1.544. http://www.verizonbusiness.com/products/itsolutions/caas/ [REST URL parameter 1]

1.545. http://www.verizonbusiness.com/products/itsolutions/caas/ [REST URL parameter 2]

1.546. http://www.verizonbusiness.com/products/itsolutions/caas/ [REST URL parameter 2]

1.547. http://www.verizonbusiness.com/products/itsolutions/caas/ [REST URL parameter 3]

1.548. http://www.verizonbusiness.com/products/itsolutions/caas/ [REST URL parameter 3]

1.549. http://www.verizonbusiness.com/pt/ [REST URL parameter 1]

1.550. http://www.verizonbusiness.com/pt/ [REST URL parameter 1]

1.551. http://www.verizonbusiness.com/resources/ [REST URL parameter 1]

1.552. http://www.verizonbusiness.com/resources/ [REST URL parameter 1]

1.553. http://www.verizonbusiness.com/resources/1002a1a2-111-Healthcare.xml [REST URL parameter 1]

1.554. http://www.verizonbusiness.com/resources/1002a1a2-111-Healthcare.xml [REST URL parameter 1]

1.555. http://www.verizonbusiness.com/resources/1002a1a2-111-Healthcare.xml [REST URL parameter 2]

1.556. http://www.verizonbusiness.com/resources/1002a1a2-111-Healthcare.xml [REST URL parameter 2]

1.557. http://www.verizonbusiness.com/resources/1002a1a3-111-Financial.xml [REST URL parameter 1]

1.558. http://www.verizonbusiness.com/resources/1002a1a3-111-Financial.xml [REST URL parameter 1]

1.559. http://www.verizonbusiness.com/resources/1002a1a3-111-Financial.xml [REST URL parameter 2]

1.560. http://www.verizonbusiness.com/resources/1002a1a3-111-Financial.xml [REST URL parameter 2]

1.561. http://www.verizonbusiness.com/resources/1002a1a4-111-Education.xml [REST URL parameter 1]

1.562. http://www.verizonbusiness.com/resources/1002a1a4-111-Education.xml [REST URL parameter 1]

1.563. http://www.verizonbusiness.com/resources/1002a1a4-111-Education.xml [REST URL parameter 2]

1.564. http://www.verizonbusiness.com/resources/1002a1a4-111-Education.xml [REST URL parameter 2]

1.565. http://www.verizonbusiness.com/resources/1002a1a5-111-Government.xml [REST URL parameter 1]

1.566. http://www.verizonbusiness.com/resources/1002a1a5-111-Government.xml [REST URL parameter 1]

1.567. http://www.verizonbusiness.com/resources/1002a1a5-111-Government.xml [REST URL parameter 2]

1.568. http://www.verizonbusiness.com/resources/1002a1a5-111-Government.xml [REST URL parameter 2]

1.569. http://www.verizonbusiness.com/resources/1002a1a6-111-Retail.xml [REST URL parameter 1]

1.570. http://www.verizonbusiness.com/resources/1002a1a6-111-Retail.xml [REST URL parameter 1]

1.571. http://www.verizonbusiness.com/resources/1002a1a6-111-Retail.xml [REST URL parameter 2]

1.572. http://www.verizonbusiness.com/resources/1002a1a6-111-Retail.xml [REST URL parameter 2]

1.573. http://www.verizonbusiness.com/resources/1002a1a7-111-Energy+and+Utilities.xml [REST URL parameter 1]

1.574. http://www.verizonbusiness.com/resources/1002a1a7-111-Energy+and+Utilities.xml [REST URL parameter 1]

1.575. http://www.verizonbusiness.com/resources/1002a1a7-111-Energy+and+Utilities.xml [REST URL parameter 2]

1.576. http://www.verizonbusiness.com/resources/1002a1a7-111-Energy+and+Utilities.xml [REST URL parameter 2]

1.577. http://www.verizonbusiness.com/resources/1002a2a1-111-Business+Continuity.xml [REST URL parameter 1]

1.578. http://www.verizonbusiness.com/resources/1002a2a1-111-Business+Continuity.xml [REST URL parameter 1]

1.579. http://www.verizonbusiness.com/resources/1002a2a1-111-Business+Continuity.xml [REST URL parameter 2]

1.580. http://www.verizonbusiness.com/resources/1002a2a1-111-Business+Continuity.xml [REST URL parameter 2]

1.581. http://www.verizonbusiness.com/resources/1002a2a10-111-Security.xml [REST URL parameter 1]

1.582. http://www.verizonbusiness.com/resources/1002a2a10-111-Security.xml [REST URL parameter 1]

1.583. http://www.verizonbusiness.com/resources/1002a2a10-111-Security.xml [REST URL parameter 2]

1.584. http://www.verizonbusiness.com/resources/1002a2a10-111-Security.xml [REST URL parameter 2]

1.585. http://www.verizonbusiness.com/resources/1002a2a11-111-Voice.xml [REST URL parameter 1]

1.586. http://www.verizonbusiness.com/resources/1002a2a11-111-Voice.xml [REST URL parameter 1]

1.587. http://www.verizonbusiness.com/resources/1002a2a11-111-Voice.xml [REST URL parameter 2]

1.588. http://www.verizonbusiness.com/resources/1002a2a11-111-Voice.xml [REST URL parameter 2]

1.589. http://www.verizonbusiness.com/resources/1002a2a12-111-VoIP.xml [REST URL parameter 1]

1.590. http://www.verizonbusiness.com/resources/1002a2a12-111-VoIP.xml [REST URL parameter 1]

1.591. http://www.verizonbusiness.com/resources/1002a2a12-111-VoIP.xml [REST URL parameter 2]

1.592. http://www.verizonbusiness.com/resources/1002a2a12-111-VoIP.xml [REST URL parameter 2]

1.593. http://www.verizonbusiness.com/resources/1002a2a13-111-Application+&+Performance+Management.xml [REST URL parameter 1]

1.594. http://www.verizonbusiness.com/resources/1002a2a13-111-Application+&+Performance+Management.xml [REST URL parameter 1]

1.595. http://www.verizonbusiness.com/resources/1002a2a13-111-Application+&+Performance+Management.xml [REST URL parameter 2]

1.596. http://www.verizonbusiness.com/resources/1002a2a13-111-Application+&+Performance+Management.xml [REST URL parameter 2]

1.597. http://www.verizonbusiness.com/resources/1002a2a14-111-Unified+Communications+and+Collaboration.xml [REST URL parameter 1]

1.598. http://www.verizonbusiness.com/resources/1002a2a14-111-Unified+Communications+and+Collaboration.xml [REST URL parameter 1]

1.599. http://www.verizonbusiness.com/resources/1002a2a14-111-Unified+Communications+and+Collaboration.xml [REST URL parameter 2]

1.600. http://www.verizonbusiness.com/resources/1002a2a14-111-Unified+Communications+and+Collaboration.xml [REST URL parameter 2]

1.601. http://www.verizonbusiness.com/resources/1002a2a15-111-Connecting+Business+Information.xml [REST URL parameter 1]

1.602. http://www.verizonbusiness.com/resources/1002a2a15-111-Connecting+Business+Information.xml [REST URL parameter 1]

1.603. http://www.verizonbusiness.com/resources/1002a2a15-111-Connecting+Business+Information.xml [REST URL parameter 2]

1.604. http://www.verizonbusiness.com/resources/1002a2a15-111-Connecting+Business+Information.xml [REST URL parameter 2]

1.605. http://www.verizonbusiness.com/resources/1002a2a16-111-Controlling+Costs.xml [REST URL parameter 1]

1.606. http://www.verizonbusiness.com/resources/1002a2a16-111-Controlling+Costs.xml [REST URL parameter 1]

1.607. http://www.verizonbusiness.com/resources/1002a2a16-111-Controlling+Costs.xml [REST URL parameter 2]

1.608. http://www.verizonbusiness.com/resources/1002a2a16-111-Controlling+Costs.xml [REST URL parameter 2]

1.609. http://www.verizonbusiness.com/resources/1002a2a17-111-Expanding+Into+New+Markets.xml [REST URL parameter 1]

1.610. http://www.verizonbusiness.com/resources/1002a2a17-111-Expanding+Into+New+Markets.xml [REST URL parameter 1]

1.611. http://www.verizonbusiness.com/resources/1002a2a17-111-Expanding+Into+New+Markets.xml [REST URL parameter 2]

1.612. http://www.verizonbusiness.com/resources/1002a2a17-111-Expanding+Into+New+Markets.xml [REST URL parameter 2]

1.613. http://www.verizonbusiness.com/resources/1002a2a18-111-Going+Green.xml [REST URL parameter 1]

1.614. http://www.verizonbusiness.com/resources/1002a2a18-111-Going+Green.xml [REST URL parameter 1]

1.615. http://www.verizonbusiness.com/resources/1002a2a18-111-Going+Green.xml [REST URL parameter 2]

1.616. http://www.verizonbusiness.com/resources/1002a2a18-111-Going+Green.xml [REST URL parameter 2]

1.617. http://www.verizonbusiness.com/resources/1002a2a19-111-Improving+Productivity.xml [REST URL parameter 1]

1.618. http://www.verizonbusiness.com/resources/1002a2a19-111-Improving+Productivity.xml [REST URL parameter 1]

1.619. http://www.verizonbusiness.com/resources/1002a2a19-111-Improving+Productivity.xml [REST URL parameter 2]

1.620. http://www.verizonbusiness.com/resources/1002a2a19-111-Improving+Productivity.xml [REST URL parameter 2]

1.621. http://www.verizonbusiness.com/resources/1002a2a2-111-Conferencing.xml [REST URL parameter 1]

1.622. http://www.verizonbusiness.com/resources/1002a2a2-111-Conferencing.xml [REST URL parameter 1]

1.623. http://www.verizonbusiness.com/resources/1002a2a2-111-Conferencing.xml [REST URL parameter 2]

1.624. http://www.verizonbusiness.com/resources/1002a2a2-111-Conferencing.xml [REST URL parameter 2]

1.625. http://www.verizonbusiness.com/resources/1002a2a20-111-Mobility.xml [REST URL parameter 1]

1.626. http://www.verizonbusiness.com/resources/1002a2a20-111-Mobility.xml [REST URL parameter 1]

1.627. http://www.verizonbusiness.com/resources/1002a2a20-111-Mobility.xml [REST URL parameter 2]

1.628. http://www.verizonbusiness.com/resources/1002a2a20-111-Mobility.xml [REST URL parameter 2]

1.629. http://www.verizonbusiness.com/resources/1002a2a21-111-Professional+Services.xml [REST URL parameter 1]

1.630. http://www.verizonbusiness.com/resources/1002a2a21-111-Professional+Services.xml [REST URL parameter 1]

1.631. http://www.verizonbusiness.com/resources/1002a2a21-111-Professional+Services.xml [REST URL parameter 2]

1.632. http://www.verizonbusiness.com/resources/1002a2a21-111-Professional+Services.xml [REST URL parameter 2]

1.633. http://www.verizonbusiness.com/resources/1002a2a22-111-Securing+Your+Enterprise.xml [REST URL parameter 1]

1.634. http://www.verizonbusiness.com/resources/1002a2a22-111-Securing+Your+Enterprise.xml [REST URL parameter 1]

1.635. http://www.verizonbusiness.com/resources/1002a2a22-111-Securing+Your+Enterprise.xml [REST URL parameter 2]

1.636. http://www.verizonbusiness.com/resources/1002a2a22-111-Securing+Your+Enterprise.xml [REST URL parameter 2]

1.637. http://www.verizonbusiness.com/resources/1002a2a23-111-Wireless.xml [REST URL parameter 1]

1.638. http://www.verizonbusiness.com/resources/1002a2a23-111-Wireless.xml [REST URL parameter 1]

1.639. http://www.verizonbusiness.com/resources/1002a2a23-111-Wireless.xml [REST URL parameter 2]

1.640. http://www.verizonbusiness.com/resources/1002a2a23-111-Wireless.xml [REST URL parameter 2]

1.641. http://www.verizonbusiness.com/resources/1002a2a24-111-Virtualization.xml [REST URL parameter 1]

1.642. http://www.verizonbusiness.com/resources/1002a2a24-111-Virtualization.xml [REST URL parameter 1]

1.643. http://www.verizonbusiness.com/resources/1002a2a24-111-Virtualization.xml [REST URL parameter 2]

1.644. http://www.verizonbusiness.com/resources/1002a2a24-111-Virtualization.xml [REST URL parameter 2]

1.645. http://www.verizonbusiness.com/resources/1002a2a25-111-Teleworking.xml [REST URL parameter 1]

1.646. http://www.verizonbusiness.com/resources/1002a2a25-111-Teleworking.xml [REST URL parameter 1]

1.647. http://www.verizonbusiness.com/resources/1002a2a25-111-Teleworking.xml [REST URL parameter 2]

1.648. http://www.verizonbusiness.com/resources/1002a2a25-111-Teleworking.xml [REST URL parameter 2]

1.649. http://www.verizonbusiness.com/resources/1002a2a26-111-Executive+Leadership+Series.xml [REST URL parameter 1]

1.650. http://www.verizonbusiness.com/resources/1002a2a26-111-Executive+Leadership+Series.xml [REST URL parameter 1]

1.651. http://www.verizonbusiness.com/resources/1002a2a26-111-Executive+Leadership+Series.xml [REST URL parameter 2]

1.652. http://www.verizonbusiness.com/resources/1002a2a26-111-Executive+Leadership+Series.xml [REST URL parameter 2]

1.653. http://www.verizonbusiness.com/resources/1002a2a27-111-Think+Forward.xml [REST URL parameter 1]

1.654. http://www.verizonbusiness.com/resources/1002a2a27-111-Think+Forward.xml [REST URL parameter 1]

1.655. http://www.verizonbusiness.com/resources/1002a2a27-111-Think+Forward.xml [REST URL parameter 2]

1.656. http://www.verizonbusiness.com/resources/1002a2a27-111-Think+Forward.xml [REST URL parameter 2]

1.657. http://www.verizonbusiness.com/resources/1002a2a28-111-Small+&+Medium+Business.xml [REST URL parameter 1]

1.658. http://www.verizonbusiness.com/resources/1002a2a28-111-Small+&+Medium+Business.xml [REST URL parameter 1]

1.659. http://www.verizonbusiness.com/resources/1002a2a28-111-Small+&+Medium+Business.xml [REST URL parameter 2]

1.660. http://www.verizonbusiness.com/resources/1002a2a28-111-Small+&+Medium+Business.xml [REST URL parameter 2]

1.661. http://www.verizonbusiness.com/resources/1002a2a29-111-Carrier+&+Wholesale.xml [REST URL parameter 1]

1.662. http://www.verizonbusiness.com/resources/1002a2a29-111-Carrier+&+Wholesale.xml [REST URL parameter 1]

1.663. http://www.verizonbusiness.com/resources/1002a2a29-111-Carrier+&+Wholesale.xml [REST URL parameter 2]

1.664. http://www.verizonbusiness.com/resources/1002a2a29-111-Carrier+&+Wholesale.xml [REST URL parameter 2]

1.665. http://www.verizonbusiness.com/resources/1002a2a3-111-Contact+Centers.xml [REST URL parameter 1]

1.666. http://www.verizonbusiness.com/resources/1002a2a3-111-Contact+Centers.xml [REST URL parameter 1]

1.667. http://www.verizonbusiness.com/resources/1002a2a3-111-Contact+Centers.xml [REST URL parameter 2]

1.668. http://www.verizonbusiness.com/resources/1002a2a3-111-Contact+Centers.xml [REST URL parameter 2]

1.669. http://www.verizonbusiness.com/resources/1002a2a30-111-Global+Network.xml [REST URL parameter 1]

1.670. http://www.verizonbusiness.com/resources/1002a2a30-111-Global+Network.xml [REST URL parameter 1]

1.671. http://www.verizonbusiness.com/resources/1002a2a30-111-Global+Network.xml [REST URL parameter 2]

1.672. http://www.verizonbusiness.com/resources/1002a2a30-111-Global+Network.xml [REST URL parameter 2]

1.673. http://www.verizonbusiness.com/resources/1002a2a31-111-Customer+Enablement.xml [REST URL parameter 1]

1.674. http://www.verizonbusiness.com/resources/1002a2a31-111-Customer+Enablement.xml [REST URL parameter 1]

1.675. http://www.verizonbusiness.com/resources/1002a2a31-111-Customer+Enablement.xml [REST URL parameter 2]

1.676. http://www.verizonbusiness.com/resources/1002a2a31-111-Customer+Enablement.xml [REST URL parameter 2]

1.677. http://www.verizonbusiness.com/resources/1002a2a4-111-Data+and+IP+Services.xml [REST URL parameter 1]

1.678. http://www.verizonbusiness.com/resources/1002a2a4-111-Data+and+IP+Services.xml [REST URL parameter 1]

1.679. http://www.verizonbusiness.com/resources/1002a2a4-111-Data+and+IP+Services.xml [REST URL parameter 2]

1.680. http://www.verizonbusiness.com/resources/1002a2a4-111-Data+and+IP+Services.xml [REST URL parameter 2]

1.681. http://www.verizonbusiness.com/resources/1002a2a6-111-Internet+Access.xml [REST URL parameter 1]

1.682. http://www.verizonbusiness.com/resources/1002a2a6-111-Internet+Access.xml [REST URL parameter 1]

1.683. http://www.verizonbusiness.com/resources/1002a2a6-111-Internet+Access.xml [REST URL parameter 2]

1.684. http://www.verizonbusiness.com/resources/1002a2a6-111-Internet+Access.xml [REST URL parameter 2]

1.685. http://www.verizonbusiness.com/resources/1002a2a7-111-IT+Solutions+and+Hosting.xml [REST URL parameter 1]

1.686. http://www.verizonbusiness.com/resources/1002a2a7-111-IT+Solutions+and+Hosting.xml [REST URL parameter 1]

1.687. http://www.verizonbusiness.com/resources/1002a2a7-111-IT+Solutions+and+Hosting.xml [REST URL parameter 2]

1.688. http://www.verizonbusiness.com/resources/1002a2a7-111-IT+Solutions+and+Hosting.xml [REST URL parameter 2]

1.689. http://www.verizonbusiness.com/resources/1002a2a8-111-Managed+Networks.xml [REST URL parameter 1]

1.690. http://www.verizonbusiness.com/resources/1002a2a8-111-Managed+Networks.xml [REST URL parameter 1]

1.691. http://www.verizonbusiness.com/resources/1002a2a8-111-Managed+Networks.xml [REST URL parameter 2]

1.692. http://www.verizonbusiness.com/resources/1002a2a8-111-Managed+Networks.xml [REST URL parameter 2]

1.693. http://www.verizonbusiness.com/resources/1002a2a9-111-Premises+Equipment.xml [REST URL parameter 1]

1.694. http://www.verizonbusiness.com/resources/1002a2a9-111-Premises+Equipment.xml [REST URL parameter 1]

1.695. http://www.verizonbusiness.com/resources/1002a2a9-111-Premises+Equipment.xml [REST URL parameter 2]

1.696. http://www.verizonbusiness.com/resources/1002a2a9-111-Premises+Equipment.xml [REST URL parameter 2]

1.697. http://www.verizonbusiness.com/resources/1002a3a1-111-Awards+and+Recognition.xml [REST URL parameter 1]

1.698. http://www.verizonbusiness.com/resources/1002a3a1-111-Awards+and+Recognition.xml [REST URL parameter 1]

1.699. http://www.verizonbusiness.com/resources/1002a3a1-111-Awards+and+Recognition.xml [REST URL parameter 2]

1.700. http://www.verizonbusiness.com/resources/1002a3a1-111-Awards+and+Recognition.xml [REST URL parameter 2]

1.701. http://www.verizonbusiness.com/resources/1002a3a10-111-Tools.xml [REST URL parameter 1]

1.702. http://www.verizonbusiness.com/resources/1002a3a10-111-Tools.xml [REST URL parameter 1]

1.703. http://www.verizonbusiness.com/resources/1002a3a10-111-Tools.xml [REST URL parameter 2]

1.704. http://www.verizonbusiness.com/resources/1002a3a10-111-Tools.xml [REST URL parameter 2]

1.705. http://www.verizonbusiness.com/resources/1002a3a11-111-Blogs.xml [REST URL parameter 1]

1.706. http://www.verizonbusiness.com/resources/1002a3a11-111-Blogs.xml [REST URL parameter 1]

1.707. http://www.verizonbusiness.com/resources/1002a3a11-111-Blogs.xml [REST URL parameter 2]

1.708. http://www.verizonbusiness.com/resources/1002a3a11-111-Blogs.xml [REST URL parameter 2]

1.709. http://www.verizonbusiness.com/resources/1002a3a12-111-Newsletter.xml [REST URL parameter 1]

1.710. http://www.verizonbusiness.com/resources/1002a3a12-111-Newsletter.xml [REST URL parameter 1]

1.711. http://www.verizonbusiness.com/resources/1002a3a12-111-Newsletter.xml [REST URL parameter 2]

1.712. http://www.verizonbusiness.com/resources/1002a3a12-111-Newsletter.xml [REST URL parameter 2]

1.713. http://www.verizonbusiness.com/resources/1002a3a13-111-Thought+Leadership.xml [REST URL parameter 1]

1.714. http://www.verizonbusiness.com/resources/1002a3a13-111-Thought+Leadership.xml [REST URL parameter 1]

1.715. http://www.verizonbusiness.com/resources/1002a3a13-111-Thought+Leadership.xml [REST URL parameter 2]

1.716. http://www.verizonbusiness.com/resources/1002a3a13-111-Thought+Leadership.xml [REST URL parameter 2]

1.717. http://www.verizonbusiness.com/resources/1002a3a14-111-Solutions+Briefs.xml [REST URL parameter 1]

1.718. http://www.verizonbusiness.com/resources/1002a3a14-111-Solutions+Briefs.xml [REST URL parameter 1]

1.719. http://www.verizonbusiness.com/resources/1002a3a14-111-Solutions+Briefs.xml [REST URL parameter 2]

1.720. http://www.verizonbusiness.com/resources/1002a3a14-111-Solutions+Briefs.xml [REST URL parameter 2]

1.721. http://www.verizonbusiness.com/resources/1002a3a2-111-Analyst+Reports.xml [REST URL parameter 1]

1.722. http://www.verizonbusiness.com/resources/1002a3a2-111-Analyst+Reports.xml [REST URL parameter 1]

1.723. http://www.verizonbusiness.com/resources/1002a3a2-111-Analyst+Reports.xml [REST URL parameter 2]

1.724. http://www.verizonbusiness.com/resources/1002a3a2-111-Analyst+Reports.xml [REST URL parameter 2]

1.725. http://www.verizonbusiness.com/resources/1002a3a3-111-Case+Studies.xml [REST URL parameter 1]

1.726. http://www.verizonbusiness.com/resources/1002a3a3-111-Case+Studies.xml [REST URL parameter 1]

1.727. http://www.verizonbusiness.com/resources/1002a3a3-111-Case+Studies.xml [REST URL parameter 2]

1.728. http://www.verizonbusiness.com/resources/1002a3a3-111-Case+Studies.xml [REST URL parameter 2]

1.729. http://www.verizonbusiness.com/resources/1002a3a4-111-Executive+Briefs.xml [REST URL parameter 1]

1.730. http://www.verizonbusiness.com/resources/1002a3a4-111-Executive+Briefs.xml [REST URL parameter 1]

1.731. http://www.verizonbusiness.com/resources/1002a3a4-111-Executive+Briefs.xml [REST URL parameter 2]

1.732. http://www.verizonbusiness.com/resources/1002a3a4-111-Executive+Briefs.xml [REST URL parameter 2]

1.733. http://www.verizonbusiness.com/resources/1002a3a5-111-Fact+Sheets+&+Brochures.xml [REST URL parameter 1]

1.734. http://www.verizonbusiness.com/resources/1002a3a5-111-Fact+Sheets+&+Brochures.xml [REST URL parameter 1]

1.735. http://www.verizonbusiness.com/resources/1002a3a5-111-Fact+Sheets+&+Brochures.xml [REST URL parameter 2]

1.736. http://www.verizonbusiness.com/resources/1002a3a5-111-Fact+Sheets+&+Brochures.xml [REST URL parameter 2]

1.737. http://www.verizonbusiness.com/resources/1002a3a6-111-Podcasts.xml [REST URL parameter 1]

1.738. http://www.verizonbusiness.com/resources/1002a3a6-111-Podcasts.xml [REST URL parameter 1]

1.739. http://www.verizonbusiness.com/resources/1002a3a6-111-Podcasts.xml [REST URL parameter 2]

1.740. http://www.verizonbusiness.com/resources/1002a3a6-111-Podcasts.xml [REST URL parameter 2]

1.741. http://www.verizonbusiness.com/resources/1002a3a7-111-Virtual+Tours+(Demos [REST URL parameter 1]

1.742. http://www.verizonbusiness.com/resources/1002a3a7-111-Virtual+Tours+(Demos [REST URL parameter 1]

1.743. http://www.verizonbusiness.com/resources/1002a3a7-111-Virtual+Tours+(Demos [REST URL parameter 2]

1.744. http://www.verizonbusiness.com/resources/1002a3a7-111-Virtual+Tours+(Demos [REST URL parameter 2]

1.745. http://www.verizonbusiness.com/resources/1002a3a7-111-Virtual+Tours+(Demos).xml [REST URL parameter 1]

1.746. http://www.verizonbusiness.com/resources/1002a3a7-111-Virtual+Tours+(Demos).xml [REST URL parameter 1]

1.747. http://www.verizonbusiness.com/resources/1002a3a7-111-Virtual+Tours+(Demos).xml [REST URL parameter 2]

1.748. http://www.verizonbusiness.com/resources/1002a3a7-111-Virtual+Tours+(Demos).xml [REST URL parameter 2]

1.749. http://www.verizonbusiness.com/resources/1002a3a8-111-White+Papers.xml [REST URL parameter 1]

1.750. http://www.verizonbusiness.com/resources/1002a3a8-111-White+Papers.xml [REST URL parameter 1]

1.751. http://www.verizonbusiness.com/resources/1002a3a8-111-White+Papers.xml [REST URL parameter 2]

1.752. http://www.verizonbusiness.com/resources/1002a3a8-111-White+Papers.xml [REST URL parameter 2]

1.753. http://www.verizonbusiness.com/resources/1002a3a9-111-Webinars+&+Videos.xml [REST URL parameter 1]

1.754. http://www.verizonbusiness.com/resources/1002a3a9-111-Webinars+&+Videos.xml [REST URL parameter 1]

1.755. http://www.verizonbusiness.com/resources/1002a3a9-111-Webinars+&+Videos.xml [REST URL parameter 2]

1.756. http://www.verizonbusiness.com/resources/1002a3a9-111-Webinars+&+Videos.xml [REST URL parameter 2]

1.757. http://www.verizonbusiness.com/resources/casestudies/cs_constellation-energy-power-of-choice_en_xg.pdf [REST URL parameter 1]

1.758. http://www.verizonbusiness.com/resources/casestudies/cs_constellation-energy-power-of-choice_en_xg.pdf [REST URL parameter 1]

1.759. http://www.verizonbusiness.com/resources/casestudies/cs_constellation-energy-power-of-choice_en_xg.pdf [REST URL parameter 2]

1.760. http://www.verizonbusiness.com/resources/casestudies/cs_constellation-energy-power-of-choice_en_xg.pdf [REST URL parameter 2]

1.761. http://www.verizonbusiness.com/resources/casestudies/cs_constellation-energy-power-of-choice_en_xg.pdf [REST URL parameter 3]

1.762. http://www.verizonbusiness.com/resources/casestudies/cs_constellation-energy-power-of-choice_en_xg.pdf [REST URL parameter 3]

1.763. http://www.verizonbusiness.com/resources/casestudies/cs_from-international-to-global-how-komatsu-used-strategy_en_xg.pdf [REST URL parameter 1]

1.764. http://www.verizonbusiness.com/resources/casestudies/cs_from-international-to-global-how-komatsu-used-strategy_en_xg.pdf [REST URL parameter 1]

1.765. http://www.verizonbusiness.com/resources/casestudies/cs_from-international-to-global-how-komatsu-used-strategy_en_xg.pdf [REST URL parameter 2]

1.766. http://www.verizonbusiness.com/resources/casestudies/cs_from-international-to-global-how-komatsu-used-strategy_en_xg.pdf [REST URL parameter 2]

1.767. http://www.verizonbusiness.com/resources/casestudies/cs_from-international-to-global-how-komatsu-used-strategy_en_xg.pdf [REST URL parameter 3]

1.768. http://www.verizonbusiness.com/resources/casestudies/cs_from-international-to-global-how-komatsu-used-strategy_en_xg.pdf [REST URL parameter 3]

1.769. http://www.verizonbusiness.com/resources/casestudies/cs_mitsui-verizon-consolidating-it_en_xg.pdf [REST URL parameter 1]

1.770. http://www.verizonbusiness.com/resources/casestudies/cs_mitsui-verizon-consolidating-it_en_xg.pdf [REST URL parameter 1]

1.771. http://www.verizonbusiness.com/resources/casestudies/cs_mitsui-verizon-consolidating-it_en_xg.pdf [REST URL parameter 2]

1.772. http://www.verizonbusiness.com/resources/casestudies/cs_mitsui-verizon-consolidating-it_en_xg.pdf [REST URL parameter 2]

1.773. http://www.verizonbusiness.com/resources/casestudies/cs_mitsui-verizon-consolidating-it_en_xg.pdf [REST URL parameter 3]

1.774. http://www.verizonbusiness.com/resources/casestudies/cs_mitsui-verizon-consolidating-it_en_xg.pdf [REST URL parameter 3]

1.775. http://www.verizonbusiness.com/resources/factsheets/fc_Security-Solutions-for-Retail [REST URL parameter 1]

1.776. http://www.verizonbusiness.com/resources/factsheets/fc_Security-Solutions-for-Retail [REST URL parameter 1]

1.777. http://www.verizonbusiness.com/resources/factsheets/fc_Security-Solutions-for-Retail [REST URL parameter 2]

1.778. http://www.verizonbusiness.com/resources/factsheets/fc_Security-Solutions-for-Retail [REST URL parameter 2]

1.779. http://www.verizonbusiness.com/resources/factsheets/fc_Security-Solutions-for-Retail [REST URL parameter 3]

1.780. http://www.verizonbusiness.com/resources/factsheets/fc_Security-Solutions-for-Retail [REST URL parameter 3]

1.781. http://www.verizonbusiness.com/resources/media/index-131046-wifi+shopping+borders.xml [REST URL parameter 1]

1.782. http://www.verizonbusiness.com/resources/media/index-131046-wifi+shopping+borders.xml [REST URL parameter 1]

1.783. http://www.verizonbusiness.com/resources/media/index-131046-wifi+shopping+borders.xml [REST URL parameter 2]

1.784. http://www.verizonbusiness.com/resources/media/index-131046-wifi+shopping+borders.xml [REST URL parameter 2]

1.785. http://www.verizonbusiness.com/resources/media/index-131046-wifi+shopping+borders.xml [REST URL parameter 3]

1.786. http://www.verizonbusiness.com/resources/media/index.xml [REST URL parameter 1]

1.787. http://www.verizonbusiness.com/resources/media/index.xml [REST URL parameter 1]

1.788. http://www.verizonbusiness.com/resources/media/index.xml [REST URL parameter 2]

1.789. http://www.verizonbusiness.com/resources/media/index.xml [REST URL parameter 2]

1.790. http://www.verizonbusiness.com/resources/media/index.xml [REST URL parameter 3]

1.791. http://www.verizonbusiness.com/resources/media/index.xml [REST URL parameter 3]

1.792. http://www.verizonbusiness.com/resources/media/large-131367-customer+service+week.xml [REST URL parameter 1]

1.793. http://www.verizonbusiness.com/resources/media/large-131367-customer+service+week.xml [REST URL parameter 1]

1.794. http://www.verizonbusiness.com/resources/media/large-131367-customer+service+week.xml [REST URL parameter 2]

1.795. http://www.verizonbusiness.com/resources/media/large-131367-customer+service+week.xml [REST URL parameter 2]

1.796. http://www.verizonbusiness.com/resources/media/large-131367-customer+service+week.xml [REST URL parameter 3]

1.797. http://www.verizonbusiness.com/resources/media/large-131421-mitsui.xml [REST URL parameter 1]

1.798. http://www.verizonbusiness.com/resources/media/large-131421-mitsui.xml [REST URL parameter 1]

1.799. http://www.verizonbusiness.com/resources/media/large-131421-mitsui.xml [REST URL parameter 2]

1.800. http://www.verizonbusiness.com/resources/media/large-131421-mitsui.xml [REST URL parameter 2]

1.801. http://www.verizonbusiness.com/resources/media/large-131421-mitsui.xml [REST URL parameter 3]

1.802. http://www.verizonbusiness.com/resources/media/large-131513-mitsui.xml [REST URL parameter 1]

1.803. http://www.verizonbusiness.com/resources/media/large-131513-mitsui.xml [REST URL parameter 1]

1.804. http://www.verizonbusiness.com/resources/media/large-131513-mitsui.xml [REST URL parameter 2]

1.805. http://www.verizonbusiness.com/resources/media/large-131513-mitsui.xml [REST URL parameter 2]

1.806. http://www.verizonbusiness.com/resources/media/large-131513-mitsui.xml [REST URL parameter 3]

1.807. http://www.verizonbusiness.com/resources/newsletters/most-clouds-obstruct-your-vision_en_xg.pdf [REST URL parameter 1]

1.808. http://www.verizonbusiness.com/resources/newsletters/most-clouds-obstruct-your-vision_en_xg.pdf [REST URL parameter 1]

1.809. http://www.verizonbusiness.com/resources/newsletters/most-clouds-obstruct-your-vision_en_xg.pdf [REST URL parameter 2]

1.810. http://www.verizonbusiness.com/resources/newsletters/most-clouds-obstruct-your-vision_en_xg.pdf [REST URL parameter 2]

1.811. http://www.verizonbusiness.com/resources/newsletters/most-clouds-obstruct-your-vision_en_xg.pdf [REST URL parameter 3]

1.812. http://www.verizonbusiness.com/resources/newsletters/most-clouds-obstruct-your-vision_en_xg.pdf [REST URL parameter 3]

1.813. http://www.verizonbusiness.com/resources/reports/rp_2010-data-breach-report_en_xg.pdf [REST URL parameter 1]

1.814. http://www.verizonbusiness.com/resources/reports/rp_2010-data-breach-report_en_xg.pdf [REST URL parameter 1]

1.815. http://www.verizonbusiness.com/resources/reports/rp_2010-data-breach-report_en_xg.pdf [REST URL parameter 2]

1.816. http://www.verizonbusiness.com/resources/reports/rp_2010-data-breach-report_en_xg.pdf [REST URL parameter 2]

1.817. http://www.verizonbusiness.com/resources/reports/rp_2010-data-breach-report_en_xg.pdf [REST URL parameter 3]

1.818. http://www.verizonbusiness.com/resources/reports/rp_2010-data-breach-report_en_xg.pdf [REST URL parameter 3]

1.819. http://www.verizonbusiness.com/resources/solutionsbriefs/sb_cloud-computing-program_en_xg.pdf [REST URL parameter 1]

1.820. http://www.verizonbusiness.com/resources/solutionsbriefs/sb_cloud-computing-program_en_xg.pdf [REST URL parameter 1]

1.821. http://www.verizonbusiness.com/resources/solutionsbriefs/sb_cloud-computing-program_en_xg.pdf [REST URL parameter 2]

1.822. http://www.verizonbusiness.com/resources/solutionsbriefs/sb_cloud-computing-program_en_xg.pdf [REST URL parameter 2]

1.823. http://www.verizonbusiness.com/resources/solutionsbriefs/sb_cloud-computing-program_en_xg.pdf [REST URL parameter 3]

1.824. http://www.verizonbusiness.com/resources/solutionsbriefs/sb_cloud-computing-program_en_xg.pdf [REST URL parameter 3]

1.825. http://www.verizonbusiness.com/resources/solutionsbriefs/sb_infrastructure_that_adapts_to_your_business_en_xg.pdf [REST URL parameter 1]

1.826. http://www.verizonbusiness.com/resources/solutionsbriefs/sb_infrastructure_that_adapts_to_your_business_en_xg.pdf [REST URL parameter 1]

1.827. http://www.verizonbusiness.com/resources/solutionsbriefs/sb_infrastructure_that_adapts_to_your_business_en_xg.pdf [REST URL parameter 2]

1.828. http://www.verizonbusiness.com/resources/solutionsbriefs/sb_infrastructure_that_adapts_to_your_business_en_xg.pdf [REST URL parameter 2]

1.829. http://www.verizonbusiness.com/resources/solutionsbriefs/sb_infrastructure_that_adapts_to_your_business_en_xg.pdf [REST URL parameter 3]

1.830. http://www.verizonbusiness.com/resources/solutionsbriefs/sb_infrastructure_that_adapts_to_your_business_en_xg.pdf [REST URL parameter 3]

1.831. http://www.verizonbusiness.com/resources/whitepapers/itsolutions/wp_cloud-computing_en_xg.pdf [REST URL parameter 1]

1.832. http://www.verizonbusiness.com/resources/whitepapers/itsolutions/wp_cloud-computing_en_xg.pdf [REST URL parameter 1]

1.833. http://www.verizonbusiness.com/resources/whitepapers/itsolutions/wp_cloud-computing_en_xg.pdf [REST URL parameter 2]

1.834. http://www.verizonbusiness.com/resources/whitepapers/itsolutions/wp_cloud-computing_en_xg.pdf [REST URL parameter 2]

1.835. http://www.verizonbusiness.com/resources/whitepapers/itsolutions/wp_cloud-computing_en_xg.pdf [REST URL parameter 3]

1.836. http://www.verizonbusiness.com/resources/whitepapers/itsolutions/wp_cloud-computing_en_xg.pdf [REST URL parameter 3]

1.837. http://www.verizonbusiness.com/resources/whitepapers/itsolutions/wp_cloud-computing_en_xg.pdf [REST URL parameter 4]

1.838. http://www.verizonbusiness.com/resources/whitepapers/itsolutions/wp_cloud-computing_en_xg.pdf [REST URL parameter 4]

1.839. http://www.verizonbusiness.com/resources/whitepapers/wp_enabling-revolutionary-cross-channel-trends-retail_en_xg.pdf [REST URL parameter 1]

1.840. http://www.verizonbusiness.com/resources/whitepapers/wp_enabling-revolutionary-cross-channel-trends-retail_en_xg.pdf [REST URL parameter 1]

1.841. http://www.verizonbusiness.com/resources/whitepapers/wp_enabling-revolutionary-cross-channel-trends-retail_en_xg.pdf [REST URL parameter 2]

1.842. http://www.verizonbusiness.com/resources/whitepapers/wp_enabling-revolutionary-cross-channel-trends-retail_en_xg.pdf [REST URL parameter 2]

1.843. http://www.verizonbusiness.com/resources/whitepapers/wp_enabling-revolutionary-cross-channel-trends-retail_en_xg.pdf [REST URL parameter 3]

1.844. http://www.verizonbusiness.com/resources/whitepapers/wp_enabling-revolutionary-cross-channel-trends-retail_en_xg.pdf [REST URL parameter 3]

1.845. http://www.verizonbusiness.com/resources/whitepapers/wp_need-standards-in-retail-it_en_xg.pdf [REST URL parameter 1]

1.846. http://www.verizonbusiness.com/resources/whitepapers/wp_need-standards-in-retail-it_en_xg.pdf [REST URL parameter 1]

1.847. http://www.verizonbusiness.com/resources/whitepapers/wp_need-standards-in-retail-it_en_xg.pdf [REST URL parameter 2]

1.848. http://www.verizonbusiness.com/resources/whitepapers/wp_need-standards-in-retail-it_en_xg.pdf [REST URL parameter 2]

1.849. http://www.verizonbusiness.com/resources/whitepapers/wp_need-standards-in-retail-it_en_xg.pdf [REST URL parameter 3]

1.850. http://www.verizonbusiness.com/resources/whitepapers/wp_need-standards-in-retail-it_en_xg.pdf [REST URL parameter 3]

1.851. http://www.verizonbusiness.com/resources/whitepapers/wp_parting-the-clouds-demystifying-cloud-computing-options_en_xg.pdf [REST URL parameter 1]

1.852. http://www.verizonbusiness.com/resources/whitepapers/wp_parting-the-clouds-demystifying-cloud-computing-options_en_xg.pdf [REST URL parameter 1]

1.853. http://www.verizonbusiness.com/resources/whitepapers/wp_parting-the-clouds-demystifying-cloud-computing-options_en_xg.pdf [REST URL parameter 2]

1.854. http://www.verizonbusiness.com/resources/whitepapers/wp_parting-the-clouds-demystifying-cloud-computing-options_en_xg.pdf [REST URL parameter 2]

1.855. http://www.verizonbusiness.com/resources/whitepapers/wp_parting-the-clouds-demystifying-cloud-computing-options_en_xg.pdf [REST URL parameter 3]

1.856. http://www.verizonbusiness.com/resources/whitepapers/wp_parting-the-clouds-demystifying-cloud-computing-options_en_xg.pdf [REST URL parameter 3]

1.857. http://www.verizonbusiness.com/resources/whitepapers/wp_verizon-incident-sharing-metrics-framework_en_xg.pdf [REST URL parameter 1]

1.858. http://www.verizonbusiness.com/resources/whitepapers/wp_verizon-incident-sharing-metrics-framework_en_xg.pdf [REST URL parameter 1]

1.859. http://www.verizonbusiness.com/resources/whitepapers/wp_verizon-incident-sharing-metrics-framework_en_xg.pdf [REST URL parameter 2]

1.860. http://www.verizonbusiness.com/resources/whitepapers/wp_verizon-incident-sharing-metrics-framework_en_xg.pdf [REST URL parameter 2]

1.861. http://www.verizonbusiness.com/resources/whitepapers/wp_verizon-incident-sharing-metrics-framework_en_xg.pdf [REST URL parameter 3]

1.862. http://www.verizonbusiness.com/resources/whitepapers/wp_verizon-incident-sharing-metrics-framework_en_xg.pdf [REST URL parameter 3]

1.863. http://www.verizonbusiness.com/se/ [REST URL parameter 1]

1.864. http://www.verizonbusiness.com/se/ [REST URL parameter 1]

1.865. http://www.verizonbusiness.com/se/solutions/var/ [REST URL parameter 1]

1.866. http://www.verizonbusiness.com/se/solutions/var/ [REST URL parameter 1]

1.867. http://www.verizonbusiness.com/se/solutions/var/ [REST URL parameter 2]

1.868. http://www.verizonbusiness.com/se/solutions/var/ [REST URL parameter 2]

1.869. http://www.verizonbusiness.com/se/solutions/var/ [REST URL parameter 3]

1.870. http://www.verizonbusiness.com/se/solutions/var/ [REST URL parameter 3]

1.871. http://www.verizonbusiness.com/sg/ [REST URL parameter 1]

1.872. http://www.verizonbusiness.com/sg/ [REST URL parameter 1]

1.873. http://www.verizonbusiness.com/sitemap/ [REST URL parameter 1]

1.874. http://www.verizonbusiness.com/sitemap/ [REST URL parameter 1]

1.875. http://www.verizonbusiness.com/solutions/ [REST URL parameter 1]

1.876. http://www.verizonbusiness.com/solutions/ [REST URL parameter 1]

1.877. http://www.verizonbusiness.com/solutions/byindustry/ [REST URL parameter 1]

1.878. http://www.verizonbusiness.com/solutions/byindustry/ [REST URL parameter 1]

1.879. http://www.verizonbusiness.com/solutions/byindustry/ [REST URL parameter 2]

1.880. http://www.verizonbusiness.com/solutions/byindustry/ [REST URL parameter 2]

1.881. http://www.verizonbusiness.com/solutions/byneed/ [REST URL parameter 1]

1.882. http://www.verizonbusiness.com/solutions/byneed/ [REST URL parameter 1]

1.883. http://www.verizonbusiness.com/solutions/byneed/ [REST URL parameter 2]

1.884. http://www.verizonbusiness.com/solutions/byneed/ [REST URL parameter 2]

1.885. http://www.verizonbusiness.com/solutions/byneed/agility/ [REST URL parameter 1]

1.886. http://www.verizonbusiness.com/solutions/byneed/agility/ [REST URL parameter 1]

1.887. http://www.verizonbusiness.com/solutions/byneed/agility/ [REST URL parameter 2]

1.888. http://www.verizonbusiness.com/solutions/byneed/agility/ [REST URL parameter 2]

1.889. http://www.verizonbusiness.com/solutions/byneed/agility/ [REST URL parameter 3]

1.890. http://www.verizonbusiness.com/solutions/byneed/agility/ [REST URL parameter 3]

1.891. http://www.verizonbusiness.com/solutions/byneed/performance/ [REST URL parameter 1]

1.892. http://www.verizonbusiness.com/solutions/byneed/performance/ [REST URL parameter 1]

1.893. http://www.verizonbusiness.com/solutions/byneed/performance/ [REST URL parameter 2]

1.894. http://www.verizonbusiness.com/solutions/byneed/performance/ [REST URL parameter 2]

1.895. http://www.verizonbusiness.com/solutions/byneed/performance/ [REST URL parameter 3]

1.896. http://www.verizonbusiness.com/solutions/byneed/performance/ [REST URL parameter 3]

1.897. http://www.verizonbusiness.com/solutions/byneed/risk/ [REST URL parameter 1]

1.898. http://www.verizonbusiness.com/solutions/byneed/risk/ [REST URL parameter 1]

1.899. http://www.verizonbusiness.com/solutions/byneed/risk/ [REST URL parameter 2]

1.900. http://www.verizonbusiness.com/solutions/byneed/risk/ [REST URL parameter 2]

1.901. http://www.verizonbusiness.com/solutions/byneed/risk/ [REST URL parameter 3]

1.902. http://www.verizonbusiness.com/solutions/byneed/risk/ [REST URL parameter 3]

1.903. http://www.verizonbusiness.com/solutions/byneed/sustainability/ [REST URL parameter 1]

1.904. http://www.verizonbusiness.com/solutions/byneed/sustainability/ [REST URL parameter 1]

1.905. http://www.verizonbusiness.com/solutions/byneed/sustainability/ [REST URL parameter 2]

1.906. http://www.verizonbusiness.com/solutions/byneed/sustainability/ [REST URL parameter 2]

1.907. http://www.verizonbusiness.com/solutions/byneed/sustainability/ [REST URL parameter 3]

1.908. http://www.verizonbusiness.com/solutions/byneed/sustainability/ [REST URL parameter 3]

1.909. http://www.verizonbusiness.com/solutions/bysolutions/ [REST URL parameter 1]

1.910. http://www.verizonbusiness.com/solutions/bysolutions/ [REST URL parameter 1]

1.911. http://www.verizonbusiness.com/solutions/bysolutions/ [REST URL parameter 2]

1.912. http://www.verizonbusiness.com/solutions/bysolutions/ [REST URL parameter 2]

1.913. http://www.verizonbusiness.com/solutions/bysolutions/app-performance/ [REST URL parameter 1]

1.914. http://www.verizonbusiness.com/solutions/bysolutions/app-performance/ [REST URL parameter 1]

1.915. http://www.verizonbusiness.com/solutions/bysolutions/app-performance/ [REST URL parameter 2]

1.916. http://www.verizonbusiness.com/solutions/bysolutions/app-performance/ [REST URL parameter 2]

1.917. http://www.verizonbusiness.com/solutions/bysolutions/app-performance/ [REST URL parameter 3]

1.918. http://www.verizonbusiness.com/solutions/bysolutions/app-performance/ [REST URL parameter 3]

1.919. http://www.verizonbusiness.com/solutions/bysolutions/automation/ [REST URL parameter 1]

1.920. http://www.verizonbusiness.com/solutions/bysolutions/automation/ [REST URL parameter 1]

1.921. http://www.verizonbusiness.com/solutions/bysolutions/automation/ [REST URL parameter 2]

1.922. http://www.verizonbusiness.com/solutions/bysolutions/automation/ [REST URL parameter 2]

1.923. http://www.verizonbusiness.com/solutions/bysolutions/automation/ [REST URL parameter 3]

1.924. http://www.verizonbusiness.com/solutions/bysolutions/automation/ [REST URL parameter 3]

1.925. http://www.verizonbusiness.com/solutions/bysolutions/cloud/ [REST URL parameter 1]

1.926. http://www.verizonbusiness.com/solutions/bysolutions/cloud/ [REST URL parameter 1]

1.927. http://www.verizonbusiness.com/solutions/bysolutions/cloud/ [REST URL parameter 2]

1.928. http://www.verizonbusiness.com/solutions/bysolutions/cloud/ [REST URL parameter 2]

1.929. http://www.verizonbusiness.com/solutions/bysolutions/cloud/ [REST URL parameter 3]

1.930. http://www.verizonbusiness.com/solutions/bysolutions/cloud/ [REST URL parameter 3]

1.931. http://www.verizonbusiness.com/solutions/bysolutions/contact-center/ [REST URL parameter 1]

1.932. http://www.verizonbusiness.com/solutions/bysolutions/contact-center/ [REST URL parameter 1]

1.933. http://www.verizonbusiness.com/solutions/bysolutions/contact-center/ [REST URL parameter 2]

1.934. http://www.verizonbusiness.com/solutions/bysolutions/contact-center/ [REST URL parameter 2]

1.935. http://www.verizonbusiness.com/solutions/bysolutions/contact-center/ [REST URL parameter 3]

1.936. http://www.verizonbusiness.com/solutions/bysolutions/contact-center/ [REST URL parameter 3]

1.937. http://www.verizonbusiness.com/solutions/bysolutions/continuity/ [REST URL parameter 1]

1.938. http://www.verizonbusiness.com/solutions/bysolutions/continuity/ [REST URL parameter 1]

1.939. http://www.verizonbusiness.com/solutions/bysolutions/continuity/ [REST URL parameter 2]

1.940. http://www.verizonbusiness.com/solutions/bysolutions/continuity/ [REST URL parameter 2]

1.941. http://www.verizonbusiness.com/solutions/bysolutions/continuity/ [REST URL parameter 3]

1.942. http://www.verizonbusiness.com/solutions/bysolutions/continuity/ [REST URL parameter 3]

1.943. http://www.verizonbusiness.com/solutions/bysolutions/emergency/ [REST URL parameter 1]

1.944. http://www.verizonbusiness.com/solutions/bysolutions/emergency/ [REST URL parameter 1]

1.945. http://www.verizonbusiness.com/solutions/bysolutions/emergency/ [REST URL parameter 2]

1.946. http://www.verizonbusiness.com/solutions/bysolutions/emergency/ [REST URL parameter 2]

1.947. http://www.verizonbusiness.com/solutions/bysolutions/emergency/ [REST URL parameter 3]

1.948. http://www.verizonbusiness.com/solutions/bysolutions/emergency/ [REST URL parameter 3]

1.949. http://www.verizonbusiness.com/solutions/bysolutions/field/ [REST URL parameter 1]

1.950. http://www.verizonbusiness.com/solutions/bysolutions/field/ [REST URL parameter 1]

1.951. http://www.verizonbusiness.com/solutions/bysolutions/field/ [REST URL parameter 2]

1.952. http://www.verizonbusiness.com/solutions/bysolutions/field/ [REST URL parameter 2]

1.953. http://www.verizonbusiness.com/solutions/bysolutions/field/ [REST URL parameter 3]

1.954. http://www.verizonbusiness.com/solutions/bysolutions/field/ [REST URL parameter 3]

1.955. http://www.verizonbusiness.com/solutions/bysolutions/infrastructure/ [REST URL parameter 1]

1.956. http://www.verizonbusiness.com/solutions/bysolutions/infrastructure/ [REST URL parameter 1]

1.957. http://www.verizonbusiness.com/solutions/bysolutions/infrastructure/ [REST URL parameter 2]

1.958. http://www.verizonbusiness.com/solutions/bysolutions/infrastructure/ [REST URL parameter 2]

1.959. http://www.verizonbusiness.com/solutions/bysolutions/infrastructure/ [REST URL parameter 3]

1.960. http://www.verizonbusiness.com/solutions/bysolutions/infrastructure/ [REST URL parameter 3]

1.961. http://www.verizonbusiness.com/solutions/bysolutions/managed/ [REST URL parameter 1]

1.962. http://www.verizonbusiness.com/solutions/bysolutions/managed/ [REST URL parameter 1]

1.963. http://www.verizonbusiness.com/solutions/bysolutions/managed/ [REST URL parameter 2]

1.964. http://www.verizonbusiness.com/solutions/bysolutions/managed/ [REST URL parameter 2]

1.965. http://www.verizonbusiness.com/solutions/bysolutions/managed/ [REST URL parameter 3]

1.966. http://www.verizonbusiness.com/solutions/bysolutions/managed/ [REST URL parameter 3]

1.967. http://www.verizonbusiness.com/solutions/bysolutions/networking/ [REST URL parameter 1]

1.968. http://www.verizonbusiness.com/solutions/bysolutions/networking/ [REST URL parameter 1]

1.969. http://www.verizonbusiness.com/solutions/bysolutions/networking/ [REST URL parameter 2]

1.970. http://www.verizonbusiness.com/solutions/bysolutions/networking/ [REST URL parameter 2]

1.971. http://www.verizonbusiness.com/solutions/bysolutions/networking/ [REST URL parameter 3]

1.972. http://www.verizonbusiness.com/solutions/bysolutions/networking/ [REST URL parameter 3]

1.973. http://www.verizonbusiness.com/solutions/bysolutions/outsourcing/ [REST URL parameter 1]

1.974. http://www.verizonbusiness.com/solutions/bysolutions/outsourcing/ [REST URL parameter 1]

1.975. http://www.verizonbusiness.com/solutions/bysolutions/outsourcing/ [REST URL parameter 2]

1.976. http://www.verizonbusiness.com/solutions/bysolutions/outsourcing/ [REST URL parameter 2]

1.977. http://www.verizonbusiness.com/solutions/bysolutions/outsourcing/ [REST URL parameter 3]

1.978. http://www.verizonbusiness.com/solutions/bysolutions/outsourcing/ [REST URL parameter 3]

1.979. http://www.verizonbusiness.com/solutions/bysolutions/productivity/ [REST URL parameter 1]

1.980. http://www.verizonbusiness.com/solutions/bysolutions/productivity/ [REST URL parameter 1]

1.981. http://www.verizonbusiness.com/solutions/bysolutions/productivity/ [REST URL parameter 2]

1.982. http://www.verizonbusiness.com/solutions/bysolutions/productivity/ [REST URL parameter 2]

1.983. http://www.verizonbusiness.com/solutions/bysolutions/productivity/ [REST URL parameter 3]

1.984. http://www.verizonbusiness.com/solutions/bysolutions/productivity/ [REST URL parameter 3]

1.985. http://www.verizonbusiness.com/solutions/bysolutions/professional/ [REST URL parameter 1]

1.986. http://www.verizonbusiness.com/solutions/bysolutions/professional/ [REST URL parameter 1]

1.987. http://www.verizonbusiness.com/solutions/bysolutions/professional/ [REST URL parameter 2]

1.988. http://www.verizonbusiness.com/solutions/bysolutions/professional/ [REST URL parameter 2]

1.989. http://www.verizonbusiness.com/solutions/bysolutions/professional/ [REST URL parameter 3]

1.990. http://www.verizonbusiness.com/solutions/bysolutions/professional/ [REST URL parameter 3]

1.991. http://www.verizonbusiness.com/solutions/bysolutions/security/ [REST URL parameter 1]

1.992. http://www.verizonbusiness.com/solutions/bysolutions/security/ [REST URL parameter 1]

1.993. http://www.verizonbusiness.com/solutions/bysolutions/security/ [REST URL parameter 2]

1.994. http://www.verizonbusiness.com/solutions/bysolutions/security/ [REST URL parameter 2]

1.995. http://www.verizonbusiness.com/solutions/bysolutions/security/ [REST URL parameter 3]

1.996. http://www.verizonbusiness.com/solutions/bysolutions/security/ [REST URL parameter 3]

1.997. http://www.verizonbusiness.com/solutions/bysolutions/ucc/ [REST URL parameter 1]

1.998. http://www.verizonbusiness.com/solutions/bysolutions/ucc/ [REST URL parameter 1]

1.999. http://www.verizonbusiness.com/solutions/bysolutions/ucc/ [REST URL parameter 2]

1.1000. http://www.verizonbusiness.com/solutions/bysolutions/ucc/ [REST URL parameter 2]

1.1001. http://www.verizonbusiness.com/solutions/bysolutions/ucc/ [REST URL parameter 3]

1.1002. http://www.verizonbusiness.com/solutions/bysolutions/ucc/ [REST URL parameter 3]

1.1003. http://www.verizonbusiness.com/solutions/education/ [REST URL parameter 1]

1.1004. http://www.verizonbusiness.com/solutions/education/ [REST URL parameter 1]

1.1005. http://www.verizonbusiness.com/solutions/education/ [REST URL parameter 2]

1.1006. http://www.verizonbusiness.com/solutions/education/ [REST URL parameter 2]

1.1007. http://www.verizonbusiness.com/solutions/finance/ [REST URL parameter 1]

1.1008. http://www.verizonbusiness.com/solutions/finance/ [REST URL parameter 1]

1.1009. http://www.verizonbusiness.com/solutions/finance/ [REST URL parameter 2]

1.1010. http://www.verizonbusiness.com/solutions/finance/ [REST URL parameter 2]

1.1011. http://www.verizonbusiness.com/solutions/government/ [REST URL parameter 1]

1.1012. http://www.verizonbusiness.com/solutions/government/ [REST URL parameter 1]

1.1013. http://www.verizonbusiness.com/solutions/government/ [REST URL parameter 2]

1.1014. http://www.verizonbusiness.com/solutions/government/ [REST URL parameter 2]

1.1015. http://www.verizonbusiness.com/solutions/healthcare/ [REST URL parameter 1]

1.1016. http://www.verizonbusiness.com/solutions/healthcare/ [REST URL parameter 1]

1.1017. http://www.verizonbusiness.com/solutions/healthcare/ [REST URL parameter 2]

1.1018. http://www.verizonbusiness.com/solutions/healthcare/ [REST URL parameter 2]

1.1019. http://www.verizonbusiness.com/solutions/retail/ [REST URL parameter 1]

1.1020. http://www.verizonbusiness.com/solutions/retail/ [REST URL parameter 1]

1.1021. http://www.verizonbusiness.com/solutions/retail/ [REST URL parameter 2]

1.1022. http://www.verizonbusiness.com/solutions/retail/ [REST URL parameter 2]

1.1023. http://www.verizonbusiness.com/solutions/utility/ [REST URL parameter 1]

1.1024. http://www.verizonbusiness.com/solutions/utility/ [REST URL parameter 1]

1.1025. http://www.verizonbusiness.com/solutions/utility/ [REST URL parameter 2]

1.1026. http://www.verizonbusiness.com/solutions/utility/ [REST URL parameter 2]

1.1027. http://www.verizonbusiness.com/solutions/var/index.xml [REST URL parameter 1]

1.1028. http://www.verizonbusiness.com/solutions/var/index.xml [REST URL parameter 1]

1.1029. http://www.verizonbusiness.com/solutions/var/index.xml [REST URL parameter 2]

1.1030. http://www.verizonbusiness.com/solutions/var/index.xml [REST URL parameter 2]

1.1031. http://www.verizonbusiness.com/solutions/var/index.xml [REST URL parameter 3]

1.1032. http://www.verizonbusiness.com/solutions/var/index.xml [REST URL parameter 3]

1.1033. http://www.verizonbusiness.com/solutions/wholesale/ [REST URL parameter 1]

1.1034. http://www.verizonbusiness.com/solutions/wholesale/ [REST URL parameter 1]

1.1035. http://www.verizonbusiness.com/solutions/wholesale/ [REST URL parameter 2]

1.1036. http://www.verizonbusiness.com/solutions/wholesale/ [REST URL parameter 2]

1.1037. http://www.verizonbusiness.com/solutions/wholesale/ips/ [REST URL parameter 1]

1.1038. http://www.verizonbusiness.com/solutions/wholesale/ips/ [REST URL parameter 1]

1.1039. http://www.verizonbusiness.com/solutions/wholesale/ips/ [REST URL parameter 2]

1.1040. http://www.verizonbusiness.com/solutions/wholesale/ips/ [REST URL parameter 2]

1.1041. http://www.verizonbusiness.com/solutions/wholesale/ips/ [REST URL parameter 3]

1.1042. http://www.verizonbusiness.com/solutions/wholesale/ips/ [REST URL parameter 3]

1.1043. http://www.verizonbusiness.com/solutions/wholesale/us/ [REST URL parameter 1]

1.1044. http://www.verizonbusiness.com/solutions/wholesale/us/ [REST URL parameter 1]

1.1045. http://www.verizonbusiness.com/solutions/wholesale/us/ [REST URL parameter 2]

1.1046. http://www.verizonbusiness.com/solutions/wholesale/us/ [REST URL parameter 2]

1.1047. http://www.verizonbusiness.com/solutions/wholesale/us/ [REST URL parameter 3]

1.1048. http://www.verizonbusiness.com/solutions/wholesale/us/ [REST URL parameter 3]

1.1049. http://www.verizonbusiness.com/support/ [REST URL parameter 1]

1.1050. http://www.verizonbusiness.com/support/ [REST URL parameter 1]

1.1051. http://www.verizonbusiness.com/support/myaccount/ [REST URL parameter 1]

1.1052. http://www.verizonbusiness.com/support/myaccount/ [REST URL parameter 1]

1.1053. http://www.verizonbusiness.com/support/myaccount/ [REST URL parameter 2]

1.1054. http://www.verizonbusiness.com/support/myaccount/ [REST URL parameter 2]

1.1055. http://www.verizonbusiness.com/support/myaccount/tools/ [REST URL parameter 1]

1.1056. http://www.verizonbusiness.com/support/myaccount/tools/ [REST URL parameter 1]

1.1057. http://www.verizonbusiness.com/support/myaccount/tools/ [REST URL parameter 2]

1.1058. http://www.verizonbusiness.com/support/myaccount/tools/ [REST URL parameter 2]

1.1059. http://www.verizonbusiness.com/support/myaccount/tools/ [REST URL parameter 3]

1.1060. http://www.verizonbusiness.com/support/myaccount/tools/ [REST URL parameter 3]

1.1061. http://www.verizonbusiness.com/support/myaccount/tools/center/ [REST URL parameter 1]

1.1062. http://www.verizonbusiness.com/support/myaccount/tools/center/ [REST URL parameter 1]

1.1063. http://www.verizonbusiness.com/support/myaccount/tools/center/ [REST URL parameter 2]

1.1064. http://www.verizonbusiness.com/support/myaccount/tools/center/ [REST URL parameter 2]

1.1065. http://www.verizonbusiness.com/support/myaccount/tools/center/ [REST URL parameter 3]

1.1066. http://www.verizonbusiness.com/support/myaccount/tools/center/ [REST URL parameter 3]

1.1067. http://www.verizonbusiness.com/support/myaccount/tools/center/ [REST URL parameter 4]

1.1068. http://www.verizonbusiness.com/support/myaccount/tools/center/ [REST URL parameter 4]

1.1069. http://www.verizonbusiness.com/support/myaccount/tools/ebonding/ [REST URL parameter 1]

1.1070. http://www.verizonbusiness.com/support/myaccount/tools/ebonding/ [REST URL parameter 1]

1.1071. http://www.verizonbusiness.com/support/myaccount/tools/ebonding/ [REST URL parameter 2]

1.1072. http://www.verizonbusiness.com/support/myaccount/tools/ebonding/ [REST URL parameter 2]

1.1073. http://www.verizonbusiness.com/support/myaccount/tools/ebonding/ [REST URL parameter 3]

1.1074. http://www.verizonbusiness.com/support/myaccount/tools/ebonding/ [REST URL parameter 3]

1.1075. http://www.verizonbusiness.com/support/myaccount/tools/ebonding/ [REST URL parameter 4]

1.1076. http://www.verizonbusiness.com/support/myaccount/tools/ebonding/ [REST URL parameter 4]

1.1077. http://www.verizonbusiness.com/support/myaccount/tools/edibilling/ [REST URL parameter 1]

1.1078. http://www.verizonbusiness.com/support/myaccount/tools/edibilling/ [REST URL parameter 1]

1.1079. http://www.verizonbusiness.com/support/myaccount/tools/edibilling/ [REST URL parameter 2]

1.1080. http://www.verizonbusiness.com/support/myaccount/tools/edibilling/ [REST URL parameter 2]

1.1081. http://www.verizonbusiness.com/support/myaccount/tools/edibilling/ [REST URL parameter 3]

1.1082. http://www.verizonbusiness.com/support/myaccount/tools/edibilling/ [REST URL parameter 3]

1.1083. http://www.verizonbusiness.com/support/myaccount/tools/edibilling/ [REST URL parameter 4]

1.1084. http://www.verizonbusiness.com/support/myaccount/tools/edibilling/ [REST URL parameter 4]

1.1085. http://www.verizonbusiness.com/templates/expressInstall.swf [REST URL parameter 1]

1.1086. http://www.verizonbusiness.com/templates/expressInstall.swf [REST URL parameter 1]

1.1087. http://www.verizonbusiness.com/templates/expressInstall.swf [REST URL parameter 2]

1.1088. http://www.verizonbusiness.com/templates/expressInstall.swf [REST URL parameter 2]

1.1089. http://www.verizonbusiness.com/templates/hbx.js [REST URL parameter 1]

1.1090. http://www.verizonbusiness.com/templates/hbx.js [REST URL parameter 1]

1.1091. http://www.verizonbusiness.com/templates/hbx.js [REST URL parameter 2]

1.1092. http://www.verizonbusiness.com/templates/hbx.js [REST URL parameter 2]

1.1093. http://www.verizonbusiness.com/templates/js-+jquery/jquery+swfobject2+vzbar/site.js [REST URL parameter 1]

1.1094. http://www.verizonbusiness.com/templates/js-+jquery/jquery+swfobject2+vzbar/site.js [REST URL parameter 1]

1.1095. http://www.verizonbusiness.com/templates/js-+jquery/jquery+swfobject2+vzbar/site.js [REST URL parameter 2]

1.1096. http://www.verizonbusiness.com/templates/js-+jquery/jquery+swfobject2+vzbar/site.js [REST URL parameter 2]

1.1097. http://www.verizonbusiness.com/templates/js-+jquery/jquery+swfobject2+vzbar/site.js [REST URL parameter 4]

1.1098. http://www.verizonbusiness.com/templates/js-+jquery/jquery+swfobject2+vzbar/site.js [REST URL parameter 4]

1.1099. http://www.verizonbusiness.com/templates/vzbar/bert.xml [REST URL parameter 1]

1.1100. http://www.verizonbusiness.com/templates/vzbar/bert.xml [REST URL parameter 1]

1.1101. http://www.verizonbusiness.com/templates/vzbar/bert.xml [REST URL parameter 2]

1.1102. http://www.verizonbusiness.com/templates/vzbar/bert.xml [REST URL parameter 2]

1.1103. http://www.verizonbusiness.com/templates/vzbar/bert.xml [REST URL parameter 3]

1.1104. http://www.verizonbusiness.com/templates/vzbar/bert.xml [REST URL parameter 3]

1.1105. http://www.verizonbusiness.com/terms/ [REST URL parameter 1]

1.1106. http://www.verizonbusiness.com/terms/ [REST URL parameter 1]

1.1107. http://www.verizonbusiness.com/thinkforward/ [REST URL parameter 1]

1.1108. http://www.verizonbusiness.com/thinkforward/ [REST URL parameter 1]

1.1109. http://www.verizonbusiness.com/topnav.xml [REST URL parameter 1]

1.1110. http://www.verizonbusiness.com/topnav.xml [REST URL parameter 1]

1.1111. http://www.verizonbusiness.com/tw/ [REST URL parameter 1]

1.1112. http://www.verizonbusiness.com/tw/ [REST URL parameter 1]

1.1113. http://www.verizonbusiness.com/uk/ [REST URL parameter 1]

1.1114. http://www.verizonbusiness.com/uk/ [REST URL parameter 1]

1.1115. http://www.verizonbusiness.com/uk/solutions/var/ [REST URL parameter 1]

1.1116. http://www.verizonbusiness.com/uk/solutions/var/ [REST URL parameter 1]

1.1117. http://www.verizonbusiness.com/uk/solutions/var/ [REST URL parameter 2]

1.1118. http://www.verizonbusiness.com/uk/solutions/var/ [REST URL parameter 2]

1.1119. http://www.verizonbusiness.com/uk/solutions/var/ [REST URL parameter 3]

1.1120. http://www.verizonbusiness.com/uk/solutions/var/ [REST URL parameter 3]

1.1121. http://www.verizonbusiness.com/us/ [REST URL parameter 1]

1.1122. http://www.verizonbusiness.com/us/ [REST URL parameter 1]

1.1123. http://www.verizonbusiness.com/us/solutions/var/ [REST URL parameter 1]

1.1124. http://www.verizonbusiness.com/us/solutions/var/ [REST URL parameter 1]

1.1125. http://www.verizonbusiness.com/us/solutions/var/ [REST URL parameter 2]

1.1126. http://www.verizonbusiness.com/us/solutions/var/ [REST URL parameter 2]

1.1127. http://www.verizonbusiness.com/us/solutions/var/ [REST URL parameter 3]

1.1128. http://www.verizonbusiness.com/us/solutions/var/ [REST URL parameter 3]

1.1129. http://www.verizonbusiness.com/us/support/ [REST URL parameter 1]

1.1130. http://www.verizonbusiness.com/us/support/ [REST URL parameter 1]

1.1131. http://www.verizonbusiness.com/us/support/ [REST URL parameter 2]

1.1132. http://www.verizonbusiness.com/us/support/ [REST URL parameter 2]

1.1133. http://www.verizonbusiness.com/ve/ [REST URL parameter 1]

1.1134. http://www.verizonbusiness.com/ve/ [REST URL parameter 1]

1.1135. http://www.verizonbusiness.com/worldwide/resources/media/index-131046-wifi+shopping+borders.xml [REST URL parameter 1]

1.1136. http://www.verizonbusiness.com/worldwide/resources/media/index-131046-wifi+shopping+borders.xml [REST URL parameter 1]

1.1137. http://www.verizonbusiness.com/worldwide/resources/media/index-131046-wifi+shopping+borders.xml [REST URL parameter 2]

1.1138. http://www.verizonbusiness.com/worldwide/resources/media/index-131046-wifi+shopping+borders.xml [REST URL parameter 2]

1.1139. http://www.verizonbusiness.com/worldwide/resources/media/index-131046-wifi+shopping+borders.xml [REST URL parameter 3]

1.1140. http://www.verizonbusiness.com/worldwide/resources/media/index-131046-wifi+shopping+borders.xml [REST URL parameter 3]

1.1141. http://www.verizonbusiness.com/worldwide/resources/media/index-131046-wifi+shopping+borders.xml [REST URL parameter 4]

1.1142. http://www.verizonbusiness.com/worldwide/resources/media/index.xml [REST URL parameter 1]

1.1143. http://www.verizonbusiness.com/worldwide/resources/media/index.xml [REST URL parameter 1]

1.1144. http://www.verizonbusiness.com/worldwide/resources/media/index.xml [REST URL parameter 2]

1.1145. http://www.verizonbusiness.com/worldwide/resources/media/index.xml [REST URL parameter 2]

1.1146. http://www.verizonbusiness.com/worldwide/resources/media/index.xml [REST URL parameter 3]

1.1147. http://www.verizonbusiness.com/worldwide/resources/media/index.xml [REST URL parameter 3]

1.1148. http://www.verizonbusiness.com/worldwide/resources/media/index.xml [REST URL parameter 4]

1.1149. http://www.verizonbusiness.com/worldwide/resources/media/index.xml [REST URL parameter 4]

1.1150. http://www.verizonbusiness.com/worldwide/resources/media/large-131421-mitsui.xml [REST URL parameter 1]

1.1151. http://www.verizonbusiness.com/worldwide/resources/media/large-131421-mitsui.xml [REST URL parameter 1]

1.1152. http://www.verizonbusiness.com/worldwide/resources/media/large-131421-mitsui.xml [REST URL parameter 2]

1.1153. http://www.verizonbusiness.com/worldwide/resources/media/large-131421-mitsui.xml [REST URL parameter 2]

1.1154. http://www.verizonbusiness.com/worldwide/resources/media/large-131421-mitsui.xml [REST URL parameter 3]

1.1155. http://www.verizonbusiness.com/worldwide/resources/media/large-131421-mitsui.xml [REST URL parameter 3]

1.1156. http://www.verizonbusiness.com/worldwide/resources/media/large-131421-mitsui.xml [REST URL parameter 4]

1.1157. http://www.verizonbusiness.com/worldwide/resources/media/large-131513-mitsui.xml [REST URL parameter 1]

1.1158. http://www.verizonbusiness.com/worldwide/resources/media/large-131513-mitsui.xml [REST URL parameter 1]

1.1159. http://www.verizonbusiness.com/worldwide/resources/media/large-131513-mitsui.xml [REST URL parameter 2]

1.1160. http://www.verizonbusiness.com/worldwide/resources/media/large-131513-mitsui.xml [REST URL parameter 2]

1.1161. http://www.verizonbusiness.com/worldwide/resources/media/large-131513-mitsui.xml [REST URL parameter 3]

1.1162. http://www.verizonbusiness.com/worldwide/resources/media/large-131513-mitsui.xml [REST URL parameter 3]

1.1163. http://www.verizonbusiness.com/worldwide/resources/media/large-131513-mitsui.xml [REST URL parameter 4]

1.1164. http://www.verizonbusiness.com/Medium/ [User-Agent HTTP header]

1.1165. http://www.verizonbusiness.com/ar/ [User-Agent HTTP header]

1.1166. http://www.verizonbusiness.com/at/ [User-Agent HTTP header]

1.1167. http://www.verizonbusiness.com/cl/ [User-Agent HTTP header]

1.1168. http://www.verizonbusiness.com/co/ [User-Agent HTTP header]

1.1169. http://www.verizonbusiness.com/de/ [User-Agent HTTP header]

1.1170. http://www.verizonbusiness.com/es/ [User-Agent HTTP header]

1.1171. http://www.verizonbusiness.com/fr/ [User-Agent HTTP header]

1.1172. http://www.verizonbusiness.com/jp/ [User-Agent HTTP header]

1.1173. http://www.verizonbusiness.com/mx/ [User-Agent HTTP header]

1.1174. http://www.verizonbusiness.com/pa/ [User-Agent HTTP header]

1.1175. http://www.verizonbusiness.com/ve/ [User-Agent HTTP header]



1. Cross-site scripting (reflected)
There are 1175 instances of this issue:

Issue background

Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application.

The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes.

Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in blog comments. And they can create an innocuous looking web site which causes anyone viewing it to make arbitrary cross-domain requests to the vulnerable application (using either the GET or the POST method).

The security impact of cross-site scripting vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality which it contains, and the other applications which belong to the same domain and organisation. If the application is used only to display non-sensitive public content, with no authentication or access control functionality, then a cross-site scripting flaw may be considered low risk. However, if the same application resides on a domain which can access cookies for other more security-critical applications, then the vulnerability could be used to attack those other applications, and so may be considered high risk. Similarly, if the organisation which owns the application is a likely target for phishing attacks, then the vulnerability could be leveraged to lend credibility to such attacks, by injecting Trojan functionality into the vulnerable application, and exploiting users' trust in the organisation in order to capture credentials for other applications which it owns. In many kinds of application, such as those providing online banking functionality, cross-site scripting should always be considered high risk.

Remediation background

In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defences:In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.


1.1. http://www.verizonbusiness.com/Medium/ [REST URL parameter 1]  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Medium/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 6d0f9"%3b46e9706f56f was submitted in the REST URL parameter 1. This input was echoed as 6d0f9";46e9706f56f in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Medium6d0f9"%3b46e9706f56f/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:54:03 GMT
Content-Type: text/html
Content-Length: 21448
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:54:03 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:54:03 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Medium6d0f9";46e9706f56f/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.2. http://www.verizonbusiness.com/Medium/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Medium/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 5e43b'%3bf51cd8dd011 was submitted in the REST URL parameter 1. This input was echoed as 5e43b';f51cd8dd011 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Medium5e43b'%3bf51cd8dd011/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:54:11 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42595
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:54:11 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:54:11 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Medium5e43b';f51cd8dd011/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.3. http://www.verizonbusiness.com/Medium/products/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Medium/products/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 164ab'%3bf28adc8d829 was submitted in the REST URL parameter 1. This input was echoed as 164ab';f28adc8d829 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Medium164ab'%3bf28adc8d829/products/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:54:06 GMT
Content-Type: text/html
Content-Length: 21466
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:54:06 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:54:06 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Medium164ab';f28adc8d829/products/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.4. http://www.verizonbusiness.com/Medium/products/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Medium/products/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload fd738"%3b7f057f5a9e7 was submitted in the REST URL parameter 1. This input was echoed as fd738";7f057f5a9e7 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Mediumfd738"%3b7f057f5a9e7/products/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:54:00 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 21466
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:54:01 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:54:00 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Mediumfd738";7f057f5a9e7/products/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SU
...[SNIP]...

1.5. http://www.verizonbusiness.com/Medium/products/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Medium/products/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 56975"%3bb35bb28a897 was submitted in the REST URL parameter 2. This input was echoed as 56975";b35bb28a897 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Medium/products56975"%3bb35bb28a897/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:54:16 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 21696
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:54:16 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:54:16 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Medium/products56975";b35bb28a897/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.6. http://www.verizonbusiness.com/Medium/products/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Medium/products/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a553e'%3b46a05cb868f was submitted in the REST URL parameter 2. This input was echoed as a553e';46a05cb868f in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Medium/productsa553e'%3b46a05cb868f/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:54:28 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 21694
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:54:28 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:54:28 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Medium/productsa553e';46a05cb868f/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.7. http://www.verizonbusiness.com/Medium/products/itinfrastructure/computing/caas_smb/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Medium/products/itinfrastructure/computing/caas_smb/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 51566'%3b5cc3f61f373 was submitted in the REST URL parameter 1. This input was echoed as 51566';5cc3f61f373 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Medium51566'%3b5cc3f61f373/products/itinfrastructure/computing/caas_smb/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:54:48 GMT
Content-Type: text/html
Content-Length: 42685
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:54:48 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:54:48 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link type="text/css" href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Medium51566';5cc3f61f373/products/itinfrastructure/computing/caas_smb/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.8. http://www.verizonbusiness.com/Medium/products/itinfrastructure/computing/caas_smb/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Medium/products/itinfrastructure/computing/caas_smb/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 1f91e"%3b44be4195806 was submitted in the REST URL parameter 1. This input was echoed as 1f91e";44be4195806 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Medium1f91e"%3b44be4195806/products/itinfrastructure/computing/caas_smb/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:54:34 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 21538
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:54:34 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:54:34 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link med
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Medium1f91e";44be4195806/products/itinfrastructure/computing/caas_smb/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FO
...[SNIP]...

1.9. http://www.verizonbusiness.com/Medium/products/itinfrastructure/computing/caas_smb/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Medium/products/itinfrastructure/computing/caas_smb/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 569d6"%3b3b43c54ad1a was submitted in the REST URL parameter 2. This input was echoed as 569d6";3b43c54ad1a in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Medium/products569d6"%3b3b43c54ad1a/itinfrastructure/computing/caas_smb/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:55:01 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 21766
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:55:01 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:55:01 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Medium/products569d6";3b43c54ad1a/itinfrastructure/computing/caas_smb/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDA
...[SNIP]...

1.10. http://www.verizonbusiness.com/Medium/products/itinfrastructure/computing/caas_smb/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Medium/products/itinfrastructure/computing/caas_smb/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 4f28a'%3b940680195e9 was submitted in the REST URL parameter 2. This input was echoed as 4f28a';940680195e9 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Medium/products4f28a'%3b940680195e9/itinfrastructure/computing/caas_smb/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:55:07 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 21766
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:55:07 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:55:07 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Medium/products4f28a';940680195e9/itinfrastructure/computing/caas_smb/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.11. http://www.verizonbusiness.com/Medium/products/itinfrastructure/computing/caas_smb/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Medium/products/itinfrastructure/computing/caas_smb/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 898db"%3b1665125aa22 was submitted in the REST URL parameter 3. This input was echoed as 898db";1665125aa22 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Medium/products/itinfrastructure898db"%3b1665125aa22/computing/caas_smb/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:55:23 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 21766
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:55:23 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:55:23 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Medium/products/itinfrastructure898db";1665125aa22/computing/caas_smb/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEM
...[SNIP]...

1.12. http://www.verizonbusiness.com/Medium/products/itinfrastructure/computing/caas_smb/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Medium/products/itinfrastructure/computing/caas_smb/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 81674'%3ba29f40094fd was submitted in the REST URL parameter 3. This input was echoed as 81674';a29f40094fd in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Medium/products/itinfrastructure81674'%3ba29f40094fd/computing/caas_smb/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:55:38 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 21768
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:55:38 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:55:38 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Medium/products/itinfrastructure81674';a29f40094fd/computing/caas_smb/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.13. http://www.verizonbusiness.com/Medium/products/itinfrastructure/computing/caas_smb/ [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Medium/products/itinfrastructure/computing/caas_smb/

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 40f03"%3b15f8384ea5a was submitted in the REST URL parameter 4. This input was echoed as 40f03";15f8384ea5a in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Medium/products/itinfrastructure/computing40f03"%3b15f8384ea5a/caas_smb/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:55:48 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 21766
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:55:48 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:55:48 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
;//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Medium/products/itinfrastructure/computing40f03";15f8384ea5a/caas_smb/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SU
...[SNIP]...

1.14. http://www.verizonbusiness.com/Medium/products/itinfrastructure/computing/caas_smb/ [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Medium/products/itinfrastructure/computing/caas_smb/

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 71d5f'%3be418c831cb5 was submitted in the REST URL parameter 4. This input was echoed as 71d5f';e418c831cb5 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Medium/products/itinfrastructure/computing71d5f'%3be418c831cb5/caas_smb/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:56:01 GMT
Content-Type: text/html
Content-Length: 21766
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:56:02 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:56:01 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Medium/products/itinfrastructure/computing71d5f';e418c831cb5/caas_smb/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.15. http://www.verizonbusiness.com/Medium/products/itinfrastructure/computing/caas_smb/ [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Medium/products/itinfrastructure/computing/caas_smb/

Issue detail

The value of REST URL parameter 5 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ce7a7"%3b3fec95ae7a4 was submitted in the REST URL parameter 5. This input was echoed as ce7a7";3fec95ae7a4 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Medium/products/itinfrastructure/computing/caas_smbce7a7"%3b3fec95ae7a4/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:56:17 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 21766
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:56:17 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:56:17 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
ER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Medium/products/itinfrastructure/computing/caas_smbce7a7";3fec95ae7a4/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.16. http://www.verizonbusiness.com/Medium/products/itinfrastructure/computing/caas_smb/ [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Medium/products/itinfrastructure/computing/caas_smb/

Issue detail

The value of REST URL parameter 5 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 41ab4'%3b481d5c5b252 was submitted in the REST URL parameter 5. This input was echoed as 41ab4';481d5c5b252 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Medium/products/itinfrastructure/computing/caas_smb41ab4'%3b481d5c5b252/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:56:25 GMT
Content-Type: text/html
Content-Length: 21766
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:56:25 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:56:25 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Medium/products/itinfrastructure/computing/caas_smb41ab4';481d5c5b252/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.17. http://www.verizonbusiness.com/Medium/solutions/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Medium/solutions/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 52ee7"%3b4fe464cfdc8 was submitted in the REST URL parameter 1. This input was echoed as 52ee7";4fe464cfdc8 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Medium52ee7"%3b4fe464cfdc8/solutions/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:54:01 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 21470
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:54:02 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:54:01 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Medium52ee7";4fe464cfdc8/solutions/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR S
...[SNIP]...

1.18. http://www.verizonbusiness.com/Medium/solutions/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Medium/solutions/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 80946'%3b2f4c28f49f3 was submitted in the REST URL parameter 1. This input was echoed as 80946';2f4c28f49f3 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Medium80946'%3b2f4c28f49f3/solutions/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:54:14 GMT
Content-Type: text/html
Content-Length: 42617
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:54:14 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:54:14 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Medium80946';2f4c28f49f3/solutions/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.19. http://www.verizonbusiness.com/Medium/solutions/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Medium/solutions/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload f377a'%3b4e6a1ff2712 was submitted in the REST URL parameter 2. This input was echoed as f377a';4e6a1ff2712 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Medium/solutionsf377a'%3b4e6a1ff2712/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:54:41 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 21698
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:54:41 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:54:41 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Medium/solutionsf377a';4e6a1ff2712/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.20. http://www.verizonbusiness.com/Medium/solutions/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Medium/solutions/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3e014"%3b3f87cc0569c was submitted in the REST URL parameter 2. This input was echoed as 3e014";3f87cc0569c in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Medium/solutions3e014"%3b3f87cc0569c/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:54:30 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 21696
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:54:30 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:54:30 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Medium/solutions3e014";3f87cc0569c/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.21. http://www.verizonbusiness.com/Medium/support/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Medium/support/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d7cac"%3b6347c6331eb was submitted in the REST URL parameter 1. This input was echoed as d7cac";6347c6331eb in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Mediumd7cac"%3b6347c6331eb/support/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:54:08 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 21464
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:54:08 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:54:08 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Mediumd7cac";6347c6331eb/support/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUB
...[SNIP]...

1.22. http://www.verizonbusiness.com/Medium/support/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Medium/support/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload eb22e'%3b1aef5997d13 was submitted in the REST URL parameter 1. This input was echoed as eb22e';1aef5997d13 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Mediumeb22e'%3b1aef5997d13/support/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:54:16 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 21464
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:54:17 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:54:16 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Mediumeb22e';1aef5997d13/support/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.23. http://www.verizonbusiness.com/Medium/support/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Medium/support/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7b093"%3b87092571ce5 was submitted in the REST URL parameter 2. This input was echoed as 7b093";87092571ce5 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Medium/support7b093"%3b87092571ce5/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:54:27 GMT
Content-Type: text/html
Content-Length: 21692
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:54:27 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:54:27 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link type="text/css" href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet"><link med
...[SNIP]...
} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Medium/support7b093";87092571ce5/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.24. http://www.verizonbusiness.com/Medium/support/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Medium/support/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9dff3'%3b89432a0569b was submitted in the REST URL parameter 2. This input was echoed as 9dff3';89432a0569b in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Medium/support9dff3'%3b89432a0569b/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:54:37 GMT
Content-Type: text/html
Content-Length: 21692
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:54:37 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:54:37 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link type="text/css" href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Medium/support9dff3';89432a0569b/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.25. http://www.verizonbusiness.com/Products/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 858bb'%3ba75ff52257e was submitted in the REST URL parameter 1. This input was echoed as 858bb';a75ff52257e in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products858bb'%3ba75ff52257e/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:38:48 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40616
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:38:48 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:38:48 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products858bb';a75ff52257e/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.26. http://www.verizonbusiness.com/Products/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f82ff"%3b82f06c69141 was submitted in the REST URL parameter 1. This input was echoed as f82ff";82f06c69141 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Productsf82ff"%3b82f06c69141/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:38:38 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40616
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:38:38 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:38:38 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Productsf82ff";82f06c69141/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.27. http://www.verizonbusiness.com/Products/communications/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ec852"%3b6fb5f3885aa was submitted in the REST URL parameter 1. This input was echoed as ec852";6fb5f3885aa in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Productsec852"%3b6fb5f3885aa/communications/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:42:05 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40646
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:42:05 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:42:05 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Productsec852";6fb5f3885aa/communications/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS
...[SNIP]...

1.28. http://www.verizonbusiness.com/Products/communications/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 77697'%3b7b5dd88adbe was submitted in the REST URL parameter 1. This input was echoed as 77697';7b5dd88adbe in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products77697'%3b7b5dd88adbe/communications/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:42:23 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40646
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:42:23 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:42:23 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products77697';7b5dd88adbe/communications/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.29. http://www.verizonbusiness.com/Products/communications/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3394a"%3bc776f339cc0 was submitted in the REST URL parameter 2. This input was echoed as 3394a";c776f339cc0 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communications3394a"%3bc776f339cc0/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:42:57 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42311
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:42:57 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:42:57 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/communications3394a";c776f339cc0/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.30. http://www.verizonbusiness.com/Products/communications/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a8f05'%3b973ed6f0057 was submitted in the REST URL parameter 2. This input was echoed as a8f05';973ed6f0057 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communicationsa8f05'%3b973ed6f0057/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:43:16 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42311
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:43:16 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:43:16 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products/communicationsa8f05';973ed6f0057/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.31. http://www.verizonbusiness.com/Products/communications/conferencing/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/conferencing/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 35c45"%3b3446886f3f4 was submitted in the REST URL parameter 1. This input was echoed as 35c45";3446886f3f4 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products35c45"%3b3446886f3f4/communications/conferencing/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:44:24 GMT
Vary: User-Agent
Server: Roxen/4.5.146-release3
Content-Type: text/html
Content-Length: 40672
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:44:24 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:44:24 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link rel="stylesheet" href="/(15:46:12)/templates/vzbar/style.css" type="text/css"><link med
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products35c45";3446886f3f4/communications/conferencing/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MIN
...[SNIP]...

1.32. http://www.verizonbusiness.com/Products/communications/conferencing/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/conferencing/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload efaf8'%3b0851e56f04c was submitted in the REST URL parameter 1. This input was echoed as efaf8';0851e56f04c in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Productsefaf8'%3b0851e56f04c/communications/conferencing/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:44:33 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40674
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:44:33 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:44:33 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Productsefaf8';0851e56f04c/communications/conferencing/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.33. http://www.verizonbusiness.com/Products/communications/conferencing/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/conferencing/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 4046a'%3bcd2d56fb13f was submitted in the REST URL parameter 2. This input was echoed as 4046a';cd2d56fb13f in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communications4046a'%3bcd2d56fb13f/conferencing/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:44:58 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42337
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:44:58 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:44:58 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products/communications4046a';cd2d56fb13f/conferencing/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.34. http://www.verizonbusiness.com/Products/communications/conferencing/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/conferencing/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f4625"%3b3f6eb6b4c4d was submitted in the REST URL parameter 2. This input was echoed as f4625";3f6eb6b4c4d in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communicationsf4625"%3b3f6eb6b4c4d/conferencing/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:44:39 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42339
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:44:39 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:44:39 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/communicationsf4625";3f6eb6b4c4d/conferencing/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS O
...[SNIP]...

1.35. http://www.verizonbusiness.com/Products/communications/conferencing/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/conferencing/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 4fbd7'%3bf2b5ced80de was submitted in the REST URL parameter 3. This input was echoed as 4fbd7';f2b5ced80de in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communications/conferencing4fbd7'%3bf2b5ced80de/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Last-Modified: Wed, 17 Nov 2010 00:45:34 GMT
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Content-Type: text/html
Content-Length: 43482
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:45:34 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:45:34 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products/communications/conferencing4fbd7';f2b5ced80de/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.36. http://www.verizonbusiness.com/Products/communications/conferencing/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/conferencing/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 58713"%3b215198f4b7 was submitted in the REST URL parameter 3. This input was echoed as 58713";215198f4b7 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communications/conferencing58713"%3b215198f4b7/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:45:04 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43480
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:45:04 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:45:04 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/communications/conferencing58713";215198f4b7/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.37. http://www.verizonbusiness.com/Products/communications/contact-center/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/contact-center/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 78cd5"%3b14faafd3cd7 was submitted in the REST URL parameter 1. This input was echoed as 78cd5";14faafd3cd7 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products78cd5"%3b14faafd3cd7/communications/contact-center/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:42:17 GMT
Vary: User-Agent
Server: Roxen/4.5.146-release3
Content-Type: text/html
Content-Length: 40676
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:42:17 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:42:17 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link rel="stylesheet" href="/(15:46:12)/templates/vzbar/style.css" type="text/css"><link med
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products78cd5";14faafd3cd7/communications/contact-center/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION M
...[SNIP]...

1.38. http://www.verizonbusiness.com/Products/communications/contact-center/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/contact-center/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 7ab66'%3b124b3146f2 was submitted in the REST URL parameter 1. This input was echoed as 7ab66';124b3146f2 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products7ab66'%3b124b3146f2/communications/contact-center/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:42:28 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40674
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:42:28 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:42:28 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products7ab66';124b3146f2/communications/contact-center/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.39. http://www.verizonbusiness.com/Products/communications/contact-center/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/contact-center/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 7a6b6'%3be97dc6b393c was submitted in the REST URL parameter 2. This input was echoed as 7a6b6';e97dc6b393c in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communications7a6b6'%3be97dc6b393c/contact-center/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:43:15 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42341
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:43:15 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:43:15 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products/communications7a6b6';e97dc6b393c/contact-center/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.40. http://www.verizonbusiness.com/Products/communications/contact-center/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/contact-center/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 6e2bc"%3bdf2b6c45fef was submitted in the REST URL parameter 2. This input was echoed as 6e2bc";df2b6c45fef in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communications6e2bc"%3bdf2b6c45fef/contact-center/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:42:55 GMT
Content-Type: text/html
Content-Length: 42343
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:42:56 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:42:55 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link med
...[SNIP]...
(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/communications6e2bc";df2b6c45fef/contact-center/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS
...[SNIP]...

1.41. http://www.verizonbusiness.com/Products/communications/contact-center/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/contact-center/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9e288'%3beb8b904ab32 was submitted in the REST URL parameter 3. This input was echoed as 9e288';eb8b904ab32 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communications/contact-center9e288'%3beb8b904ab32/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:44:09 GMT
Vary: User-Agent
Server: Roxen/4.5.146-release3
Content-Type: text/html
Content-Length: 43486
Date: Wed, 17 Nov 2010 00:44:09 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:44:09 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link rel="stylesheet" href="/(15:46:12)/templates/vzbar/style.css" type="text/css"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products/communications/contact-center9e288';eb8b904ab32/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.42. http://www.verizonbusiness.com/Products/communications/contact-center/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/contact-center/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f3e9a"%3bf9a14e6c415 was submitted in the REST URL parameter 3. This input was echoed as f3e9a";f9a14e6c415 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communications/contact-centerf3e9a"%3bf9a14e6c415/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:43:38 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43486
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:43:38 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:43:38 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
i="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/communications/contact-centerf3e9a";f9a14e6c415/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.43. http://www.verizonbusiness.com/Products/communications/emergency/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/emergency/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 1ad22'%3b3de738e46d4 was submitted in the REST URL parameter 1. This input was echoed as 1ad22';3de738e46d4 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products1ad22'%3b3de738e46d4/communications/emergency/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:44:49 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40666
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:44:49 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:44:49 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products1ad22';3de738e46d4/communications/emergency/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.44. http://www.verizonbusiness.com/Products/communications/emergency/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/emergency/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 63c4c"%3b7236e4cda84 was submitted in the REST URL parameter 1. This input was echoed as 63c4c";7236e4cda84 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products63c4c"%3b7236e4cda84/communications/emergency/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:44:14 GMT
Vary: User-Agent
Server: Roxen/4.5.146-release3
Content-Type: text/html
Content-Length: 40666
Date: Wed, 17 Nov 2010 00:44:14 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:44:14 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link rel="stylesheet" href="/(15:46:12)/templates/vzbar/style.css" type="text/css"><link med
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products63c4c";7236e4cda84/communications/emergency/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMU
...[SNIP]...

1.45. http://www.verizonbusiness.com/Products/communications/emergency/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/emergency/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 56940"%3b303ea88508d was submitted in the REST URL parameter 2. This input was echoed as 56940";303ea88508d in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communications56940"%3b303ea88508d/emergency/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:45:13 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42331
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:45:14 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:45:13 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/communications56940";303ea88508d/emergency/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR S
...[SNIP]...

1.46. http://www.verizonbusiness.com/Products/communications/emergency/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/emergency/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload ce46d'%3b78d243a9c42 was submitted in the REST URL parameter 2. This input was echoed as ce46d';78d243a9c42 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communicationsce46d'%3b78d243a9c42/emergency/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:45:37 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42331
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:45:37 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:45:37 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products/communicationsce46d';78d243a9c42/emergency/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.47. http://www.verizonbusiness.com/Products/communications/emergency/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/emergency/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ef4ff"%3b4d41ee83708 was submitted in the REST URL parameter 3. This input was echoed as ef4ff";4d41ee83708 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communications/emergencyef4ff"%3b4d41ee83708/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:46:00 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43476
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:46:00 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:46:00 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/communications/emergencyef4ff";4d41ee83708/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.48. http://www.verizonbusiness.com/Products/communications/emergency/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/emergency/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 373c0'%3b2b9a291dace was submitted in the REST URL parameter 3. This input was echoed as 373c0';2b9a291dace in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communications/emergency373c0'%3b2b9a291dace/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:46:09 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43478
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:46:10 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:46:09 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link type="text/css" rel="stylesheet" href="/(15:46:12)/templates/vzbar/style.css"><link typ
...[SNIP]...
<script type="text/javascript">
var request='/Products/communications/emergency373c0';2b9a291dace/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.49. http://www.verizonbusiness.com/Products/communications/ip-telephony/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/ip-telephony/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload fe88b'%3b8bd8495a52e was submitted in the REST URL parameter 1. This input was echoed as fe88b';8bd8495a52e in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Productsfe88b'%3b8bd8495a52e/communications/ip-telephony/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:43:17 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40672
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:43:17 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:43:17 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Productsfe88b';8bd8495a52e/communications/ip-telephony/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.50. http://www.verizonbusiness.com/Products/communications/ip-telephony/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/ip-telephony/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e5f1d"%3ba7a15a8513 was submitted in the REST URL parameter 1. This input was echoed as e5f1d";a7a15a8513 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Productse5f1d"%3ba7a15a8513/communications/ip-telephony/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:42:47 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40670
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:42:47 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:42:47 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Productse5f1d";a7a15a8513/communications/ip-telephony/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MIN
...[SNIP]...

1.51. http://www.verizonbusiness.com/Products/communications/ip-telephony/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/ip-telephony/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 1a365'%3b0ddb097a2 was submitted in the REST URL parameter 2. This input was echoed as 1a365';0ddb097a2 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communications1a365'%3b0ddb097a2/ip-telephony/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:43:49 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42333
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:43:49 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:43:49 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products/communications1a365';0ddb097a2/ip-telephony/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.52. http://www.verizonbusiness.com/Products/communications/ip-telephony/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/ip-telephony/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4194a"%3b2625f85d351 was submitted in the REST URL parameter 2. This input was echoed as 4194a";2625f85d351 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communications4194a"%3b2625f85d351/ip-telephony/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:43:34 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42337
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:43:34 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:43:34 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/communications4194a";2625f85d351/ip-telephony/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS O
...[SNIP]...

1.53. http://www.verizonbusiness.com/Products/communications/ip-telephony/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/ip-telephony/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4b406"%3b1b48f2f8d17 was submitted in the REST URL parameter 3. This input was echoed as 4b406";1b48f2f8d17 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communications/ip-telephony4b406"%3b1b48f2f8d17/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:44:13 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43482
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:44:13 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:44:13 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/communications/ip-telephony4b406";1b48f2f8d17/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.54. http://www.verizonbusiness.com/Products/communications/ip-telephony/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/ip-telephony/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload e393e'%3b5bc61607e6b was submitted in the REST URL parameter 3. This input was echoed as e393e';5bc61607e6b in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communications/ip-telephonye393e'%3b5bc61607e6b/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:45:02 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43482
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:45:02 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:45:02 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products/communications/ip-telephonye393e';5bc61607e6b/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.55. http://www.verizonbusiness.com/Products/communications/managed-ucc/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/managed-ucc/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d6f33'%3bb873c7f4470 was submitted in the REST URL parameter 1. This input was echoed as d6f33';b873c7f4470 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Productsd6f33'%3bb873c7f4470/communications/managed-ucc/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:43:01 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40670
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:43:01 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:43:01 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Productsd6f33';b873c7f4470/communications/managed-ucc/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.56. http://www.verizonbusiness.com/Products/communications/managed-ucc/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/managed-ucc/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8f455"%3ba74a0a7c1f3 was submitted in the REST URL parameter 1. This input was echoed as 8f455";a74a0a7c1f3 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products8f455"%3ba74a0a7c1f3/communications/managed-ucc/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:42:36 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40670
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:42:36 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:42:36 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products8f455";a74a0a7c1f3/communications/managed-ucc/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINI
...[SNIP]...

1.57. http://www.verizonbusiness.com/Products/communications/managed-ucc/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/managed-ucc/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5b785"%3b0e01037d68b was submitted in the REST URL parameter 2. This input was echoed as 5b785";0e01037d68b in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communications5b785"%3b0e01037d68b/managed-ucc/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:43:31 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42335
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:43:31 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:43:31 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/communications5b785";0e01037d68b/managed-ucc/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR
...[SNIP]...

1.58. http://www.verizonbusiness.com/Products/communications/managed-ucc/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/managed-ucc/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c9944'%3beec5dd5d94f was submitted in the REST URL parameter 2. This input was echoed as c9944';eec5dd5d94f in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communicationsc9944'%3beec5dd5d94f/managed-ucc/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:43:52 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42335
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:43:52 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:43:52 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products/communicationsc9944';eec5dd5d94f/managed-ucc/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.59. http://www.verizonbusiness.com/Products/communications/managed-ucc/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/managed-ucc/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 1e1e8'%3b5301a9fab19 was submitted in the REST URL parameter 3. This input was echoed as 1e1e8';5301a9fab19 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communications/managed-ucc1e1e8'%3b5301a9fab19/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:44:49 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43482
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:44:49 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:44:49 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link type="text/css" rel="stylesheet" href="/(15:46:12)/templates/vzbar/style.css"><link typ
...[SNIP]...
<script type="text/javascript">
var request='/Products/communications/managed-ucc1e1e8';5301a9fab19/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.60. http://www.verizonbusiness.com/Products/communications/managed-ucc/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/managed-ucc/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a3538"%3b1fefbc24146 was submitted in the REST URL parameter 3. This input was echoed as a3538";1fefbc24146 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communications/managed-ucca3538"%3b1fefbc24146/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:44:23 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43482
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:44:23 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:44:23 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
x.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/communications/managed-ucca3538";1fefbc24146/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.61. http://www.verizonbusiness.com/Products/communications/prof-svcs/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/prof-svcs/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 80f92'%3bc860afee35d was submitted in the REST URL parameter 1. This input was echoed as 80f92';c860afee35d in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products80f92'%3bc860afee35d/communications/prof-svcs/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:43:17 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40666
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:43:17 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:43:17 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products80f92';c860afee35d/communications/prof-svcs/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.62. http://www.verizonbusiness.com/Products/communications/prof-svcs/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/prof-svcs/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3a44e"%3bc33ca53e907 was submitted in the REST URL parameter 1. This input was echoed as 3a44e";c33ca53e907 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products3a44e"%3bc33ca53e907/communications/prof-svcs/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:42:32 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40666
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:42:32 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:42:32 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products3a44e";c33ca53e907/communications/prof-svcs/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMU
...[SNIP]...

1.63. http://www.verizonbusiness.com/Products/communications/prof-svcs/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/prof-svcs/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 2a226'%3bc45d855bf03 was submitted in the REST URL parameter 2. This input was echoed as 2a226';c45d855bf03 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communications2a226'%3bc45d855bf03/prof-svcs/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:44:00 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42331
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:44:00 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:44:00 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products/communications2a226';c45d855bf03/prof-svcs/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.64. http://www.verizonbusiness.com/Products/communications/prof-svcs/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/prof-svcs/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5f774"%3ba662e543ebf was submitted in the REST URL parameter 2. This input was echoed as 5f774";a662e543ebf in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communications5f774"%3ba662e543ebf/prof-svcs/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:43:39 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42331
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:43:39 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:43:39 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/communications5f774";a662e543ebf/prof-svcs/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR S
...[SNIP]...

1.65. http://www.verizonbusiness.com/Products/communications/prof-svcs/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/prof-svcs/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 519a6"%3bad5a04e7aa5 was submitted in the REST URL parameter 3. This input was echoed as 519a6";ad5a04e7aa5 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communications/prof-svcs519a6"%3bad5a04e7aa5/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:44:12 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43476
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:44:12 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:44:12 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/communications/prof-svcs519a6";ad5a04e7aa5/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.66. http://www.verizonbusiness.com/Products/communications/prof-svcs/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/prof-svcs/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d382b'%3bd8c99d93b9b was submitted in the REST URL parameter 3. This input was echoed as d382b';d8c99d93b9b in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communications/prof-svcsd382b'%3bd8c99d93b9b/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:44:44 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43476
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:44:44 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:44:44 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products/communications/prof-svcsd382b';d8c99d93b9b/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.67. http://www.verizonbusiness.com/Products/communications/traditional-telephony/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/traditional-telephony/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5d0e5"%3b2d5f6bef341 was submitted in the REST URL parameter 1. This input was echoed as 5d0e5";2d5f6bef341 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products5d0e5"%3b2d5f6bef341/communications/traditional-telephony/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:43:11 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40690
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:43:11 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:43:11 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products5d0e5";2d5f6bef341/communications/traditional-telephony/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALID
...[SNIP]...

1.68. http://www.verizonbusiness.com/Products/communications/traditional-telephony/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/traditional-telephony/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 69431'%3bff4558fa136 was submitted in the REST URL parameter 1. This input was echoed as 69431';ff4558fa136 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products69431'%3bff4558fa136/communications/traditional-telephony/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:43:49 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40690
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:43:49 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:43:49 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products69431';ff4558fa136/communications/traditional-telephony/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.69. http://www.verizonbusiness.com/Products/communications/traditional-telephony/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/traditional-telephony/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2dec1"%3bac9d6812890 was submitted in the REST URL parameter 2. This input was echoed as 2dec1";ac9d6812890 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communications2dec1"%3bac9d6812890/traditional-telephony/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:44:12 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42355
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:44:12 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:44:12 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/communications2dec1";ac9d6812890/traditional-telephony/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM E
...[SNIP]...

1.70. http://www.verizonbusiness.com/Products/communications/traditional-telephony/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/traditional-telephony/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a88f3'%3bad0bd57bd2c was submitted in the REST URL parameter 2. This input was echoed as a88f3';ad0bd57bd2c in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communicationsa88f3'%3bad0bd57bd2c/traditional-telephony/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Last-Modified: Wed, 17 Nov 2010 00:44:42 GMT
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Content-Type: text/html
Content-Length: 42355
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:44:42 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:44:42 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products/communicationsa88f3';ad0bd57bd2c/traditional-telephony/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.71. http://www.verizonbusiness.com/Products/communications/traditional-telephony/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/traditional-telephony/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d0571'%3b3c9c2508f89 was submitted in the REST URL parameter 3. This input was echoed as d0571';3c9c2508f89 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communications/traditional-telephonyd0571'%3b3c9c2508f89/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:45:31 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43500
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:45:31 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:45:31 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products/communications/traditional-telephonyd0571';3c9c2508f89/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.72. http://www.verizonbusiness.com/Products/communications/traditional-telephony/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/traditional-telephony/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3b962"%3b576fb33505f was submitted in the REST URL parameter 3. This input was echoed as 3b962";576fb33505f in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communications/traditional-telephony3b962"%3b576fb33505f/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:45:06 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43500
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:45:06 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:45:06 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/communications/traditional-telephony3b962";576fb33505f/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.73. http://www.verizonbusiness.com/Products/communications/ucc/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/ucc/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 637a6"%3b296beb7d083 was submitted in the REST URL parameter 1. This input was echoed as 637a6";296beb7d083 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products637a6"%3b296beb7d083/communications/ucc/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:43:46 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40654
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:43:46 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:43:46 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products637a6";296beb7d083/communications/ucc/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEM
...[SNIP]...

1.74. http://www.verizonbusiness.com/Products/communications/ucc/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/ucc/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 4f257'%3b68890547f97 was submitted in the REST URL parameter 1. This input was echoed as 4f257';68890547f97 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products4f257'%3b68890547f97/communications/ucc/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:44:05 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40654
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:44:05 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:44:05 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products4f257';68890547f97/communications/ucc/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.75. http://www.verizonbusiness.com/Products/communications/ucc/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/ucc/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload cfd1d'%3ba91da3eaeef was submitted in the REST URL parameter 2. This input was echoed as cfd1d';a91da3eaeef in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communicationscfd1d'%3ba91da3eaeef/ucc/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:44:30 GMT
Vary: User-Agent
Server: Roxen/4.5.146-release3
Content-Type: text/html
Content-Length: 42319
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:44:30 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:44:30 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link rel="stylesheet" href="/(15:46:12)/templates/vzbar/style.css" type="text/css"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products/communicationscfd1d';a91da3eaeef/ucc/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.76. http://www.verizonbusiness.com/Products/communications/ucc/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/ucc/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2e4eb"%3b03656175578 was submitted in the REST URL parameter 2. This input was echoed as 2e4eb";03656175578 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communications2e4eb"%3b03656175578/ucc/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:44:24 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42319
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:44:24 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:44:24 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/communications2e4eb";03656175578/ucc/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT
...[SNIP]...

1.77. http://www.verizonbusiness.com/Products/communications/ucc/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/ucc/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 44e5e'%3b3fc27c4ce6f was submitted in the REST URL parameter 3. This input was echoed as 44e5e';3fc27c4ce6f in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communications/ucc44e5e'%3b3fc27c4ce6f/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:45:18 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43464
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:45:19 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:45:18 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products/communications/ucc44e5e';3fc27c4ce6f/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.78. http://www.verizonbusiness.com/Products/communications/ucc/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/communications/ucc/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f8a09"%3bab440ed2f3d was submitted in the REST URL parameter 3. This input was echoed as f8a09";ab440ed2f3d in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/communications/uccf8a09"%3bab440ed2f3d/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:44:49 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43464
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:44:49 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:44:49 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
{}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/communications/uccf8a09";ab440ed2f3d/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.79. http://www.verizonbusiness.com/Products/it/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload fc451'%3b89dc88df858 was submitted in the REST URL parameter 1. This input was echoed as fc451';89dc88df858 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Productsfc451'%3b89dc88df858/it/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:39:04 GMT
Content-Type: text/html
Content-Length: 40624
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:39:04 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:39:04 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Productsfc451';89dc88df858/it/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.80. http://www.verizonbusiness.com/Products/it/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ec00a"%3b0a9aa0a024a was submitted in the REST URL parameter 1. This input was echoed as ec00a";0a9aa0a024a in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Productsec00a"%3b0a9aa0a024a/it/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:38:56 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40624
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:38:57 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:38:56 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Productsec00a";0a9aa0a024a/it/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT F
...[SNIP]...

1.81. http://www.verizonbusiness.com/Products/it/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload bd572'%3b321cd0f3a7a was submitted in the REST URL parameter 2. This input was echoed as bd572';321cd0f3a7a in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/itbd572'%3b321cd0f3a7a/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:39:29 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42289
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:39:29 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:39:29 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link type="text/css" rel="stylesheet" href="/(15:46:12)/templates/vzbar/style.css"><link typ
...[SNIP]...
<script type="text/javascript">
var request='/Products/itbd572';321cd0f3a7a/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.82. http://www.verizonbusiness.com/Products/it/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a90d3"%3bf4d3c13c800 was submitted in the REST URL parameter 2. This input was echoed as a90d3";f4d3c13c800 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/ita90d3"%3bf4d3c13c800/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:39:17 GMT
Content-Type: text/html
Content-Length: 42289
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:39:17 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:39:17 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/ita90d3";f4d3c13c800/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.83. http://www.verizonbusiness.com/Products/it/cloud-it/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/cloud-it/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c3607'%3bc6e6fefe83 was submitted in the REST URL parameter 1. This input was echoed as c3607';c6e6fefe83 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Productsc3607'%3bc6e6fefe83/it/cloud-it/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:40:58 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40638
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:40:58 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:58 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Productsc3607';c6e6fefe83/it/cloud-it/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.84. http://www.verizonbusiness.com/Products/it/cloud-it/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/cloud-it/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5dfaa"%3b0c1a3f022e7 was submitted in the REST URL parameter 1. This input was echoed as 5dfaa";0c1a3f022e7 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products5dfaa"%3b0c1a3f022e7/it/cloud-it/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:40:37 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40642
Date: Wed, 17 Nov 2010 00:40:37 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:37 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products5dfaa";0c1a3f022e7/it/cloud-it/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR
...[SNIP]...

1.85. http://www.verizonbusiness.com/Products/it/cloud-it/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/cloud-it/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 767e9"%3bd598a6842f was submitted in the REST URL parameter 2. This input was echoed as 767e9";d598a6842f in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it767e9"%3bd598a6842f/cloud-it/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Last-Modified: Wed, 17 Nov 2010 00:41:15 GMT
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Content-Type: text/html
Content-Length: 42303
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:41:16 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:41:15 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/it767e9";d598a6842f/cloud-it/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SU
...[SNIP]...

1.86. http://www.verizonbusiness.com/Products/it/cloud-it/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/cloud-it/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 54488'%3b5961a620681 was submitted in the REST URL parameter 2. This input was echoed as 54488';5961a620681 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it54488'%3b5961a620681/cloud-it/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:41:28 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42305
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:41:28 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:41:28 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products/it54488';5961a620681/cloud-it/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.87. http://www.verizonbusiness.com/Products/it/cloud-it/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/cloud-it/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 81829'%3b8859f1e65d7 was submitted in the REST URL parameter 3. This input was echoed as 81829';8859f1e65d7 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it/cloud-it81829'%3b8859f1e65d7/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:41:51 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43031
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:41:52 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:41:51 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products/it/cloud-it81829';8859f1e65d7/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.88. http://www.verizonbusiness.com/Products/it/cloud-it/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/cloud-it/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 39773"%3b09cb144275f was submitted in the REST URL parameter 3. This input was echoed as 39773";09cb144275f in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it/cloud-it39773"%3b09cb144275f/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:41:40 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43033
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:41:40 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:41:40 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link type="text/css" rel="stylesheet" href="/(15:46:12)/templates/vzbar/style.css"><link typ
...[SNIP]...
tch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/it/cloud-it39773";09cb144275f/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.89. http://www.verizonbusiness.com/Products/it/cloud-it/caas/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/cloud-it/caas/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 5c2c1'%3bcc59ecc5030 was submitted in the REST URL parameter 1. This input was echoed as 5c2c1';cc59ecc5030 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products5c2c1'%3bcc59ecc5030/it/cloud-it/caas/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:40:21 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40650
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:40:21 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:21 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products5c2c1';cc59ecc5030/it/cloud-it/caas/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.90. http://www.verizonbusiness.com/Products/it/cloud-it/caas/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/cloud-it/caas/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 13f62"%3b3ddf873d3a was submitted in the REST URL parameter 1. This input was echoed as 13f62";3ddf873d3a in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products13f62"%3b3ddf873d3a/it/cloud-it/caas/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:40:09 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40650
Date: Wed, 17 Nov 2010 00:40:09 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:09 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link type="text/css" rel="stylesheet" href="/(15:46:12)/templates/vzbar/style.css"><link typ
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products13f62";3ddf873d3a/it/cloud-it/caas/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMEN
...[SNIP]...

1.91. http://www.verizonbusiness.com/Products/it/cloud-it/caas/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/cloud-it/caas/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 87a36"%3bebedaa16cf9 was submitted in the REST URL parameter 2. This input was echoed as 87a36";ebedaa16cf9 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it87a36"%3bebedaa16cf9/cloud-it/caas/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:40:31 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42315
Date: Wed, 17 Nov 2010 00:40:31 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:31 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link med
...[SNIP]...

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/it87a36";ebedaa16cf9/cloud-it/caas/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS
...[SNIP]...

1.92. http://www.verizonbusiness.com/Products/it/cloud-it/caas/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/cloud-it/caas/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9f31c'%3b407bf66b4dc was submitted in the REST URL parameter 2. This input was echoed as 9f31c';407bf66b4dc in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it9f31c'%3b407bf66b4dc/cloud-it/caas/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:40:51 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42315
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:40:51 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:51 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products/it9f31c';407bf66b4dc/cloud-it/caas/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.93. http://www.verizonbusiness.com/Products/it/cloud-it/caas/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/cloud-it/caas/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 60ca5'%3b7c3a77074a8 was submitted in the REST URL parameter 3. This input was echoed as 60ca5';7c3a77074a8 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it/cloud-it60ca5'%3b7c3a77074a8/caas/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Last-Modified: Wed, 17 Nov 2010 00:41:25 GMT
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Content-Type: text/html
Content-Length: 42315
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:41:25 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:41:25 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products/it/cloud-it60ca5';7c3a77074a8/caas/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.94. http://www.verizonbusiness.com/Products/it/cloud-it/caas/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/cloud-it/caas/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 1c0b7"%3bdf82540c12d was submitted in the REST URL parameter 3. This input was echoed as 1c0b7";df82540c12d in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it/cloud-it1c0b7"%3bdf82540c12d/caas/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:40:58 GMT
Vary: User-Agent
Server: Roxen/4.5.146-release3
Content-Type: text/html
Content-Length: 42315
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:40:59 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:58 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link rel="stylesheet" href="/(15:46:12)/templates/vzbar/style.css" type="text/css"><link med
...[SNIP]...
tch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/it/cloud-it1c0b7";df82540c12d/caas/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT
...[SNIP]...

1.95. http://www.verizonbusiness.com/Products/it/cloud-it/caas/ [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/cloud-it/caas/

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 72e33"%3b7d02c3db74 was submitted in the REST URL parameter 4. This input was echoed as 72e33";7d02c3db74 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it/cloud-it/caas72e33"%3b7d02c3db74/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:41:37 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43383
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:41:37 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:41:37 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link med
...[SNIP]...
) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/it/cloud-it/caas72e33";7d02c3db74/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.96. http://www.verizonbusiness.com/Products/it/cloud-it/caas/ [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/cloud-it/caas/

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 99f78'%3b6b00ceb6d39 was submitted in the REST URL parameter 4. This input was echoed as 99f78';6b00ceb6d39 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it/cloud-it/caas99f78'%3b6b00ceb6d39/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:41:51 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43385
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:41:52 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:41:51 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products/it/cloud-it/caas99f78';6b00ceb6d39/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.97. http://www.verizonbusiness.com/Products/it/cloud-it/caas/security.xml [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/cloud-it/caas/security.xml

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 3824a'%3b2a6b6aee905 was submitted in the REST URL parameter 1. This input was echoed as 3824a';2a6b6aee905 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products3824a'%3b2a6b6aee905/it/cloud-it/caas/security.xml HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:40:50 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40658
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:40:50 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:50 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link type="text/css" rel="stylesheet" href="/(15:46:12)/templates/vzbar/style.css"><link typ
...[SNIP]...
<script type="text/javascript">
var request='/Products3824a';2a6b6aee905/it/cloud-it/caas/security.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.98. http://www.verizonbusiness.com/Products/it/cloud-it/caas/security.xml [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/cloud-it/caas/security.xml

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 755cc"%3b5f01b832dac was submitted in the REST URL parameter 1. This input was echoed as 755cc";5f01b832dac in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products755cc"%3b5f01b832dac/it/cloud-it/caas/security.xml HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:40:34 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40656
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:40:34 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:34 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products755cc";5f01b832dac/it/cloud-it/caas/security.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELE
...[SNIP]...

1.99. http://www.verizonbusiness.com/Products/it/cloud-it/caas/security.xml [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/cloud-it/caas/security.xml

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 65e32"%3bdf1c926363f was submitted in the REST URL parameter 2. This input was echoed as 65e32";df1c926363f in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it65e32"%3bdf1c926363f/cloud-it/caas/security.xml HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:40:57 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42321
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:40:57 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:57 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/it65e32";df1c926363f/cloud-it/caas/security.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMEN
...[SNIP]...

1.100. http://www.verizonbusiness.com/Products/it/cloud-it/caas/security.xml [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/cloud-it/caas/security.xml

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 8cf9d'%3b53551aa3e11 was submitted in the REST URL parameter 2. This input was echoed as 8cf9d';53551aa3e11 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it8cf9d'%3b53551aa3e11/cloud-it/caas/security.xml HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:41:08 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42323
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:41:08 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:41:08 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link type="text/css" rel="stylesheet" href="/(15:46:12)/templates/vzbar/style.css"><link typ
...[SNIP]...
<script type="text/javascript">
var request='/Products/it8cf9d';53551aa3e11/cloud-it/caas/security.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.101. http://www.verizonbusiness.com/Products/it/cloud-it/caas/security.xml [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/cloud-it/caas/security.xml

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a5958'%3bb453e0a2edf was submitted in the REST URL parameter 3. This input was echoed as a5958';b453e0a2edf in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it/cloud-ita5958'%3bb453e0a2edf/caas/security.xml HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Last-Modified: Wed, 17 Nov 2010 00:41:37 GMT
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Content-Type: text/html
Content-Length: 42321
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:41:37 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:41:37 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products/it/cloud-ita5958';b453e0a2edf/caas/security.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.102. http://www.verizonbusiness.com/Products/it/cloud-it/caas/security.xml [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/cloud-it/caas/security.xml

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4f15e"%3b3018bdfda75 was submitted in the REST URL parameter 3. This input was echoed as 4f15e";3018bdfda75 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it/cloud-it4f15e"%3b3018bdfda75/caas/security.xml HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:41:19 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42321
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:41:19 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:41:19 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
tch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/it/cloud-it4f15e";3018bdfda75/caas/security.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUB
...[SNIP]...

1.103. http://www.verizonbusiness.com/Products/it/cloud-it/caas/security.xml [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/cloud-it/caas/security.xml

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 29aec'%3b425ce2e213b was submitted in the REST URL parameter 4. This input was echoed as 29aec';425ce2e213b in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it/cloud-it/caas29aec'%3b425ce2e213b/security.xml HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:42:02 GMT
Vary: User-Agent
Server: Roxen/4.5.146-release3
Content-Type: text/html
Content-Length: 42871
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:42:02 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:42:02 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link rel="stylesheet" href="/(15:46:12)/templates/vzbar/style.css" type="text/css"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products/it/cloud-it/caas29aec';425ce2e213b/security.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.104. http://www.verizonbusiness.com/Products/it/cloud-it/caas/security.xml [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/cloud-it/caas/security.xml

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 51c59"%3b42e0fe965dd was submitted in the REST URL parameter 4. This input was echoed as 51c59";42e0fe965dd in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it/cloud-it/caas51c59"%3b42e0fe965dd/security.xml HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:41:51 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42871
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:41:51 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:41:51 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/it/cloud-it/caas51c59";42e0fe965dd/security.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT F
...[SNIP]...

1.105. http://www.verizonbusiness.com/Products/it/cloud-it/caas/security.xml [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/cloud-it/caas/security.xml

Issue detail

The value of REST URL parameter 5 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c375e"%3bc1272064ae was submitted in the REST URL parameter 5. This input was echoed as c375e";c1272064ae in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it/cloud-it/caas/security.xmlc375e"%3bc1272064ae HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:42:19 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43399
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:42:19 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:42:19 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
i="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/it/cloud-it/caas/security.xmlc375e";c1272064ae";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNCTION NAME

...[SNIP]...

1.106. http://www.verizonbusiness.com/Products/it/cloud-it/caas/security.xml [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/cloud-it/caas/security.xml

Issue detail

The value of REST URL parameter 5 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 46f28'%3b850340af03e was submitted in the REST URL parameter 5. This input was echoed as 46f28';850340af03e in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it/cloud-it/caas/security.xml46f28'%3b850340af03e HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:42:52 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43401
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:42:52 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:42:52 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products/it/cloud-it/caas/security.xml46f28';850340af03e'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.107. http://www.verizonbusiness.com/Products/it/cloud-it/cloud-storage/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/cloud-it/cloud-storage/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 65102"%3b0d10cd9898b was submitted in the REST URL parameter 1. This input was echoed as 65102";0d10cd9898b in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products65102"%3b0d10cd9898b/it/cloud-it/cloud-storage/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:40:15 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40670
Date: Wed, 17 Nov 2010 00:40:15 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:15 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products65102";0d10cd9898b/it/cloud-it/cloud-storage/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIM
...[SNIP]...

1.108. http://www.verizonbusiness.com/Products/it/cloud-it/cloud-storage/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/cloud-it/cloud-storage/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 80e28'%3b8a2c735c25c was submitted in the REST URL parameter 1. This input was echoed as 80e28';8a2c735c25c in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products80e28'%3b8a2c735c25c/it/cloud-it/cloud-storage/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:40:22 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40670
Date: Wed, 17 Nov 2010 00:40:22 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:22 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products80e28';8a2c735c25c/it/cloud-it/cloud-storage/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.109. http://www.verizonbusiness.com/Products/it/cloud-it/cloud-storage/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/cloud-it/cloud-storage/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 74e15'%3bddd3fbc10ba was submitted in the REST URL parameter 2. This input was echoed as 74e15';ddd3fbc10ba in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it74e15'%3bddd3fbc10ba/cloud-it/cloud-storage/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:41:01 GMT
Content-Type: text/html
Content-Length: 42335
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:41:02 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:41:01 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products/it74e15';ddd3fbc10ba/cloud-it/cloud-storage/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.110. http://www.verizonbusiness.com/Products/it/cloud-it/cloud-storage/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/cloud-it/cloud-storage/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c1cff"%3b7d3ead31ee8 was submitted in the REST URL parameter 2. This input was echoed as c1cff";7d3ead31ee8 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/itc1cff"%3b7d3ead31ee8/cloud-it/cloud-storage/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:40:41 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42333
Date: Wed, 17 Nov 2010 00:40:41 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:41 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/itc1cff";7d3ead31ee8/cloud-it/cloud-storage/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM
...[SNIP]...

1.111. http://www.verizonbusiness.com/Products/it/cloud-it/cloud-storage/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/cloud-it/cloud-storage/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 7dc65'%3b5791e124a87 was submitted in the REST URL parameter 3. This input was echoed as 7dc65';5791e124a87 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it/cloud-it7dc65'%3b5791e124a87/cloud-storage/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:41:26 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42335
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:41:26 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:41:26 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products/it/cloud-it7dc65';5791e124a87/cloud-storage/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.112. http://www.verizonbusiness.com/Products/it/cloud-it/cloud-storage/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/cloud-it/cloud-storage/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8cb77"%3b76d009414d5 was submitted in the REST URL parameter 3. This input was echoed as 8cb77";76d009414d5 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it/cloud-it8cb77"%3b76d009414d5/cloud-storage/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Last-Modified: Wed, 17 Nov 2010 00:41:17 GMT
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Content-Type: text/html
Content-Length: 42333
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:41:17 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:41:17 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
tch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/it/cloud-it8cb77";76d009414d5/cloud-storage/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS
...[SNIP]...

1.113. http://www.verizonbusiness.com/Products/it/cloud-it/cloud-storage/ [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/cloud-it/cloud-storage/

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3ca8e"%3b1e2eb5fb679 was submitted in the REST URL parameter 4. This input was echoed as 3ca8e";1e2eb5fb679 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it/cloud-it/cloud-storage3ca8e"%3b1e2eb5fb679/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Last-Modified: Wed, 17 Nov 2010 00:41:37 GMT
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Content-Type: text/html
Content-Length: 43403
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:41:37 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:41:37 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
bx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/it/cloud-it/cloud-storage3ca8e";1e2eb5fb679/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.114. http://www.verizonbusiness.com/Products/it/cloud-it/cloud-storage/ [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/cloud-it/cloud-storage/

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b898e'%3be2aaa764a2 was submitted in the REST URL parameter 4. This input was echoed as b898e';e2aaa764a2 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it/cloud-it/cloud-storageb898e'%3be2aaa764a2/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:41:57 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43401
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:41:57 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:41:57 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products/it/cloud-it/cloud-storageb898e';e2aaa764a2/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.115. http://www.verizonbusiness.com/Products/it/data-center/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/data-center/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 3da56'%3b60c3c334ea2 was submitted in the REST URL parameter 1. This input was echoed as 3da56';60c3c334ea2 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products3da56'%3b60c3c334ea2/it/data-center/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:40:03 GMT
Content-Type: text/html
Content-Length: 40646
Date: Wed, 17 Nov 2010 00:40:03 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:03 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products3da56';60c3c334ea2/it/data-center/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.116. http://www.verizonbusiness.com/Products/it/data-center/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/data-center/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b813a"%3b4dc7946af8a was submitted in the REST URL parameter 1. This input was echoed as b813a";4dc7946af8a in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Productsb813a"%3b4dc7946af8a/it/data-center/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:39:43 GMT
Content-Type: text/html
Content-Length: 40646
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:39:43 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:39:43 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link type="text/css" href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet"><link med
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Productsb813a";4dc7946af8a/it/data-center/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS
...[SNIP]...

1.117. http://www.verizonbusiness.com/Products/it/data-center/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/data-center/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload cf2b3'%3be822fdb00ab was submitted in the REST URL parameter 2. This input was echoed as cf2b3';e822fdb00ab in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/itcf2b3'%3be822fdb00ab/data-center/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:40:36 GMT
Content-Type: text/html
Content-Length: 42313
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:40:36 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:36 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products/itcf2b3';e822fdb00ab/data-center/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.118. http://www.verizonbusiness.com/Products/it/data-center/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/data-center/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ba539"%3bf452eb4f7f1 was submitted in the REST URL parameter 2. This input was echoed as ba539";f452eb4f7f1 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/itba539"%3bf452eb4f7f1/data-center/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Last-Modified: Wed, 17 Nov 2010 00:40:19 GMT
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Content-Type: text/html
Content-Length: 42311
Date: Wed, 17 Nov 2010 00:40:19 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:19 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/itba539";f452eb4f7f1/data-center/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR
...[SNIP]...

1.119. http://www.verizonbusiness.com/Products/it/data-center/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/data-center/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 3d5c2'%3b07e07d54884 was submitted in the REST URL parameter 3. This input was echoed as 3d5c2';07e07d54884 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it/data-center3d5c2'%3b07e07d54884/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:41:03 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43037
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:41:03 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:41:03 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products/it/data-center3d5c2';07e07d54884/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.120. http://www.verizonbusiness.com/Products/it/data-center/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/data-center/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 70725"%3ba036c8c8520 was submitted in the REST URL parameter 3. This input was echoed as 70725";a036c8c8520 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it/data-center70725"%3ba036c8c8520/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:40:47 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43039
Date: Wed, 17 Nov 2010 00:40:47 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:47 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link type="text/css" rel="stylesheet" href="/(15:46:12)/templates/vzbar/style.css"><link typ
...[SNIP]...
(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/it/data-center70725";a036c8c8520/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.121. http://www.verizonbusiness.com/Products/it/managed-apps/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/managed-apps/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload bc6c9"%3b353a9d1eb2b was submitted in the REST URL parameter 1. This input was echoed as bc6c9";353a9d1eb2b in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Productsbc6c9"%3b353a9d1eb2b/it/managed-apps/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:39:47 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40648
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:39:47 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:39:47 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Productsbc6c9";353a9d1eb2b/it/managed-apps/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENT
...[SNIP]...

1.122. http://www.verizonbusiness.com/Products/it/managed-apps/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/managed-apps/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 161dc'%3beb37a86364e was submitted in the REST URL parameter 1. This input was echoed as 161dc';eb37a86364e in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products161dc'%3beb37a86364e/it/managed-apps/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Last-Modified: Wed, 17 Nov 2010 00:40:18 GMT
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Content-Type: text/html
Content-Length: 40648
Date: Wed, 17 Nov 2010 00:40:18 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:18 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products161dc';eb37a86364e/it/managed-apps/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.123. http://www.verizonbusiness.com/Products/it/managed-apps/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/managed-apps/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 6a514'%3b26e8b3c91fb was submitted in the REST URL parameter 2. This input was echoed as 6a514';26e8b3c91fb in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it6a514'%3b26e8b3c91fb/managed-apps/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:40:45 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42313
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:40:45 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:45 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products/it6a514';26e8b3c91fb/managed-apps/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.124. http://www.verizonbusiness.com/Products/it/managed-apps/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/managed-apps/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 72c10"%3bcc7d5206c0b was submitted in the REST URL parameter 2. This input was echoed as 72c10";cc7d5206c0b in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it72c10"%3bcc7d5206c0b/managed-apps/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:40:36 GMT
Content-Type: text/html
Content-Length: 42315
Date: Wed, 17 Nov 2010 00:40:36 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:36 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/it72c10";cc7d5206c0b/managed-apps/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS O
...[SNIP]...

1.125. http://www.verizonbusiness.com/Products/it/managed-apps/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/managed-apps/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 1a3a1"%3bf6e6f98e7f6 was submitted in the REST URL parameter 3. This input was echoed as 1a3a1";f6e6f98e7f6 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it/managed-apps1a3a1"%3bf6e6f98e7f6/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:40:55 GMT
Vary: User-Agent
Server: Roxen/4.5.146-release3
Content-Type: text/html
Content-Length: 43039
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:40:55 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:55 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link rel="stylesheet" href="/(15:46:12)/templates/vzbar/style.css" type="text/css"><link med
...[SNIP]...
e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/it/managed-apps1a3a1";f6e6f98e7f6/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.126. http://www.verizonbusiness.com/Products/it/managed-apps/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/managed-apps/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 6e31c'%3b993aaf8a816 was submitted in the REST URL parameter 3. This input was echoed as 6e31c';993aaf8a816 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it/managed-apps6e31c'%3b993aaf8a816/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:41:00 GMT
Vary: User-Agent
Server: Roxen/4.5.146-release3
Content-Type: text/html
Content-Length: 43039
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:41:00 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:41:00 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link rel="stylesheet" href="/(15:46:12)/templates/vzbar/style.css" type="text/css"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products/it/managed-apps6e31c';993aaf8a816/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.127. http://www.verizonbusiness.com/Products/it/managed-apps/app-mgmt/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/managed-apps/app-mgmt/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload adf1e"%3bd9c8c1a9735 was submitted in the REST URL parameter 1. This input was echoed as adf1e";d9c8c1a9735 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Productsadf1e"%3bd9c8c1a9735/it/managed-apps/app-mgmt/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:39:44 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40666
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:39:44 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:39:44 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Productsadf1e";d9c8c1a9735/it/managed-apps/app-mgmt/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMU
...[SNIP]...

1.128. http://www.verizonbusiness.com/Products/it/managed-apps/app-mgmt/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/managed-apps/app-mgmt/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d2a16'%3beba3fdc32e6 was submitted in the REST URL parameter 1. This input was echoed as d2a16';eba3fdc32e6 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Productsd2a16'%3beba3fdc32e6/it/managed-apps/app-mgmt/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:40:15 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40666
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:40:15 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:15 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Productsd2a16';eba3fdc32e6/it/managed-apps/app-mgmt/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.129. http://www.verizonbusiness.com/Products/it/managed-apps/app-mgmt/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/managed-apps/app-mgmt/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload cd659'%3b0e2940ada39 was submitted in the REST URL parameter 2. This input was echoed as cd659';0e2940ada39 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/itcd659'%3b0e2940ada39/managed-apps/app-mgmt/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Last-Modified: Wed, 17 Nov 2010 00:40:38 GMT
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Content-Type: text/html
Content-Length: 42331
Date: Wed, 17 Nov 2010 00:40:38 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:38 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products/itcd659';0e2940ada39/managed-apps/app-mgmt/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.130. http://www.verizonbusiness.com/Products/it/managed-apps/app-mgmt/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/managed-apps/app-mgmt/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d1aac"%3be8b940f9cf5 was submitted in the REST URL parameter 2. This input was echoed as d1aac";e8b940f9cf5 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/itd1aac"%3be8b940f9cf5/managed-apps/app-mgmt/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:40:25 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42331
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:40:25 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:25 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link med
...[SNIP]...

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/itd1aac";e8b940f9cf5/managed-apps/app-mgmt/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM E
...[SNIP]...

1.131. http://www.verizonbusiness.com/Products/it/managed-apps/app-mgmt/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/managed-apps/app-mgmt/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload acab6'%3b674b2b76631 was submitted in the REST URL parameter 3. This input was echoed as acab6';674b2b76631 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it/managed-appsacab6'%3b674b2b76631/app-mgmt/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Last-Modified: Wed, 17 Nov 2010 00:41:11 GMT
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Content-Type: text/html
Content-Length: 42331
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:41:11 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:41:11 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products/it/managed-appsacab6';674b2b76631/app-mgmt/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.132. http://www.verizonbusiness.com/Products/it/managed-apps/app-mgmt/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/managed-apps/app-mgmt/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e2b2d"%3bcaecadb681b was submitted in the REST URL parameter 3. This input was echoed as e2b2d";caecadb681b in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it/managed-appse2b2d"%3bcaecadb681b/app-mgmt/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:40:49 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42333
Date: Wed, 17 Nov 2010 00:40:49 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:49 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/it/managed-appse2b2d";caecadb681b/app-mgmt/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SU
...[SNIP]...

1.133. http://www.verizonbusiness.com/Products/it/managed-apps/app-mgmt/ [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/managed-apps/app-mgmt/

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b75cf"%3b9b20cbb98b5 was submitted in the REST URL parameter 4. This input was echoed as b75cf";9b20cbb98b5 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it/managed-apps/app-mgmtb75cf"%3b9b20cbb98b5/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:41:18 GMT
Content-Type: text/html
Content-Length: 43319
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:41:18 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:41:18 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link med
...[SNIP]...
hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/it/managed-apps/app-mgmtb75cf";9b20cbb98b5/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.134. http://www.verizonbusiness.com/Products/it/managed-apps/app-mgmt/ [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/managed-apps/app-mgmt/

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 4bfb0'%3b8189e6f9970 was submitted in the REST URL parameter 4. This input was echoed as 4bfb0';8189e6f9970 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it/managed-apps/app-mgmt4bfb0'%3b8189e6f9970/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:41:28 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43319
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:41:28 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:41:28 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link type="text/css" rel="stylesheet" href="/(15:46:12)/templates/vzbar/style.css"><link typ
...[SNIP]...
<script type="text/javascript">
var request='/Products/it/managed-apps/app-mgmt4bfb0';8189e6f9970/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.135. http://www.verizonbusiness.com/Products/it/managed-apps/enterprise/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/managed-apps/enterprise/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3cc38"%3bebcdf587aaf was submitted in the REST URL parameter 1. This input was echoed as 3cc38";ebcdf587aaf in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products3cc38"%3bebcdf587aaf/it/managed-apps/enterprise/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Last-Modified: Wed, 17 Nov 2010 00:40:29 GMT
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Content-Type: text/html
Content-Length: 40670
Date: Wed, 17 Nov 2010 00:40:29 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:29 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products3cc38";ebcdf587aaf/it/managed-apps/enterprise/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINI
...[SNIP]...

1.136. http://www.verizonbusiness.com/Products/it/managed-apps/enterprise/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/managed-apps/enterprise/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 1f485'%3b29c124e2012 was submitted in the REST URL parameter 1. This input was echoed as 1f485';29c124e2012 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products1f485'%3b29c124e2012/it/managed-apps/enterprise/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:40:37 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40670
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:40:37 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:37 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products1f485';29c124e2012/it/managed-apps/enterprise/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.137. http://www.verizonbusiness.com/Products/it/managed-apps/enterprise/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/managed-apps/enterprise/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload e1126'%3b6cc6916aa59 was submitted in the REST URL parameter 2. This input was echoed as e1126';6cc6916aa59 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/ite1126'%3b6cc6916aa59/managed-apps/enterprise/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:41:08 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42337
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:41:08 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:41:08 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products/ite1126';6cc6916aa59/managed-apps/enterprise/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.138. http://www.verizonbusiness.com/Products/it/managed-apps/enterprise/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/managed-apps/enterprise/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a69f2"%3b70c6828dd23 was submitted in the REST URL parameter 2. This input was echoed as a69f2";70c6828dd23 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/ita69f2"%3b70c6828dd23/managed-apps/enterprise/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Last-Modified: Wed, 17 Nov 2010 00:40:49 GMT
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Content-Type: text/html
Content-Length: 42335
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:40:50 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:49 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/ita69f2";70c6828dd23/managed-apps/enterprise/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM
...[SNIP]...

1.139. http://www.verizonbusiness.com/Products/it/managed-apps/enterprise/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/managed-apps/enterprise/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8fde9"%3b8dc03f90ff4 was submitted in the REST URL parameter 3. This input was echoed as 8fde9";8dc03f90ff4 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it/managed-apps8fde9"%3b8dc03f90ff4/enterprise/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:41:29 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42335
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:41:29 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:41:29 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/it/managed-apps8fde9";8dc03f90ff4/enterprise/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR
...[SNIP]...

1.140. http://www.verizonbusiness.com/Products/it/managed-apps/enterprise/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/managed-apps/enterprise/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 4fe74'%3bfe40590ec48 was submitted in the REST URL parameter 3. This input was echoed as 4fe74';fe40590ec48 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it/managed-apps4fe74'%3bfe40590ec48/enterprise/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:41:45 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42335
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:41:45 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:41:45 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products/it/managed-apps4fe74';fe40590ec48/enterprise/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.141. http://www.verizonbusiness.com/Products/it/managed-apps/enterprise/ [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/managed-apps/enterprise/

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ab036"%3ba30048d6ff was submitted in the REST URL parameter 4. This input was echoed as ab036";a30048d6ff in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it/managed-apps/enterpriseab036"%3ba30048d6ff/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Last-Modified: Wed, 17 Nov 2010 00:42:15 GMT
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Content-Type: text/html
Content-Length: 43319
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:42:15 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:42:15 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link type="text/css" rel="stylesheet" href="/(15:46:12)/templates/vzbar/style.css"><link med
...[SNIP]...
x.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/it/managed-apps/enterpriseab036";a30048d6ff/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.142. http://www.verizonbusiness.com/Products/it/managed-apps/enterprise/ [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/managed-apps/enterprise/

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 4c5da'%3b8bd782249d9 was submitted in the REST URL parameter 4. This input was echoed as 4c5da';8bd782249d9 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it/managed-apps/enterprise4c5da'%3b8bd782249d9/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:42:34 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43321
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:42:34 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:42:34 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products/it/managed-apps/enterprise4c5da';8bd782249d9/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.143. http://www.verizonbusiness.com/Products/it/managed-it/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/managed-it/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7fdb7"%3b524858dde52 was submitted in the REST URL parameter 1. This input was echoed as 7fdb7";524858dde52 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products7fdb7"%3b524858dde52/it/managed-it/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:40:31 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40646
Date: Wed, 17 Nov 2010 00:40:31 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:31 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products7fdb7";524858dde52/it/managed-it/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS
...[SNIP]...

1.144. http://www.verizonbusiness.com/Products/it/managed-it/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/managed-it/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload cd3c2'%3b36e386e35b0 was submitted in the REST URL parameter 1. This input was echoed as cd3c2';36e386e35b0 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Productscd3c2'%3b36e386e35b0/it/managed-it/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:40:59 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40644
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:40:59 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:59 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Productscd3c2';36e386e35b0/it/managed-it/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.145. http://www.verizonbusiness.com/Products/it/managed-it/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/managed-it/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload de848"%3bbd9c29815fb was submitted in the REST URL parameter 2. This input was echoed as de848";bd9c29815fb in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/itde848"%3bbd9c29815fb/managed-it/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:41:16 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42311
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:41:16 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:41:16 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/itde848";bd9c29815fb/managed-it/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR
...[SNIP]...

1.146. http://www.verizonbusiness.com/Products/it/managed-it/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/managed-it/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 33677'%3b6b36e1baa5f was submitted in the REST URL parameter 2. This input was echoed as 33677';6b36e1baa5f in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it33677'%3b6b36e1baa5f/managed-it/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:41:31 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42309
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:41:31 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:41:31 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products/it33677';6b36e1baa5f/managed-it/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.147. http://www.verizonbusiness.com/Products/it/managed-it/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/managed-it/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 11798"%3bcda9f0fc744 was submitted in the REST URL parameter 3. This input was echoed as 11798";cda9f0fc744 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it/managed-it11798"%3bcda9f0fc744/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:41:39 GMT
Content-Type: text/html
Content-Length: 43037
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:41:39 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:41:39 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
h(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/it/managed-it11798";cda9f0fc744/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.148. http://www.verizonbusiness.com/Products/it/managed-it/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/managed-it/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c1f37'%3bcaf8722c66c was submitted in the REST URL parameter 3. This input was echoed as c1f37';caf8722c66c in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it/managed-itc1f37'%3bcaf8722c66c/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:41:56 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43035
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:41:56 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:41:56 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products/it/managed-itc1f37';caf8722c66c/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.149. http://www.verizonbusiness.com/Products/it/prof-svcs/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/prof-svcs/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload dbe89'%3bdec64a1e8d0 was submitted in the REST URL parameter 1. This input was echoed as dbe89';dec64a1e8d0 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Productsdbe89'%3bdec64a1e8d0/it/prof-svcs/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:40:27 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40642
Date: Wed, 17 Nov 2010 00:40:27 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:27 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Productsdbe89';dec64a1e8d0/it/prof-svcs/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.150. http://www.verizonbusiness.com/Products/it/prof-svcs/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/prof-svcs/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7a602"%3be426c879e4f was submitted in the REST URL parameter 1. This input was echoed as 7a602";e426c879e4f in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products7a602"%3be426c879e4f/it/prof-svcs/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:40:14 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40642
Date: Wed, 17 Nov 2010 00:40:14 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:14 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link med
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products7a602";e426c879e4f/it/prof-svcs/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS O
...[SNIP]...

1.151. http://www.verizonbusiness.com/Products/it/prof-svcs/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/prof-svcs/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload deab2'%3b4cd9ccfc36d was submitted in the REST URL parameter 2. This input was echoed as deab2';4cd9ccfc36d in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/itdeab2'%3b4cd9ccfc36d/prof-svcs/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:40:53 GMT
Content-Type: text/html
Content-Length: 42309
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:40:54 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:53 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products/itdeab2';4cd9ccfc36d/prof-svcs/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.152. http://www.verizonbusiness.com/Products/it/prof-svcs/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/prof-svcs/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3a0a8"%3b9be4f68ed28 was submitted in the REST URL parameter 2. This input was echoed as 3a0a8";9be4f68ed28 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it3a0a8"%3b9be4f68ed28/prof-svcs/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:40:45 GMT
Content-Type: text/html
Content-Length: 42309
Date: Wed, 17 Nov 2010 00:40:45 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:40:45 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/it3a0a8";9be4f68ed28/prof-svcs/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR S
...[SNIP]...

1.153. http://www.verizonbusiness.com/Products/it/prof-svcs/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/prof-svcs/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f3535"%3bb60e80bc0c7 was submitted in the REST URL parameter 3. This input was echoed as f3535";b60e80bc0c7 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it/prof-svcsf3535"%3bb60e80bc0c7/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:41:06 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43035
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:41:06 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:41:06 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
ch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/it/prof-svcsf3535";b60e80bc0c7/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.154. http://www.verizonbusiness.com/Products/it/prof-svcs/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/it/prof-svcs/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 4b70c'%3bbbd577dcfe5 was submitted in the REST URL parameter 3. This input was echoed as 4b70c';bbd577dcfe5 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/it/prof-svcs4b70c'%3bbbd577dcfe5/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:41:12 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43033
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:41:12 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:41:12 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products/it/prof-svcs4b70c';bbd577dcfe5/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.155. http://www.verizonbusiness.com/Products/mobility/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 77252'%3b40c8498d24e was submitted in the REST URL parameter 1. This input was echoed as 77252';40c8498d24e in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products77252'%3b40c8498d24e/mobility/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:46:17 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40636
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:46:17 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:46:17 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link type="text/css" rel="stylesheet" href="/(15:46:12)/templates/vzbar/style.css"><link typ
...[SNIP]...
<script type="text/javascript">
var request='/Products77252';40c8498d24e/mobility/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.156. http://www.verizonbusiness.com/Products/mobility/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 1f859"%3b9f422dac22d was submitted in the REST URL parameter 1. This input was echoed as 1f859";9f422dac22d in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products1f859"%3b9f422dac22d/mobility/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Last-Modified: Wed, 17 Nov 2010 00:45:57 GMT
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Content-Type: text/html
Content-Length: 40634
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:45:57 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:45:57 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products1f859";9f422dac22d/mobility/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SU
...[SNIP]...

1.157. http://www.verizonbusiness.com/Products/mobility/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 33169'%3b4bebde12907 was submitted in the REST URL parameter 2. This input was echoed as 33169';4bebde12907 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility33169'%3b4bebde12907/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:46:46 GMT
Content-Type: text/html
Content-Length: 42301
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:46:46 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:46:46 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products/mobility33169';4bebde12907/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.158. http://www.verizonbusiness.com/Products/mobility/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e23de"%3bf980c1c8347 was submitted in the REST URL parameter 2. This input was echoed as e23de";f980c1c8347 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobilitye23de"%3bf980c1c8347/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:46:35 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42299
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:46:35 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:46:35 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/mobilitye23de";f980c1c8347/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.159. http://www.verizonbusiness.com/Products/mobility/applications/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/applications/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 849d1'%3b22dae2fe542 was submitted in the REST URL parameter 1. This input was echoed as 849d1';22dae2fe542 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products849d1'%3b22dae2fe542/mobility/applications/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:46:59 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40660
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:46:59 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:46:59 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products849d1';22dae2fe542/mobility/applications/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.160. http://www.verizonbusiness.com/Products/mobility/applications/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/applications/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3aafe"%3b022906c52d was submitted in the REST URL parameter 1. This input was echoed as 3aafe";022906c52d in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products3aafe"%3b022906c52d/mobility/applications/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:46:45 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40660
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:46:45 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:46:45 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link type="text/css" rel="stylesheet" href="/(15:46:12)/templates/vzbar/style.css"><link typ
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products3aafe";022906c52d/mobility/applications/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM E
...[SNIP]...

1.161. http://www.verizonbusiness.com/Products/mobility/applications/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/applications/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5e146"%3b15362627beb was submitted in the REST URL parameter 2. This input was echoed as 5e146";15362627beb in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility5e146"%3b15362627beb/applications/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:47:13 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42327
Date: Wed, 17 Nov 2010 00:47:13 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:47:13 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link type="text/css" rel="stylesheet" href="/(15:46:12)/templates/vzbar/style.css"><link typ
...[SNIP]...
catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/mobility5e146";15362627beb/applications/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS O
...[SNIP]...

1.162. http://www.verizonbusiness.com/Products/mobility/applications/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/applications/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 63e89'%3b1a180dd0762 was submitted in the REST URL parameter 2. This input was echoed as 63e89';1a180dd0762 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility63e89'%3b1a180dd0762/applications/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:47:45 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42325
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:47:45 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:47:45 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products/mobility63e89';1a180dd0762/applications/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.163. http://www.verizonbusiness.com/Products/mobility/applications/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/applications/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload fadd0"%3bd9966f7ea03 was submitted in the REST URL parameter 3. This input was echoed as fadd0";d9966f7ea03 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility/applicationsfadd0"%3bd9966f7ea03/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:48:24 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43676
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:48:25 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:48:24 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/mobility/applicationsfadd0";d9966f7ea03/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.164. http://www.verizonbusiness.com/Products/mobility/applications/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/applications/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload ba37d'%3b0ea0de4bc45 was submitted in the REST URL parameter 3. This input was echoed as ba37d';0ea0de4bc45 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility/applicationsba37d'%3b0ea0de4bc45/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:49:13 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43676
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:49:13 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:49:13 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products/mobility/applicationsba37d';0ea0de4bc45/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.165. http://www.verizonbusiness.com/Products/mobility/fixed-wireless/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/fixed-wireless/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload da1a8'%3bbfbbcd1692 was submitted in the REST URL parameter 1. This input was echoed as da1a8';bfbbcd1692 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Productsda1a8'%3bbfbbcd1692/mobility/fixed-wireless/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:46:39 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40664
Date: Wed, 17 Nov 2010 00:46:40 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:46:39 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link type="text/css" rel="stylesheet" href="/(15:46:12)/templates/vzbar/style.css"><link typ
...[SNIP]...
<script type="text/javascript">
var request='/Productsda1a8';bfbbcd1692/mobility/fixed-wireless/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.166. http://www.verizonbusiness.com/Products/mobility/fixed-wireless/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/fixed-wireless/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 9a83d"%3b454b64589c7 was submitted in the REST URL parameter 1. This input was echoed as 9a83d";454b64589c7 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products9a83d"%3b454b64589c7/mobility/fixed-wireless/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:46:22 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40666
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:46:22 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:46:22 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link type="text/css" rel="stylesheet" href="/(15:46:12)/templates/vzbar/style.css"><link typ
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products9a83d";454b64589c7/mobility/fixed-wireless/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM
...[SNIP]...

1.167. http://www.verizonbusiness.com/Products/mobility/fixed-wireless/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/fixed-wireless/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload bdc86'%3b380c747ec31 was submitted in the REST URL parameter 2. This input was echoed as bdc86';380c747ec31 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobilitybdc86'%3b380c747ec31/fixed-wireless/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:47:18 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42331
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:47:18 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:47:18 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link type="text/css" rel="stylesheet" href="/(15:46:12)/templates/vzbar/style.css"><link typ
...[SNIP]...
<script type="text/javascript">
var request='/Products/mobilitybdc86';380c747ec31/fixed-wireless/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.168. http://www.verizonbusiness.com/Products/mobility/fixed-wireless/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/fixed-wireless/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f5ca8"%3bf3123d85d77 was submitted in the REST URL parameter 2. This input was echoed as f5ca8";f3123d85d77 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobilityf5ca8"%3bf3123d85d77/fixed-wireless/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:46:53 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42329
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:46:53 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:46:53 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/mobilityf5ca8";f3123d85d77/fixed-wireless/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS
...[SNIP]...

1.169. http://www.verizonbusiness.com/Products/mobility/fixed-wireless/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/fixed-wireless/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f5eb0"%3b9c25d9dc05 was submitted in the REST URL parameter 3. This input was echoed as f5eb0";9c25d9dc05 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility/fixed-wirelessf5eb0"%3b9c25d9dc05/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:47:30 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43678
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:47:30 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:47:30 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/mobility/fixed-wirelessf5eb0";9c25d9dc05/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.170. http://www.verizonbusiness.com/Products/mobility/fixed-wireless/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/fixed-wireless/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 47e22'%3bb496a9d0390 was submitted in the REST URL parameter 3. This input was echoed as 47e22';b496a9d0390 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility/fixed-wireless47e22'%3bb496a9d0390/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:47:45 GMT
Content-Type: text/html
Content-Length: 43682
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:47:45 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:47:45 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products/mobility/fixed-wireless47e22';b496a9d0390/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.171. http://www.verizonbusiness.com/Products/mobility/global-communications/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/global-communications/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 5c2dd'%3b444cfe9fd01 was submitted in the REST URL parameter 1. This input was echoed as 5c2dd';444cfe9fd01 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products5c2dd'%3b444cfe9fd01/mobility/global-communications/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:47:33 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40678
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:47:33 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:47:33 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products5c2dd';444cfe9fd01/mobility/global-communications/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.172. http://www.verizonbusiness.com/Products/mobility/global-communications/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/global-communications/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 85110"%3bb3fb83dad0d was submitted in the REST URL parameter 1. This input was echoed as 85110";b3fb83dad0d in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products85110"%3bb3fb83dad0d/mobility/global-communications/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:47:04 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40678
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:47:04 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:47:04 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products85110";b3fb83dad0d/mobility/global-communications/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION
...[SNIP]...

1.173. http://www.verizonbusiness.com/Products/mobility/global-communications/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/global-communications/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f337a"%3b109b4371e9f was submitted in the REST URL parameter 2. This input was echoed as f337a";109b4371e9f in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobilityf337a"%3b109b4371e9f/global-communications/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:48:16 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42343
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:48:16 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:48:16 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/mobilityf337a";109b4371e9f/global-communications/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM E
...[SNIP]...

1.174. http://www.verizonbusiness.com/Products/mobility/global-communications/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/global-communications/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 2f668'%3bc3fa1a3bdcd was submitted in the REST URL parameter 2. This input was echoed as 2f668';c3fa1a3bdcd in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility2f668'%3bc3fa1a3bdcd/global-communications/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:49:01 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42343
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:49:01 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:49:01 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products/mobility2f668';c3fa1a3bdcd/global-communications/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.175. http://www.verizonbusiness.com/Products/mobility/global-communications/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/global-communications/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 1503b'%3bce953d2f130 was submitted in the REST URL parameter 3. This input was echoed as 1503b';ce953d2f130 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility/global-communications1503b'%3bce953d2f130/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:49:43 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43696
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:49:43 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:49:43 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products/mobility/global-communications1503b';ce953d2f130/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.176. http://www.verizonbusiness.com/Products/mobility/global-communications/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/global-communications/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 25303"%3bf2cba4c9262 was submitted in the REST URL parameter 3. This input was echoed as 25303";f2cba4c9262 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility/global-communications25303"%3bf2cba4c9262/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Last-Modified: Wed, 17 Nov 2010 00:49:35 GMT
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Content-Type: text/html
Content-Length: 43694
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:49:35 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:49:35 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link type="text/css" rel="stylesheet" href="/(15:46:12)/templates/vzbar/style.css"><link med
...[SNIP]...
="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/mobility/global-communications25303";f2cba4c9262/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.177. http://www.verizonbusiness.com/Products/mobility/management/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/management/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 3b572'%3b62c53b75e6d was submitted in the REST URL parameter 1. This input was echoed as 3b572';62c53b75e6d in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products3b572'%3b62c53b75e6d/mobility/management/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Last-Modified: Wed, 17 Nov 2010 00:46:31 GMT
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Content-Type: text/html
Content-Length: 40656
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:46:31 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:46:31 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products3b572';62c53b75e6d/mobility/management/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.178. http://www.verizonbusiness.com/Products/mobility/management/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/management/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 12f1c"%3b5469826756 was submitted in the REST URL parameter 1. This input was echoed as 12f1c";5469826756 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products12f1c"%3b5469826756/mobility/management/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Last-Modified: Wed, 17 Nov 2010 00:46:25 GMT
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Content-Type: text/html
Content-Length: 40654
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:46:26 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:46:25 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products12f1c";5469826756/mobility/management/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELE
...[SNIP]...

1.179. http://www.verizonbusiness.com/Products/mobility/management/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/management/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 646aa"%3bb00394d755e was submitted in the REST URL parameter 2. This input was echoed as 646aa";b00394d755e in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility646aa"%3bb00394d755e/management/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:46:36 GMT
Content-Type: text/html
Content-Length: 42323
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:46:36 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:46:36 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/mobility646aa";b00394d755e/management/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR
...[SNIP]...

1.180. http://www.verizonbusiness.com/Products/mobility/management/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/management/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d4bd7'%3b40c09fabac was submitted in the REST URL parameter 2. This input was echoed as d4bd7';40c09fabac in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobilityd4bd7'%3b40c09fabac/management/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:46:48 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42319
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:46:48 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:46:48 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products/mobilityd4bd7';40c09fabac/management/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.181. http://www.verizonbusiness.com/Products/mobility/management/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/management/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 761a7'%3b4f4249f797b was submitted in the REST URL parameter 3. This input was echoed as 761a7';4f4249f797b in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility/management761a7'%3b4f4249f797b/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:47:39 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43672
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:47:39 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:47:39 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products/mobility/management761a7';4f4249f797b/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.182. http://www.verizonbusiness.com/Products/mobility/management/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/management/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload eb55b"%3bb85670a5f74 was submitted in the REST URL parameter 3. This input was echoed as eb55b";b85670a5f74 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility/managementeb55b"%3bb85670a5f74/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:47:18 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43672
Date: Wed, 17 Nov 2010 00:47:18 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:47:18 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/mobility/managementeb55b";b85670a5f74/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.183. http://www.verizonbusiness.com/Products/mobility/management/managed/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/management/managed/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 21a05"%3b345f00ec30e was submitted in the REST URL parameter 1. This input was echoed as 21a05";345f00ec30e in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products21a05"%3b345f00ec30e/mobility/management/managed/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:46:28 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40672
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:46:28 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:46:28 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products21a05";345f00ec30e/mobility/management/managed/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MIN
...[SNIP]...

1.184. http://www.verizonbusiness.com/Products/mobility/management/managed/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/management/managed/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d4a94'%3bca42588ec38 was submitted in the REST URL parameter 1. This input was echoed as d4a94';ca42588ec38 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Productsd4a94'%3bca42588ec38/mobility/management/managed/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:46:46 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40674
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:46:46 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:46:46 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link type="text/css" rel="stylesheet" href="/(15:46:12)/templates/vzbar/style.css"><link typ
...[SNIP]...
<script type="text/javascript">
var request='/Productsd4a94';ca42588ec38/mobility/management/managed/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.185. http://www.verizonbusiness.com/Products/mobility/management/managed/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/management/managed/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload cf5eb'%3b1c04e180630 was submitted in the REST URL parameter 2. This input was echoed as cf5eb';1c04e180630 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobilitycf5eb'%3b1c04e180630/management/managed/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:47:11 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42339
Date: Wed, 17 Nov 2010 00:47:11 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:47:11 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link type="text/css" rel="stylesheet" href="/(15:46:12)/templates/vzbar/style.css"><link typ
...[SNIP]...
<script type="text/javascript">
var request='/Products/mobilitycf5eb';1c04e180630/management/managed/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.186. http://www.verizonbusiness.com/Products/mobility/management/managed/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/management/managed/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3efa5"%3bd4d61987db9 was submitted in the REST URL parameter 2. This input was echoed as 3efa5";d4d61987db9 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility3efa5"%3bd4d61987db9/management/managed/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Last-Modified: Wed, 17 Nov 2010 00:46:55 GMT
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Content-Type: text/html
Content-Length: 42337
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:46:55 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:46:55 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/mobility3efa5";d4d61987db9/management/managed/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEM
...[SNIP]...

1.187. http://www.verizonbusiness.com/Products/mobility/management/managed/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/management/managed/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 334a6"%3b52979b5fb99 was submitted in the REST URL parameter 3. This input was echoed as 334a6";52979b5fb99 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility/management334a6"%3b52979b5fb99/managed/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:47:23 GMT
Content-Type: text/html
Content-Length: 42514
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:47:23 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:47:23 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link type="text/css" href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet"><link med
...[SNIP]...
}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/mobility/management334a6";52979b5fb99/managed/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUB
...[SNIP]...

1.188. http://www.verizonbusiness.com/Products/mobility/management/managed/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/management/managed/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 2ddb5'%3b3f9e4fe4705 was submitted in the REST URL parameter 3. This input was echoed as 2ddb5';3f9e4fe4705 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility/management2ddb5'%3b3f9e4fe4705/managed/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:47:51 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42514
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:47:51 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:47:51 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products/mobility/management2ddb5';3f9e4fe4705/managed/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.189. http://www.verizonbusiness.com/Products/mobility/management/managed/ [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/management/managed/

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a1fb4'%3b77449c5d1be was submitted in the REST URL parameter 4. This input was echoed as a1fb4';77449c5d1be in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility/management/manageda1fb4'%3b77449c5d1be/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:48:53 GMT
Content-Type: text/html
Content-Length: 43969
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:48:53 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:48:53 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products/mobility/management/manageda1fb4';77449c5d1be/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.190. http://www.verizonbusiness.com/Products/mobility/management/managed/ [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/management/managed/

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload daf07"%3baed0622e4f8 was submitted in the REST URL parameter 4. This input was echoed as daf07";aed0622e4f8 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility/management/manageddaf07"%3baed0622e4f8/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:48:24 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43967
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:48:25 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:48:24 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/mobility/management/manageddaf07";aed0622e4f8/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.191. http://www.verizonbusiness.com/Products/mobility/mobile-email/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/mobile-email/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8dc5b"%3babb8ad5366a was submitted in the REST URL parameter 1. This input was echoed as 8dc5b";abb8ad5366a in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products8dc5b"%3babb8ad5366a/mobility/mobile-email/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:46:57 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40662
Date: Wed, 17 Nov 2010 00:46:57 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:46:57 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link type="text/css" rel="stylesheet" href="/(15:46:12)/templates/vzbar/style.css"><link typ
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products8dc5b";abb8ad5366a/mobility/mobile-email/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM E
...[SNIP]...

1.192. http://www.verizonbusiness.com/Products/mobility/mobile-email/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/mobile-email/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 83558'%3b7fb3163b374 was submitted in the REST URL parameter 1. This input was echoed as 83558';7fb3163b374 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products83558'%3b7fb3163b374/mobility/mobile-email/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:47:05 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40662
Date: Wed, 17 Nov 2010 00:47:05 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:47:05 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products83558';7fb3163b374/mobility/mobile-email/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.193. http://www.verizonbusiness.com/Products/mobility/mobile-email/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/mobile-email/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 38154"%3ba3a0ea05a9f was submitted in the REST URL parameter 2. This input was echoed as 38154";a3a0ea05a9f in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility38154"%3ba3a0ea05a9f/mobile-email/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:47:30 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42325
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:47:30 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:47:30 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/mobility38154";a3a0ea05a9f/mobile-email/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS O
...[SNIP]...

1.194. http://www.verizonbusiness.com/Products/mobility/mobile-email/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/mobile-email/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 73370'%3b4d6d8bcdd9d was submitted in the REST URL parameter 2. This input was echoed as 73370';4d6d8bcdd9d in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility73370'%3b4d6d8bcdd9d/mobile-email/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:48:05 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42325
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:48:05 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:48:05 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products/mobility73370';4d6d8bcdd9d/mobile-email/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.195. http://www.verizonbusiness.com/Products/mobility/mobile-email/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/mobile-email/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload ad694'%3b33a83ce02e9 was submitted in the REST URL parameter 3. This input was echoed as ad694';33a83ce02e9 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility/mobile-emailad694'%3b33a83ce02e9/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:49:10 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43678
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:49:10 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:49:10 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link type="text/css" rel="stylesheet" href="/(15:46:12)/templates/vzbar/style.css"><link typ
...[SNIP]...
<script type="text/javascript">
var request='/Products/mobility/mobile-emailad694';33a83ce02e9/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.196. http://www.verizonbusiness.com/Products/mobility/mobile-email/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/mobile-email/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 612a0"%3b2e75e839ef7 was submitted in the REST URL parameter 3. This input was echoed as 612a0";2e75e839ef7 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility/mobile-email612a0"%3b2e75e839ef7/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:48:50 GMT
Content-Type: text/html
Content-Length: 43678
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:48:50 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:48:50 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/mobility/mobile-email612a0";2e75e839ef7/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.197. http://www.verizonbusiness.com/Products/mobility/mobile-internet/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/mobile-internet/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 82fe8"%3bea8aa6a43b4 was submitted in the REST URL parameter 1. This input was echoed as 82fe8";ea8aa6a43b4 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products82fe8"%3bea8aa6a43b4/mobility/mobile-internet/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:47:11 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40668
Date: Wed, 17 Nov 2010 00:47:11 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:47:11 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products82fe8";ea8aa6a43b4/mobility/mobile-internet/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMU
...[SNIP]...

1.198. http://www.verizonbusiness.com/Products/mobility/mobile-internet/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/mobile-internet/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a407d'%3b0bb4a7e87c2 was submitted in the REST URL parameter 1. This input was echoed as a407d';0bb4a7e87c2 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Productsa407d'%3b0bb4a7e87c2/mobility/mobile-internet/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:47:54 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40666
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:47:54 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:47:54 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Productsa407d';0bb4a7e87c2/mobility/mobile-internet/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.199. http://www.verizonbusiness.com/Products/mobility/mobile-internet/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/mobile-internet/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f332a"%3b505833883a3 was submitted in the REST URL parameter 2. This input was echoed as f332a";505833883a3 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobilityf332a"%3b505833883a3/mobile-internet/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:48:26 GMT
Content-Type: text/html
Content-Length: 42331
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:48:26 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:48:26 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link type="text/css" href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet"><link med
...[SNIP]...
catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/mobilityf332a";505833883a3/mobile-internet/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENT
...[SNIP]...

1.200. http://www.verizonbusiness.com/Products/mobility/mobile-internet/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/mobile-internet/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 3e76d'%3b6b102cf14f1 was submitted in the REST URL parameter 2. This input was echoed as 3e76d';6b102cf14f1 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility3e76d'%3b6b102cf14f1/mobile-internet/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:49:19 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42331
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:49:19 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:49:19 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products/mobility3e76d';6b102cf14f1/mobile-internet/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.201. http://www.verizonbusiness.com/Products/mobility/mobile-internet/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/mobile-internet/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4002a"%3b1c83d06f92b was submitted in the REST URL parameter 3. This input was echoed as 4002a";1c83d06f92b in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility/mobile-internet4002a"%3b1c83d06f92b/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:49:49 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43682
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:49:49 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:49:49 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/mobility/mobile-internet4002a";1c83d06f92b/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.202. http://www.verizonbusiness.com/Products/mobility/mobile-internet/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/mobile-internet/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload bc33a'%3b3c0152b12c3 was submitted in the REST URL parameter 3. This input was echoed as bc33a';3c0152b12c3 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility/mobile-internetbc33a'%3b3c0152b12c3/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Last-Modified: Wed, 17 Nov 2010 00:49:57 GMT
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Content-Type: text/html
Content-Length: 43682
Date: Wed, 17 Nov 2010 00:49:58 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:49:57 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products/mobility/mobile-internetbc33a';3c0152b12c3/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.203. http://www.verizonbusiness.com/Products/mobility/program-management/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/program-management/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 20e13'%3b56ef80f6432 was submitted in the REST URL parameter 1. This input was echoed as 20e13';56ef80f6432 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products20e13'%3b56ef80f6432/mobility/program-management/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:47:56 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40672
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:47:56 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:47:56 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products20e13';56ef80f6432/mobility/program-management/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.204. http://www.verizonbusiness.com/Products/mobility/program-management/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/program-management/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 1eb1c"%3b3807fb0311a was submitted in the REST URL parameter 1. This input was echoed as 1eb1c";3807fb0311a in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products1eb1c"%3b3807fb0311a/mobility/program-management/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:47:21 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40672
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:47:21 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:47:21 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products1eb1c";3807fb0311a/mobility/program-management/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MIN
...[SNIP]...

1.205. http://www.verizonbusiness.com/Products/mobility/program-management/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/program-management/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 1f63f"%3b55c442f263f was submitted in the REST URL parameter 2. This input was echoed as 1f63f";55c442f263f in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility1f63f"%3b55c442f263f/program-management/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:48:10 GMT
Content-Type: text/html
Content-Length: 42337
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:48:11 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:48:10 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link type="text/css" href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet"><link med
...[SNIP]...
catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/mobility1f63f";55c442f263f/program-management/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEM
...[SNIP]...

1.206. http://www.verizonbusiness.com/Products/mobility/program-management/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/program-management/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 703f8'%3bcc71bbbe59c was submitted in the REST URL parameter 2. This input was echoed as 703f8';cc71bbbe59c in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility703f8'%3bcc71bbbe59c/program-management/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:48:36 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42337
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:48:36 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:48:36 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products/mobility703f8';cc71bbbe59c/program-management/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.207. http://www.verizonbusiness.com/Products/mobility/program-management/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/program-management/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 5f3a8'%3bac7bb619e9a was submitted in the REST URL parameter 3. This input was echoed as 5f3a8';ac7bb619e9a in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility/program-management5f3a8'%3bac7bb619e9a/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:49:48 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43690
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:49:48 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:49:48 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products/mobility/program-management5f3a8';ac7bb619e9a/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.208. http://www.verizonbusiness.com/Products/mobility/program-management/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/program-management/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7840c"%3b247aa4cf98 was submitted in the REST URL parameter 3. This input was echoed as 7840c";247aa4cf98 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility/program-management7840c"%3b247aa4cf98/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:49:30 GMT
Content-Type: text/html
Content-Length: 43688
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:49:30 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:49:30 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/mobility/program-management7840c";247aa4cf98/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.209. http://www.verizonbusiness.com/Products/mobility/voice-messaging/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/voice-messaging/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 24949'%3b15adafaf5b9 was submitted in the REST URL parameter 1. This input was echoed as 24949';15adafaf5b9 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products24949'%3b15adafaf5b9/mobility/voice-messaging/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:46:44 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40668
Date: Wed, 17 Nov 2010 00:46:44 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:46:44 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
<script type="text/javascript">
var request='/Products24949';15adafaf5b9/mobility/voice-messaging/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.210. http://www.verizonbusiness.com/Products/mobility/voice-messaging/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/voice-messaging/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c3a86"%3b3cce78453f4 was submitted in the REST URL parameter 1. This input was echoed as c3a86";3cce78453f4 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Productsc3a86"%3b3cce78453f4/mobility/voice-messaging/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:46:36 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40666
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:46:36 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:46:36 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Productsc3a86";3cce78453f4/mobility/voice-messaging/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMU
...[SNIP]...

1.211. http://www.verizonbusiness.com/Products/mobility/voice-messaging/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/voice-messaging/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d26fe"%3bac4be014476 was submitted in the REST URL parameter 2. This input was echoed as d26fe";ac4be014476 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobilityd26fe"%3bac4be014476/voice-messaging/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:47:10 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42331
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:47:10 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:47:10 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link hre
...[SNIP]...
catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/mobilityd26fe";ac4be014476/voice-messaging/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENT
...[SNIP]...

1.212. http://www.verizonbusiness.com/Products/mobility/voice-messaging/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/voice-messaging/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 4d58f'%3bd6918e1f5ed was submitted in the REST URL parameter 2. This input was echoed as 4d58f';d6918e1f5ed in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility4d58f'%3bd6918e1f5ed/voice-messaging/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:47:34 GMT
Content-Type: text/html
Content-Length: 42333
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:47:34 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:47:34 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products/mobility4d58f';d6918e1f5ed/voice-messaging/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.213. http://www.verizonbusiness.com/Products/mobility/voice-messaging/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/voice-messaging/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f81dd"%3b7fbe73ab643 was submitted in the REST URL parameter 3. This input was echoed as f81dd";7fbe73ab643 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility/voice-messagingf81dd"%3b7fbe73ab643/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:48:09 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 43682
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:48:09 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:48:09 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/mobility/voice-messagingf81dd";7fbe73ab643/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMENTS OR SUBMIT FUNC
...[SNIP]...

1.214. http://www.verizonbusiness.com/Products/mobility/voice-messaging/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/voice-messaging/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload ab08f'%3b7cb4ab0f46a was submitted in the REST URL parameter 3. This input was echoed as ab08f';7cb4ab0f46a in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility/voice-messagingab08f'%3b7cb4ab0f46a/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:48:50 GMT
Content-Type: text/html
Content-Length: 43684
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:48:50 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:48:50 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products/mobility/voice-messagingab08f';7cb4ab0f46a/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.215. http://www.verizonbusiness.com/Products/mobility/wireless-devices/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/wireless-devices/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 32e7c'%3bfd9cfa37da7 was submitted in the REST URL parameter 1. This input was echoed as 32e7c';fd9cfa37da7 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products32e7c'%3bfd9cfa37da7/mobility/wireless-devices/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:46:37 GMT
Content-Type: text/html
Content-Length: 40670
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:46:37 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:46:37 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
<script type="text/javascript">
var request='/Products32e7c';fd9cfa37da7/mobility/wireless-devices/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.216. http://www.verizonbusiness.com/Products/mobility/wireless-devices/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/wireless-devices/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload efe60"%3b03077da2f15 was submitted in the REST URL parameter 1. This input was echoed as efe60";03077da2f15 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Productsefe60"%3b03077da2f15/mobility/wireless-devices/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:46:23 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 40668
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:46:23 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:46:23 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" rel="stylesheet" type="text/css"><link hre
...[SNIP]...
}

} catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Productsefe60";03077da2f15/mobility/wireless-devices/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIM
...[SNIP]...

1.217. http://www.verizonbusiness.com/Products/mobility/wireless-devices/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/wireless-devices/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c40cd'%3b9862982ca56 was submitted in the REST URL parameter 2. This input was echoed as c40cd';9862982ca56 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobilityc40cd'%3b9862982ca56/wireless-devices/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:47:09 GMT
Vary: User-Agent
Content-Type: text/html
Content-Length: 42335
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:47:09 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:47:09 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link type="text/css" rel="stylesheet" href="/(15:46:12)/templates/vzbar/style.css"><link typ
...[SNIP]...
<script type="text/javascript">
var request='/Products/mobilityc40cd';9862982ca56/wireless-devices/index.xml'.toLowerCase().replace(/_/,'/');
var rurl=request.split('/');
var s=new Array();
var i=0; if (rurl.length>
...[SNIP]...

1.218. http://www.verizonbusiness.com/Products/mobility/wireless-devices/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/wireless-devices/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 39ccf"%3bd4482b29410 was submitted in the REST URL parameter 2. This input was echoed as 39ccf";d4482b29410 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility39ccf"%3bd4482b29410/wireless-devices/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response

HTTP/1.1 404 Not Found
Vary: User-Agent
Server: Roxen/4.5.146-release3
Accept-Ranges: bytes
Last-Modified: Wed, 17 Nov 2010 00:46:43 GMT
Content-Type: text/html
Content-Length: 42335
Vary: Accept-Encoding
Date: Wed, 17 Nov 2010 00:46:43 GMT
Connection: close
Expires: Mon, 16 Nov 2009 18:46:43 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>
<link href="/(15:46:12)/templates/vzbar/style.css" type="text/css" rel="stylesheet"><link med
...[SNIP]...
catch(e) {}

hbx.ci="";//CUSTOMER ID
hbx.hrf="";//CUSTOM REFERRER

hbx.pn="Page not found";//PAGE NAME(S)
hbx.mlc="CONTENT+CATEGORY";//MULTI-LEVEL CONTENT CATEGORY

hbx.mlc="/error/Products/mobility39ccf";d4482b29410/wireless-devices/index.xml";

hbx.pndef="title";//DEFAULT PAGE NAME
hbx.ctdef="full";//DEFAULT CONTENT CATEGORY

//OPTIONAL PAGE VARIABLES

//ACTION SETTINGS
hbx.fv="";//FORM VALIDATION MINIMUM ELEMEN
...[SNIP]...

1.219. http://www.verizonbusiness.com/Products/mobility/wireless-devices/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.verizonbusiness.com
Path:   /Products/mobility/wireless-devices/

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 822cc"%3b9f41d42046d was submitted in the REST URL parameter 3. This input was echoed as 822cc";9f41d42046d in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Products/mobility/wireless-devices822cc"%3b9f41d42046d/ HTTP/1.1
Host: www.verizonbusiness.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmv=; __utmz=58777642.1289951911.1.1.utmcsr=news.cnet.com|utmccn=(referral)|utmcmd=referral|utmcct=/8301-27080_3-20022451-245.html; __utma=58777642.1211968314.1289951911.1289951911.1289951911.1; CP=null*; __utmc=58777642; __utmb=58777642.1.10.1289951911;

Response